Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 00:34
Static task
static1
Behavioral task
behavioral1
Sample
8c9dc534e34ac621de27ac09b470043a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8c9dc534e34ac621de27ac09b470043a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8c9dc534e34ac621de27ac09b470043a_JaffaCakes118.html
-
Size
10KB
-
MD5
8c9dc534e34ac621de27ac09b470043a
-
SHA1
77134b888d83ca76f7c7fe9d13c7fe3b03782134
-
SHA256
1722408e0651f45f8a8f135f3d3a7af660f3a933c8de1187537d942f449f0a32
-
SHA512
531a22fda40f1f72e2b77a8855b429b766cb911e0556793ffd813d04f55dd98f9131d3e7a2b546e80e9a16e35f8d41042947848e37399f74b4767428177778d6
-
SSDEEP
96:uzVs+ux7iQLLY1k9o84d12ef7CSTU3GT/kJKRp9TgtAP3QSlVHcEZ7ru7f:csz7iQAYS/Gu9TgtWQSPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c09aee7a4fecda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429584740" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000001d1e685c0e2cd7dd7d015153a948e12098026f66754a963e585d39156c24fc72000000000e8000000002000020000000aa42de92f805259ef6eec256bff818d3acbedaf0cbed8b7b7d792e91d2f744fe200000005ddd51edad308859f6cb43ee76e483613795b7c5ad2e2637f965a08eb703863e400000009467113fb35316741a308160b4c12efbebe1212a4062c599ab11d2fcdc907cf981a6515af691ff494bf93507cff1bdba8d16c9e5039f9c6d977edd09e81b6c1a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A47B69E1-5842-11EF-AE10-CEBD2182E735} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3068 iexplore.exe 3068 iexplore.exe 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE 2600 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2600 3068 iexplore.exe 28 PID 3068 wrote to memory of 2600 3068 iexplore.exe 28 PID 3068 wrote to memory of 2600 3068 iexplore.exe 28 PID 3068 wrote to memory of 2600 3068 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8c9dc534e34ac621de27ac09b470043a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f2b1e04486d06612450c30d4552602f
SHA18cfe79e2aaa8ea72308b9682cfeadf7216823470
SHA256b7be80268c5003f7a4bd268c7465b4c96d8d9392a22494b088eeaf1cd5e587d0
SHA51263878cd87192272d096486497a0625978bbf00bd54f440008e640b8282bce3621a677095e600fef5fe067a01c7ac7f7fc7e7dd28cb7060f1042742f939503159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b88830b7ae119961ca91546a6f02c4a3
SHA1fb649bb217f4ede6f24e43aec9f06cd1f18ad083
SHA25672bf2fa83c9a7cb51f7afc0eea0adedf04c7f1626287ac692980bfd1a8f83fb7
SHA512a1cad8931449509b6e2d4778ee242d4954a7d8fc54c9bd4bb366360aa3d688437710e70fe156f22c2bfaad53447b68fd997f86083b655628efc4dff0d3836b6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b56792fa98ee305b7ed67a8301f5922
SHA1ad0f4f6c28fb8b1e1623bdc83996b0ec54ed6ca5
SHA256be5602eedffc681fef1d6d43ba29dbc3cfded56268f443aebc34f4fd0a3537e6
SHA512220f60e0f34c876f6edfb649bba5ee3a4ba3cbe76078a661f825c7f7724a5c0795c8d19efc8a776a5ebca4cf518023ca67903a1dddc71b3111f9b85dff721410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5896f34d64d6e031c75b9cb4f77da84de
SHA12912ebe72774220cc34de408ad0ac7aa1e5e489f
SHA2561bddc33a9c431a81c891f58279f4ca70311aaf85dab5a3bb40b22e2937ad9933
SHA5121b021ed1fbc0d03d6588587d98235aee9711a9480be4da7ae72f739685dd23b1c136d0546b6683d956af91094c172817cb8f0dbe108f181262c5a5a580320cac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a05b6f44445add398b355db4470bf663
SHA1dd148df8e568d5a87c46d910f2f3622700c9293e
SHA2566d1eb5194d271bf3715b93f26512fac9c3d3fc474794521afa2844c9b3a402b2
SHA5123ccadbe326f6d0541e60c73cbc0592adaf1b0e3212f0af9c04e9d822183385424c47c80785a2b550a96fd5b459bb98779a09d52ba20d806e31ebc272f14c9b16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e079510d2da72262eb916bdce08a1b4c
SHA143be059c4b101f904d32f5502a3d381a0b943677
SHA2562e261f39b2b2eaaeef6a62aba05f195c8bfd505e729815f753bfebbcd3990a32
SHA51217571e0d4f41b83bf373e6772b921418719f174815dfb1bcaf8c60f742131731e06725eae7c81264814582c9abc286d6a1eb989cdfe82f9e87510f8ed8118003
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f09ffb54b6f3acddb0baa9a535da4cc7
SHA1cc2b4451eb396b5d1f9b3269ff9ca19a764fc061
SHA256c74a923f6c64e5586279d4ea3525479d8500e093b899c9ed985585bdc85e922c
SHA512c18f1402de3631a39778cccb2ce416d6070465e8ab7c184449a5049d4011dbbffaf1192c791f86ac5a01a4eda1c5468f3dc8faf3aa2e96ed22c061b666f2d914
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57467986c4e88f79c77b2a928f51cfaed
SHA1e613cbb388ffd48c342db5b207047fcaf9269c5f
SHA2568742e55919866999a4aca1b5da1d51e53138424b8a0ecf06c1e7bce799c4d692
SHA5120e1fc60fb154185a7261bc202713c586be3464f23811b65494817b6b3bb437864cd6c7f64b4127590b7f3d1c6489dd060812c5be98141c91e2a1353816bc6b52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e80bbdfafa4366674f2fce50ac9bb7b
SHA16cce4478cfc21a91f18e8e2cfd6fc4f0cc743bd6
SHA2560a3b12f6c7ec550368c7a2d7a216ed568ed7f5e022620fa8762a19f8a4314740
SHA512715e5dbffa6ed94990994be47393d03e601f092f745e133bb71b81cec60bf437848da06dbd628a288bffbc70fa009a4d2d39067549beb2fdaad5adf5a4735a83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540174fc506999b6f2387b92a61e4b221
SHA139ae66d35c065299e922b06a0ae43d4f7a15bc56
SHA256f894f3408eed80ea3b2d4920782827ca7b183276c764ef9b2dacdd32c0784753
SHA512e571a630484fde35b49218d2412fdb53fd059754d974361b13e3e2ec4e3c5bcd76b4222319d850a047d1fb80ea34d67a360fd4d35557d1f972dd976759471579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e250c035d456ba868ddd2d69d5978241
SHA170ab58ff5a6963e53336630005107fa9892ad7c8
SHA25633e9e123701b2e8d7326907132804d851ba85ed5a44209641a2b8d918817f521
SHA512bf55dec776865889f406bc87d453642a42e82c43a801c9caaed9588d7b58ea3c1c4ba08cefd0f585d6e735ef4aa76dbd3f7ab714dd344a982a5992c5373258e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5416beb93fa4b0d89d270e1dee8117f42
SHA19c00eaa5d03b5da9c16a0515945dbbe173ed52ce
SHA2560a1b1206ed260e1d45b8823a396cb025895abb77ec87b6d0261f4824cf5bc73b
SHA512187c8f2ef35a88e171443ad2f5b0fbadba77ee7d30d70f611b3d3a135e456d1579ab8f2e73c903a11fab9d6aa6f5e226052b78d93a05a2fbd55aa0c153e97e2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500585503c5d72e1e85700e4d92bebf73
SHA18cd634fbe6d64d8512a40cdddcc38292c90eb173
SHA256a05bf95ef822ce4c537854e5f5c60665c9d412a0306fa8e310c200087042cd52
SHA512280eb9f23322c91a23d7b583983acf735b982a1d687f1bc2cd6a12fea307e20c6205c8684bdcbf05374451afbe4e1fa0cf3dfa7ec21526019b61a2d640c7885f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e8fd03b9b8b1e94b3df18261e3ce624
SHA1d3bdc1be678bc65f9cc21477ae3bc26010288150
SHA2569ca48431b4055a4d8c555fcd8dde7d84663eaa826886265cd2ea0725b6ee4609
SHA51222a05f558ceb73edbf34b5ac2dbaf0ac55ee61100c2c4714d23ed4f2790585a48a0c32c572a417152000b24a4d070b86af6c8049ebd9add8dcb0aea7b86a573a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501a5fe0110be3821c82d2043b48f1646
SHA1be163fb239ff0254c27319e81fe5478ec6925f4d
SHA2564e34ac274a02a341f5ff108a603849b7e3e5b059bc53c4eeafb85985b0380c32
SHA512340e94f07854e83785dc4a5cc2cd7423a024d355371156e85e877364457d522ddbf9934a0a758335af6e3e8b3a19ea80449505d23b7ab584a01fe8b69add8466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5445e93b1ac80a1ed47e3b27dec51776d
SHA1acba13b4a8c54e86458111ce9e5c0091d3556dc0
SHA256116dca9aed0e1b02693c8bea98960fe8c9006f503fa3e2f42827ccda4d47801b
SHA512d79e4df5c34ace534047208d0ced67b1641674168e75f285d6849e4a539a50c3bf9959701377f75bd726c96b4e9c63ae39d6087b480f49ea52615a8a06412a18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa36ecb2067ecf2a3778add4d5de7da0
SHA10974b6de23b85a844ee9504320092621cf48a5ed
SHA2561aa9aa20e1bda9597b14c15448fca465a44e7108732ee6da97850f4e0c36bf56
SHA512f47f788f3233a34050557830846aef4d339ee1135e43f6e7afc19c992e3dad04e531241bec289ded0f5f4d0dd3910ac74aea154bb02bb13cf50e39bf543bea27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53885724f7123dea3aca52a5f21b7b45d
SHA18e27e1edef39e170e5a5ce67a6c96c17ee334dad
SHA2567eaa191b3fec22c33b38befa79cf51d5c9e57287d9e51feb6c6c0accc441a96a
SHA512f60e1344e7b2003d720625433debac42e8e47d2654242910cf55cc7ba61df3c5aece69c444a975462a54fb215d809aa461e50fee73fbad0882230d0979a0ba27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5343d01987d1b9f37f90a6449b2a1889a
SHA1f18ce5aba19a31f416587407205dd32be4d2aa82
SHA2562d7549c76ecad8ef8291713aec887df13b5e3a84983f360fc4639453cbd2ee61
SHA512d2f55c211a03b21c3c0444131258f18a1bc71418747b8a40de5c597dbf4229f5afa9adc2b39391dd1d221b2c6e709a783370bf8c4c1822f84892cbba0b67bcf9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b