Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12-08-2024 01:31
Static task
static1
Behavioral task
behavioral1
Sample
8cc8d607b9c3c962e9b9b8434e0f6285_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8cc8d607b9c3c962e9b9b8434e0f6285_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8cc8d607b9c3c962e9b9b8434e0f6285_JaffaCakes118.html
-
Size
123KB
-
MD5
8cc8d607b9c3c962e9b9b8434e0f6285
-
SHA1
d1bdd426791add0b5f21939ab38fe7dd08f996bf
-
SHA256
620fcf6a25c36dfd7c3068e9a39d0c0c25b8fe82057fd8b52e6a18f58647cff7
-
SHA512
8ef3b85987a1af679fe9e5406ea7d799cf9ee6f44ef665ecd9624f69bad8d63e1aad1e49d2c725376f6b46f657592216c9698fcab92134cd993e0c2fa81af69e
-
SSDEEP
1536:1kiDyl32yBfiokExkAqRy82bklEqpqGjXAJcvKYYzoPOQ:vDyF2QzeoqSK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429588178" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A5BEC5B1-584A-11EF-B1CF-FA51B03C324C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf710000000002000000000010660000000100002000000013f03eccca7565b380a22ac34657baf25f33be099ca504174eafd9114e7acf92000000000e800000000200002000000057487dde018726baec502029220cb28f4d40f2729be13eb279f7f299aba82eed90000000643a14a002f4630948a7fafa2a2cd96b8a60d4a45140fd0d925b8121a0b11014fa0c7dcb7748a5f2da1652394acda4f4ae4ec6f20aaa9d6eb179d28affd0b08fb704253a39f7a0a13d5955564775cac273b0e0b58941d0acf24b416d4a40349228ea7d3b6129ca2294a1fc6aa2bf79815e5870bff267540af2433d4f587a387f3017189ee790427394b6ee36188d6b5340000000b8c3eb8ea63cd89eec8be7961cb480aabf826110eb3f20541b43ca422b3b68f27bb04c0a2d59e03cdacc7006ee9bd8b6fcac0e75a39a6ace1dca06a831833590 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000ea1fb75fef42f6719544cba0aa1b9de7912221c10e33fa0492879e07eba009bc000000000e800000000200002000000048fbb618ace791ab5d427b841045394e9e8782bcbfe6fd7f598058f030ab1107200000004c3b4155d103a561ecf96e0a5e1324f98c7769c9c7e5f7ec54f68d9008b8cef640000000c7e1c77d169a2d8aab21e6ba6141f40f89efad50298849d53a7ce6e91a1519b1c232a0553bd504f9fc26bc2472bf2312f27f0ca3d916659bef530b0cd52e5d3b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20c4799057ecda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2064 iexplore.exe 2064 iexplore.exe 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2448 2064 iexplore.exe 30 PID 2064 wrote to memory of 2448 2064 iexplore.exe 30 PID 2064 wrote to memory of 2448 2064 iexplore.exe 30 PID 2064 wrote to memory of 2448 2064 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8cc8d607b9c3c962e9b9b8434e0f6285_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2064 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2732cd8909814e343f54d3516b25517
SHA11d44b54101569c53e113c322df6346512aa9f7a9
SHA25677b8a8222f31dfa09e14ef4ac0aae647b0b93f7c6007acf1636f1e20f0f58c3f
SHA512020b1f74968aa7b2191b410f4618c8d37979a012da696588e5764da46c4c78c1d8c1f11d534461b0f7b37cec8b3ef0f7e40327e76a4bac29746f7b6f03e3292e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8bc65c3d226de1bd593082f88493c1d
SHA132c430eb16d4e74b36fa9fb026106455d4ab467a
SHA256996bf133827649ca4dc796414f203972ce0f105483d1c044d53a3cb7f9900fd7
SHA512b6ff1834997fe566c19a5005e84b873029b635d5e50fc3db1f30ddcca3f9306664d55d1efb4be4f243cbb77abf10c340f18012ec2ae885c478007efe6ac4a812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5538f5487171371e9846fbbdc657bb308
SHA18b0cfdc54786347fea2ddb2cd40fe06a719856fb
SHA256478ceef913a4c7aa4879b678db47a28ea8b05a6d2acc97d3fb576ab118400146
SHA512542440193e734d38703771b58a3103831c56bc7188db2ee64a92f755e83efd8a6d677b454effafa96a95433ea7830d36d9ead991077ded19c54b2416ea6b74c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a2512e085d72f629f6c5e7c716907bb
SHA1599ba867b5b7c8f28bd70f75be0ce8fdb3ed6e52
SHA25661190bc502f1ea02983c430ee5b2f967dec70c6dc294469ffdc42573dda012a4
SHA512fbabd591316badd40a719194b6ab1d9299d7215bce2b2b7e4fd8a52ecc81ee1439d3ea635bd13b0bd2cd45379726d7b3382c3e0c2e0e0e0feefb4d772ce20685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f275a2247cfd0d4821366b02c48cbe2b
SHA1989ae171cf0659ee95b7471fbebc328939c8797d
SHA2561502c922b88359b90bc450ba1ec2e76488d724c57a60b9493da3337c16f0edd6
SHA512dad4ecea71b67aa33d01c14357ad71e57e9bc0158e8a792cae5a81dc203bf13e47382cb2d5b063f5dc625411dbe268fd819d9e9be8a8d8dc6a4af6376562ba0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593c97895952ffa71044b53802c1f6783
SHA10e6932172d2e9376b8ad0ec4348b9e1f0e136946
SHA25682ed22e5daab4a0dfdef1c221be0d12f87821a522ebee96228681a03ac14d7d6
SHA5126d4b00b6f50ec4e2c7492bc97c8ede65058b5ed82d9b00df28d6ddeddb6597b005f1fb56427f2f6003b3bd3b10ad0571196a3b0aed780017fbfad429f936ada7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b94f6688e5003f9154268b459aa9ce5f
SHA160beafdcd9bb6abb9b15047e902342638fc10bdc
SHA256b19ecdc2a286b94d9eff0ba079fd7fefc9a9b48f78930715b3c0e52bd7a9939c
SHA512856ca74506634ae241dce4b117768e94ff09802ca99cead46deea57b207ead722b393507f58b4961ed1590bdf846a5d1b9c5dd04df0dad7b4faf2349ab00cf67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578e431ce4376fa6011724e3c36625de4
SHA11bdac169672677f3c8a8d2db2868c878ea6ae62b
SHA25607f5038ae015399ce90d2c5ebf7f2bdfd3edbc6b32773db2043ed68bb23161d2
SHA51299e08f55367dabb5699a6c59947e5bb1a6c13165dd33e5506b0205e63732a29a30a54be8cb400249287aa96136abbd4115f90b977b225fd005e302b61f1a36fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57caab4e32b446ddff3ea5541f6063922
SHA161d819dd53dad3128f83ee4c3d031f823e598702
SHA2563be5b41b22d8df254155393e4b2909105800c7bb2de88d6297251e1ccb4f6141
SHA51214cae1cabead53f96cb2a5c8fe6d113468cd351b2c29293e41c9dfb9cc068915d4d8c89bb116a01821e4052a1ed22b31e6d8754b28b848c3cd73e42eca48c8d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5342d668a0d45672b9db77b4fc67b88d4
SHA1401764fa27562e4316843dcf146ad61d36755ef4
SHA2566a83767d61ee37c24d030a4d9c49afb5c322f225373789295bdf1adf6fd78621
SHA512efcff52998b5664f4177e5eacfb38aa69603ab5b7c9121184095dbc561c86069a30de493081ba94f7bdd7df7eba5aff3c9967e0e7a61bc5f15b4219902045f18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fc10fa7dbd0e9084b802bb9620861a8
SHA14eb4db18a4c495091b23388d26b37646be5dbb78
SHA256962ae7588146bcd54760cbb54e1bcdfd3e83cf723c87543d7e2265564390d09d
SHA51293cfc8bc1ed94679454e8f942ea16fad08bacd841358441992610714f39577243b8d9cdbcae08e9eea7b58b2b29208e9238f3c747968815619889995d1ce28a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fdba3e4a3ae3878e6002e6f785da7ad
SHA1e3c29f07f19b77cadc77379e25f9435469f7cf08
SHA256c2e0928871cffc5f06debc25b226c5f31cd5144a9180aaf4081d1f4620deba46
SHA512f00fb692702a9d2d7cb6bcdc51d11e490f9fc56fabce33f655ded98ad6f36f83511cf313c9bfec81a802c6e2f86e26c142c28aa1f11d88bdc95c6ab3546a6e26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54213ee39e25b5dbf41a2dc7708ec03f8
SHA19fa19b76489153638d0f7c0780c867b56a759a54
SHA25675915343a7bfd4a611eaa77c3cfb80d2e93f404ffa1df126d9ed5f390a4a01ed
SHA51275d02802a8d034a2c5c8d6cd3e26807565cb243cd140c875dee5cd52c3362e04f76d2177777d97f46ddd7811aed4c2518f327dbd0f54738701af0bdd92488af1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fadf3c26b04073341c4462dbb73f334
SHA170016e019a6617b1c230f1929cc466f367fc4198
SHA256340ce55c1e5c553f23f33dd915a6b8042451f8675ce880c3922346af1c3501ab
SHA512d7a57e27056b68e5be88d27ff35e2f3f8367ba8f6f052ba736154be7983379b7f96abec9676aa81b217b35d26b3d39ee166b58a63c5d8dfc8069b07fa7144ead
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6e8d3077fbc95b3254aa5ba41b94d8e
SHA1065a1ceea76795559597f454b070e894cdda89f1
SHA256bd7fab2a4c5fb7d01dbe3e29e40e40e540a255fbb055b1350841c8b2888e1384
SHA512fa90f78683b8d1114f2c0d6f9208ec2308aacdb3cd4551f1e197519cbfa6acd25726c214a97e3cced25d485e11361cc78f6d7f6ee859e577377a3ab4206b6794
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55566350c937fbfd02b9fe662243d3eef
SHA1d01d2e887436e5f7177584a0454adf17fefbf864
SHA2565969eb5ab4c70b1fd79ec2f3a0930f8ffb7c97476e465909344749fa18b45492
SHA512e9dab22abea238998fc6a723fb3b9179af8806516cc6e1a2765073c96234655443c33b2bd0f882ee297984e2134644cf2e10f173356f4f4250fe92cd46f5ff35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d1bbcd2103a0417713698b4a6471fb0
SHA1e6b5fb2cf40876d8a6ee1dbb71abc146a6365612
SHA256c52382c335a0f047fafae311d2afbaf8bdaf98ff39d3864f3060223b3b238762
SHA512097319b8f0ce11a0fac4255ef03ef15e400b1c78446ef1fa091040bb010f231438090f7e2c802399f0b63768db9630fcaad80da4372fa0b21f26bd1547adc8f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e523410d114012a00da2e93e5251d053
SHA15db053618416ab94e0ae021f49c3c485f19f0089
SHA2564b9dfd9ebe69df7a169ae45d6377760b4d9e7833e7e02d560ed77191719547d6
SHA5122928157c46aa788213b467537c8e3a3d37304b28c3b7e6cd398d7c063fceaa7e1be92498857b6b2847497fb80b26d9da76fac77748a82dd70a08d404ca166888
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b