Analysis
-
max time kernel
134s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 00:02
Static task
static1
Behavioral task
behavioral1
Sample
8c84f6eb742fe0b38300514cc1d87bfb_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8c84f6eb742fe0b38300514cc1d87bfb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8c84f6eb742fe0b38300514cc1d87bfb_JaffaCakes118.html
-
Size
53KB
-
MD5
8c84f6eb742fe0b38300514cc1d87bfb
-
SHA1
e48d22c9d581247ae9c4b8c5bb809524fe54fd36
-
SHA256
596c34ef3c6be38559c4d632393194db8576110b320924261fc8d0da43299a71
-
SHA512
c0ea52abfa30aa244f3b28da7f556d43ff3f87073e765ac4db95722a65ab8539715951485858ddbc635c53ffa35107d0738429db3ce2a7d11af67f676f756971
-
SSDEEP
1536:CkgUiIakTqGivi+PyUWrunlY863Nj+q5VyvR0w2AzTICbbGo5/t9M/dNwIUTDmDB:CkgUiIakTqGivi+PyUWrunlY863Nj+qX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{334B0D61-583E-11EF-A4A7-66E045FF78A1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429582832" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 602dbf084becda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000783a319a25fbcdebda4160c3f4bd683ff2ff1c0b993ecb479ccb98ae32b96ea4000000000e80000000020000200000008fb9de718974e48fa000826306bdaa0700fe6b46f365ff8beb472bfac12964cc20000000c9e16315f80f39e0f721b809f428fd2ca8143007dbd2eec051e03e2e79c283ac40000000f494f364b1b12b2bbd0d6c8d0c0293563b003282020e902485eab99e0fb5da17ca9ad4266d79d5f2fe5533fee3e7cd432f27c0b1dcb5e5f313b9e6c222545d6a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1900 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1900 iexplore.exe 1900 iexplore.exe 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2756 1900 iexplore.exe 30 PID 1900 wrote to memory of 2756 1900 iexplore.exe 30 PID 1900 wrote to memory of 2756 1900 iexplore.exe 30 PID 1900 wrote to memory of 2756 1900 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8c84f6eb742fe0b38300514cc1d87bfb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1900 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59873d704d14ebbb207fb16cda784fa89
SHA181a4e310ce06f9d7f63889c81c45bdc30c6e1d96
SHA2564e33f9a196899fbf3ddb8f7b4b35776ec8409036b929fa8683ecf62e8e64b25d
SHA512bc0c5c8608b1eda2164f73e84d52eece2b162019740e8ed3fd899e2bddbbd2180c35e8d0a9db50519ca9d980300f99c750e18df5bf0ac0f14c923f9968115f56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d5cd17019b6f50640f5f272899037e3
SHA17f75338e5e3508dd340bb1ae429eda1f7a597904
SHA256b7240808d6f1d78d7614cb1cc8efd26afb9f46f484a5098e1465bb9ae1440834
SHA512c8f82663dba287fafbeae3fc7cce6df3d5f679864e50dce76ec4bc6fe66060d1fd54f874fa5c900971764a74a8d5694575b3fd42ddac051f8bd0ccd4b4f0822d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56489ac7992ca49dcd567d234cb2de874
SHA1ca7214115502cfebf364f871ac8fa2dd06704142
SHA256b7b57dc766ffc142cc20509c35821cc82e095eea074519fb7f24463a80db03d6
SHA512e6da2811b401da3780ae5bc7acc1491dcba87aaae0cac2cc2bcae7b7deafd82a5cb964f15688776134f6284b9d22222e7e53129774b296b83a7d38b16701d843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5126ac27c0a8a8e210ab18e08b98cc40e
SHA19d32d75bbe4b413d29bb59433644d90b1d8800ab
SHA256aca8b2890b1a702b4c6a7863f341c5da3c99bf283106a904006a7c41b2abf8d9
SHA512d66cfdf5e6730e581c46da2f2b272303bd1b2e01b357f508954a4f239ff428389d396b496212711080a97cf3afd6c564e8cdb1b9e20c41aa656bf3eedd344916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff1403d335d663602f096800fda10263
SHA19a88408463a8111f9f5193f0ca987c1c1dbaa15e
SHA256b18df75ab72c950803f95512d1ea365e7952ec820e014a46fa87184b14777e67
SHA51295abfa1e428c5cc2178e1f6d377f8457553f3b6a4eeead7913fe9abc632673d480d29dfd1ccd1188db4edab262b5ed74c3cfb30b615019d9185644010b9ef31c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a59990410509613de01c1f2885c6b0a
SHA13ad97ce211bb30222c1012c340681d2378f0ba8e
SHA2560a292e513d2563e151a8aa7a6fafbc9c8a38dc7cfc6f664f9dcd0fb7c9a00d43
SHA512fcbf5935de6908b09360b258b61e6242805fd72f6d221b2a478a8842c8a2fc0303b07ffa625c54c6f77e7bcca1e81e317ca03d7bf7667fbac2ba32c792dc4100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5167bd8c42e5de16c92a61a87e73d4c38
SHA16782c1d7b8b64d2cc36b13b42485f4678debc207
SHA2568f3c19cf96ed62acc20c0813c51f74bfa4c0dd48c401b356836b52f003a4adcb
SHA512687dea64502e2066d897989a458987102458c5bb9421649c37830a78d78db8cf4a0ea37919f2ed345ccb45f89fc8aaa4c11d54706c74f62f125a3e8e5c1625bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc3f00127d99cef9cf5f73c39a89d6dd
SHA1fc85cdb0ad32614dc18ad15dca0f0f3b4e97b44f
SHA256892f7601415025b1bd3e3b1d7e43b3762633217d0bb4207b5e816044b24b6f89
SHA51245b452437e0953b68910ea5e7be12eeb3dcbe91bdb0a92114f6e56c8393f8684a2cf4ebd2306b494ec6c75086c87292ff8ad7552e31c749e7f9f3a5683089903
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50956e86902a0e70c89465019e5091748
SHA1e2de0d50552fb6b0185736563232dd4984cd3299
SHA25663898fa74c983493b80a7dd738e698c6094689b29d73062921814b3a23e5dd61
SHA512840f85550a856a85a9efeeafab2fcefa8d691f2a1e27c7e6ddd7ab82f30b3324527b7aa5a98429794a4faed166ebc721ebaafd02928f1740e0d7a4c048e518d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5325c8aaf3c6720f5818b6ac5b6e03368
SHA1971a58459a3e58b5f9c74d63db6a9c7ce1b1d311
SHA2560b218359747cd55acdb65092c3b104a82da290b54e69c1b9ce652948ac6400df
SHA5124af9a06031c73c16df0cdf7289ac8a3ca95fc2810065f2c28b9fd0c090efc6daf2e209b513ff15f5d495007055bc6358e93620bb9a4c307a6662a9a51a047ab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b8e8f0fc76df41a1b3081de75db6097
SHA1030310a7d88fec9a635405dba3cf3459ecf7773b
SHA2562f998634db05fe403319d1f277d6fb91ed85a33662e3a89e1348e0c0b8bccbf3
SHA512989343c63230fd652150cb51af53f516a8478fc0a4de8f66bca194f3cbc0467e6cce6e6ab10ce5b9463d67812d1018d6561c9a8a63a1339d44ed7f61da3f0052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55944a78c6a722d8160350d7ac28202e7
SHA1e9a810cecfcf847df2987957215e6aa56aedea72
SHA256cde19f1bca50d1e8c772ba577baf41da5193c00c525a45209a56b7c8de95ecc2
SHA5120bdc8e20de4c4f2704132df611e800273ef0438124ad0dcb5df61dd4f8be24bd8941e06c56461942a961d0619b71bd7d45b731a44adf4a2d22f39d9570ddbca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573c5d5e058f1301eceeaf1a283b1b218
SHA1da7f71f1b09a367d4440a8d1c13298bde179e758
SHA256ac694cb0295dacd98b71eb3e744da98c39d92ee2d4f751faad3bc8aac908e774
SHA512bfd5602d6da835c46ee5a4bca02d5bb1623f0523677d49b35f69435aea4b885378789485d5e7145ba6c407c00754766acf1309f8b27bfbea48644bdc07b120be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5075ce319a92efd9d7e0c913e1a053d3f
SHA1158efe9b1518b529ad28cd1d1894941118053726
SHA256cee0563385d933a706be96d6a94caf92bd6104849bf4cc992b7e14488b99d897
SHA512d7bc4b3824d8c5eb48cf00e1c169459babc49296867e2fd4dcf5aa1dc6b033987ab8002c9a2ea7d65a6302a565af79d877aca49ab59efd3bd827f509be5c8514
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad5168e374a4edba17c6a85c908ac042
SHA1287c3bc281943b04ac4b1f508a4f6bb07988f5ee
SHA2567ea06ff11127638e39c7ffb0e822d4db2907aa534c43d2db470046aff6b7d17a
SHA5129995152fe91b1d66f10d29fac1794adacd215b3e11d20c2e7dbdd77880335428da0c871276b02503c0cc1f589793e634f2a8bb8e362284cf968eefa1c65748f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f654ac7311872f2605e07471b8c6a1e
SHA164fc4d73a06ba589e8811e1302758b6059baba10
SHA256e37613df47d179cd82ab08d42e93ead4b140b2a02d99bcc31c332c03852a425f
SHA512f529eb6fb2fec4ee848a3f021214e600557e0245c21d6797fc3370df61fca0bc63235f16415638f595f0728f2bcdf3b424f53f2285828b361bb542f759186df2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511723a3d7d5599dde1a235173c6a1928
SHA105cb5419667739a7dd52a4c09316a0fef0a39752
SHA256575a27c73df62f74615ada1c1020381ac4a42882887340fadc0939a58567ec25
SHA5129537af22cf0849b36677c54b0c408fa94c0849190bb7f750cbd408847c5a88172023857f70c0553b4625385efe96a1f6333758731b3e961d18536d4c33a3d9dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8bd7fbd100994ba76b25dc3ea1c8a0a
SHA1e6ffa8fc923403be4e0d39df199ac92b9eb65fd7
SHA25608990f3749e60885bc95844a9a9ed500594e7bc96d31e20db44150f30d1aadd9
SHA512798f574c3a3370eb14f36fe7c9a2a1f9ee7d2608c55c0da39e37a92299a6b12749db5f27b70935dedbe72db9fbba4840236601ae98c8874af4de61f7caedface
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576f3db86653be649f8b380baa16744e7
SHA18dcb79a32b529650dff5b4190a6a4f48ca21e559
SHA2562e14716cb75d8f0033795cc2b07fe961d9392200fb9c47850838a992f900951b
SHA51226ddf477bd8f19cb5995d1a64a8424ed449da747e1c9f33e273a9ec22a8c0faeb27d009ed66f969f64995678c2aae903875b69e8b16e965c157c51264b465cac
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\40WV1DY9\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b