Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 01:47
Static task
static1
Behavioral task
behavioral1
Sample
8cd458ce7b940af0a27845ed5b98a680_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8cd458ce7b940af0a27845ed5b98a680_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8cd458ce7b940af0a27845ed5b98a680_JaffaCakes118.html
-
Size
44KB
-
MD5
8cd458ce7b940af0a27845ed5b98a680
-
SHA1
46f8eb79255b81cb582ed6a1ae67bf1787850316
-
SHA256
c372b8b820a3f0d0a7df4c2bbac6a6eab8c690a2d12fa9ed80410c3c3b648df0
-
SHA512
dafcd46d1771c34c68ff59869748c5017a01ee6f2e686d2f9df3897458f75cdfd2f75fdb364a4a33421a1eb0d977c986da9e683bb068d4d7eb335241f2c86989
-
SSDEEP
768:S0yl4WuFoSJBwYWvwWs3nZadNyuyiyMyMQDZNxIIGa+sAX4WpHrJ1CDeNQSUipsa:SHLnSJBwYgwWs3nZadNyuyiyMyMQDZNk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000ee3c93506b6da5bae061c407c729c34bbbf2c540bdd629d6ddf2e490180b97fe000000000e8000000002000020000000b82002ce4f83e44fd2d6b1846c1f1d558eb0623c64bff6a1e084f78ff4847789200000009dd8658d618822ce1ff1e4559518718936502b949e4686ad0892f960dc7de262400000001501982be3a7e55cddea2393622acf4640836d4e993b42bf1fdf2a94e5518a30a4230bb990065e9a14b0001b1c289fef66bc6a535bb5949e4a8589be85478927 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C8E471A1-584C-11EF-838F-D692ACB8436A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429589097" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0bcf8b659ecda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2732 iexplore.exe 2732 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2732 wrote to memory of 3028 2732 iexplore.exe 30 PID 2732 wrote to memory of 3028 2732 iexplore.exe 30 PID 2732 wrote to memory of 3028 2732 iexplore.exe 30 PID 2732 wrote to memory of 3028 2732 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8cd458ce7b940af0a27845ed5b98a680_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2732 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7dd85712c6dc0f0287829f219481af8
SHA190b2ff9ce84b055987b377a501025f1884662d98
SHA25659f6a8b868b84d0132dd27fad2860725a908780088f33b74f6426210c11a085c
SHA5120bc112f2eeda14184266348d3d34f493ea2811a0602002fc711952e6aaeaeca8f090b023121f7e83473515d801fbecb52c935866876033210a225348b8d15801
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d46b7d50414a935bd70c4ecd56644356
SHA19264f35e3b2bc1ca52a13e0dea976e2474808052
SHA2566cc2bd2ea739330317c72a59c5f0118dee4a98d817642a146b770decb6897001
SHA512016b7033e059d47442f2937108549ac5b3386514feb3c460d30de0584fb9257997353e171d2a0c317e66454a378f5939cc748d58345120601a1762fa76a03503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6cb31dbfb51de1e4b95649e3dbde147
SHA1276f4e650704585ba054f91dff76fec638a2ac8a
SHA256671772de4afda05a99e9bef203634e9ea852f4d64dd26cd646efab7920bf3e6e
SHA512d83a8f23041f00f09163d26b414c5fe9adbe1706291e12abaafa0249ac05028fa171a9580ca7d9eb199c22abbc2b85535c8a194fe0b7c1dbcdaa1a585e6a9392
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521ebe4f8689d73ec6b115d823aa7d641
SHA171e648572a012ae82706058159ee15436b7574f4
SHA256068435fcebf90fd33b542d916a34009944c50bb1c2573d614a901b24fe9f6f41
SHA5127377a6463c2308288553feb97d5a693787db620680b0e957204ab0b4e0feb88235c50bbb71870e676c0516d4842f7a7a2cfbcc72700d3aa7696b371dc17e2813
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da65c69a353b159ef73f6e083354b6c3
SHA134bafeeb5496c2e5e5939444449ed80fb05ad048
SHA2561d0a2e0b127d4fbe2b4443a11554ca85f9c8e9ab18c21a4419cd47b810dda64b
SHA5124f1119cfcec049189bf834d3385645859054e0c2ddca784f473696c2a601703d6a7a50395f0198c34e76ceb8f028328233f41fd7ffe93cb585a41c989bdf9817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e690afb729768d7f841c6f571b58d44
SHA1886cf10342384a93c8214cc3f8472051a6ff5d32
SHA256308d2f48798d6a7cb145127fa2a901cb1ca69179b7f0d1aaf85aff4c752bcd0b
SHA512ebe12f2f89e335e15bd6af9ea0ad77ba8f7daa9f1e267f31075eb9f406cb2ac4536f585aba1e5f645dadb8eca17381d545e7108ed58277cd50c167ca726319a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514f376c22bf5286104e695e090ac82b6
SHA1c0cdde00db4fb2ba9113e3f6f50b2e03a1427ab8
SHA256cb3526c29e08d5984eb38020f3323d54541d7e670d73b83dbfd95b859d76fe7f
SHA5126c671a43f2bdda3c3469e58104a806b1a0fee6017d9f01d338549917c7ded6f8d97ef32739a2a14c3985ac93f3ca3c9093a980f184d3fb64d326d583c074a48a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556c31fb2ea26b0772bd154cee8ab25b8
SHA106144d473bd6feb725a926918d205b9ae2a72298
SHA256f05a5c086be04b42ddd77d504eea66da545c1252b877b8bc253beefaba40a784
SHA51297be7a295d7b85be39f313f7073680a9004796f45f057621806900dc428e8eb95b6970ef1fc42e6ab63f11eb07c747df91f9df7526b8ae7ddb32325d0b188a4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c705f64919e9f3f21c89b416571138c
SHA19d048e75e059c8faaf0a57df09f424784230c1f6
SHA2565839b8f055e9bc05cc9d57bd9c4426a9a6f2842bc704741f41009b1a15715364
SHA51207dc6a864ec8546553a85ed89dc9c66655cfdafabf9d06474e9ede40e23b9b83a6061507e70ee0e3dba8f0ebaf082a7dfe377eb9b6612910c6e1ceaf69e555da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2bfde2b6242425c4d962d82803cba48
SHA130762a54716a40371682deba42bcf240469a042e
SHA2564bd8a813f92525a3c41be18aa11ee6bddb0743ea0e26412563f7e4cba8bf4a2a
SHA512d58eff4c6227aa2f4ef861e215244c7f4b39a86d0fee733c1752e90eab153b4a06f0729e5f8c218c0f537d128b0577b42d7482d3f41f40fa935a435f8bea1fc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc428adc84d73d156a950805656f8048
SHA182023b8477ddf0da80e39b7351ff088ed591f354
SHA256f890d294be525c98d1da3d0005266dd863d4c90f951aa422bd91698bbbc10136
SHA512270c39b5b02ce73b09cc903836b3207283c07858e53a98c837148bf250c9781e8253febb519fd9582ac4bc8b96e01a669aed0bfb29e359601930b90ae3bedf3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c766f65cf67790a510007ed59876e015
SHA124ca5431a8ffe7ec0599e7b526a2fdefbc1896ab
SHA2569acf5a845ed440655380a59567ae525ed6c510c4ae3a06082abea1f44c64acf6
SHA5127a7863d461a0f7c3a521f50201596d29777f5da9446f7e63e50f29e286a0f8f837826401a717c1acdbb04acffd3c91c664c0ba8c80a1f5ca8f32f7633614e532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f5b360a379a538f638290a0e80c7b7c
SHA198000ba4903edb0cd6184cfa8246cc5516d28b27
SHA256a6c326266bf1172e6ff23502d26751a0ef7d7df5da366bac892dcb9a0db42cf2
SHA51217eddd479203e3fe4f11a957770c95138fe88a4ab842186c14429908eb3963e2e7e54bc8ae8c2ad60b7f75e3c929acc5e787146b92acc43d470a697030cf566c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538e4537a9674d33151a225f7b329cd61
SHA19267378cb13070dd44592677453c3ba5797e264c
SHA256cb9cced6ee271c8825a92488d9641cd1944c14eb435aef3a2ebca421cc097e4b
SHA512ab4367b3f6a3a0510d30377221e3e8a94c32b7f341465d9e5557c30195fb2a5fdda9cd5240824e4b1a745fe58757ac31e26328dc956822922ffc63cb9ca751bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ed6ba2e2cb9cee5ea6b33f38c1ffdc8
SHA1ecfb70d11e8f9e7f0fbc499bff13de9c866e1b35
SHA256b4a9ffbe7420244de5f0adf02f64e3f0341388abc1f63679667548395b73c6bb
SHA512ebbec5e5843c352f1085bb49ba9ff9f0d461c39d7c8580a7aba77b7426cb1d264bac7cce0aa2cf092566ffe8deb571cb8c3f01b67c53dfec739f0e6f40dda65d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576f3a30128ce181238113675f44b4fe3
SHA154f6d5feac216a1d6ecbbd5efa8d33f4b249d113
SHA25682a5b4f27cdca71cae6a177857f8cad45eb53198b884236dfd39b651b9f0f2dd
SHA512da704edb240e2e23741a5d1037ff5d17f30a98af97251ecede073385a071b651dd847e4d1fa295c8343d19646ebd508918e9dc421825aba37267ece58857cb3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537e58b6dbf57bc48d7f896eceaf54fbc
SHA1d5c2b0b5a36ef123e881d2ed1f1402a17eb38bd5
SHA256ef39c96b0216749bbc4b56944541e5a4306b64552f913a1dcc08550b2a6de28d
SHA512ab60e94172dfb46ad2dacba495754bc9096827dec130429962d72ca657b47197fc8539558b5c69cac18c5486f3ece0c6df73010fa5f9b30cb0f484a550e34b34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536a34931f8f6512efa01c284ea9e519a
SHA1c5f88e45a4ab5c0ceae49add42accccc2e0e5219
SHA25648bc89ec6584c9892acaf08fe7bccec9623628a99e54d6653ca312463840be7f
SHA51280ada60c9776f818ef72b7ed2df606973afa2ee2b39ae658ca2681c942961ac76199a1ce5da0219aca85aafca2cbdb44ab08734b64b41c28e7693911aec3329f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b