Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 02:42
Static task
static1
Behavioral task
behavioral1
Sample
8cfeecf9c3ad7d8e1a8f111710760b9e_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8cfeecf9c3ad7d8e1a8f111710760b9e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8cfeecf9c3ad7d8e1a8f111710760b9e_JaffaCakes118.html
-
Size
14KB
-
MD5
8cfeecf9c3ad7d8e1a8f111710760b9e
-
SHA1
df4403dc56d19cce30db6902169e9ec8e85322da
-
SHA256
14f2fb4263bd4c3de3fabd8d5a3ae619a66b0a2f76d79979ce3e1c332188c4f3
-
SHA512
316898d9b282252f782d0ff45e5a1381c700196eb1645d4936b7077f9f22ff3a41763b3afde4835b33db61ebd07e363d5c2d6f0c995fd4bfc8c2a3d697436216
-
SSDEEP
192:EseLcw69K2/KG6sge36JSfRYOrUHzYihaXuayryI8Kh4j2tHR:EhcZdOsge36QZYOAHthaXlyryI8YueHR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000002d723012455c2eb57599ecc109ef262b0efb90079805f1f825c77587e7cd471d000000000e80000000020000200000009640a53acdd5d322971f237ba8cd234e001fc0f53dd824b8fdd5c340a3e5522320000000a08cea3c81d92974cedbe9cb527f73738767331238fdc75f15c017527877bf7b400000006135357e8ba8862be8adc9d4cc4f883760dfbf9ad9d94c12bde3d1e45b74369d03274a74ca70a50f29b978117ac272642a0f898405c954ae943bde8b0dc35e25 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7EFDC481-5854-11EF-838C-C20DC8CB8E9E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0c1755361ecda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429592408" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2560 2088 iexplore.exe 30 PID 2088 wrote to memory of 2560 2088 iexplore.exe 30 PID 2088 wrote to memory of 2560 2088 iexplore.exe 30 PID 2088 wrote to memory of 2560 2088 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8cfeecf9c3ad7d8e1a8f111710760b9e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589874cf758001eac8cc054f3d6108d51
SHA192159af2f113f9ab58c8eecf75f6cb7a2a9999d7
SHA256b243392d91b33d1a9d0040e293ef768c0e3153441f8232b107714d9df7500476
SHA5122aecfb1d834733c3b15759e2d1469add9b802ff5030869d9dce8c4ebde583a6917d4390fdc3a3e84b78adba725113974e17ac7e7124eb16ea3aea00525a314dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f866b012cc005b1b8a8ad1ebbbbb0f19
SHA10f0799b0cbf4efa3882561a2fd91b5dccd332743
SHA25671fb31ba44dddfe00eceb91d679e4d53f542bb7204de111d262555d3bc3040f2
SHA512488fadc2f11f34aa4cc2c2eca3d83cc260f3ef20eafa351bd65979108db14bee1a3ae8d28a8fa4ced73986f492a7a16cbcaf914858e201ed8c73846b7b740597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d48305c92f20ed984de0d811cf41e50
SHA1e9369ecb64c8f49c5888293c0024407969a440a1
SHA256ea0a0b5a19e2dc928f7c773c0a10e76f0b63ef6a08a59eb8de0982a17ef8afc7
SHA51294275b006ffedde3a342c62b9dd20fb80c5c8c216555bc6248a26f99e78e058b9a43afbec7bb197d3a15809cc00e892cb5c6bfa28f14963bfbddbebc8e281e07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb562e7fcec731cf937ad9e3829c8601
SHA1e125e0a2c3872c0e09c3f062c584ea270918760d
SHA25608f0e6e3df6aa8dfb15783de2715c7617bd87d1e004aba7df0f64b339661934d
SHA512c2a1b67e3d649043341c46a8aeece1e035dd77fbaba229e366a413340ce4051b9073700382257cede5002bda73a2ca09e5c4efb50d8c39bcf878a38116d08de7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5856acbcb4e7b082443175d0eae9ed572
SHA1e6df3401dadd2958ad590f76010ca7dba351c3c6
SHA2563e971884b17e9ccd98cc1ba7b6b2c1d74abf9de188a91a83275fa3ffcc80ad85
SHA51201b3e11a9c5a732bd5fc7e9540f7e0dd4cc50718c2d2954d79c1eb43232eaf9e90063a0d3a9b0d346ba9044e9a2222fda7850109b16ee157057c426916377ffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53575072c8574f77b4ff0860446c88aeb
SHA139e42afcb1be40e4491b332a233f6dc5ff7b8539
SHA25693d468d4323cb4a08ca0157dd8b742e4131adae47242b85e05524609b1f264d7
SHA512d673702cd798f22aee616cc1d55d4625e656f7873a63d26e5eae9d18ddb086aef0acbc6e9ac6dade6e352374fb8f22fc8e3048a605770fb54444b3c7ad90a461
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f8df61ebcade012993fb1f34ed380f8
SHA1bf11e3f47512514d14c45637c107e8429c74dd4a
SHA256115acbfe45c1f4943390a221ef210476f394f7bfcfbb875a1ef1544aaef75abf
SHA5125048c6529529656da0d37cfef2eb0463d3f06200d8a561a4be6752526dbdccea7d46877c74c05ad4f5464aa97405ef32d8fdf1ced7748d8697e994853e1f69f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f54e0e730559dc5e82b5bdeb02c2e4b
SHA122b3392967cf2097534f62178ebad695f3e48269
SHA256693dadb3dfc9c418c0a28f8280ef7672c3c418c09e99368256dd7191175f71b1
SHA5122df259c6479a66dc275d6c32ca504cdb8c98e6ec0697601cf9b76d373d7a159b1aec9dbd49c8f4bbe6dcf9bfa8eec5b704445dc3fd0411e567520bc09adc276d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5682944a226f18c6eb1c26d0e528f0683
SHA1dc511569ad4bc76e773e366977439f6727919358
SHA256a83e008bf66f102314bf86a24b69c4145f3020f0938cc00e5e57714149a78e12
SHA512da25c9d5d4d59dbf6540dbd5b7df008f9a11c3a53f68e4b23f1c78ac0cd338db3137fa465f50a25ae5fd573719bf9afe4aeaeb3d766061320911f699f057d614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e78af3e5b5ed60cd18534562d0984dee
SHA1c527aea7533690249710e53b7bf88357f4f89d1a
SHA25675892389a8742686e77ac11896cf9e4051d9e299b5473763709253de0b737ef8
SHA512d2687fef9a8e98d860e8187c3603002d1503ea394ee78def7b77bc56f9ad362e1a5861cfefc00bce1f5e37fd9ed96e5049825ab9cc928cb9494d5660d12dae3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4964893ef9068ee894fe994336dd5a0
SHA14f3af0cc000bedf6d60aada4fc6e1d9dd1e14705
SHA2565cb0d81f1f0127c63345bf03160dd05255be5fd5b2fd18c132d9c4d33d1d48d1
SHA512e177ed6473f104b4017df9f1e084b932d68e8d8d111b07fa651321d16c4375b5ea3ce618b47ad4fd46db51c0c8c4392f43851460584d33f6dcafeefbc74ff6a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b36438d9533ff222315c7dbc54e78d3a
SHA1a40f8a961a0c25e36150f7dc8158cc81d7ea5139
SHA25670ac95273f6df34c17ef247e16d099290c1a40e3569a633f97b269570682e700
SHA512e57dc5a232009592ea2ce4625c431b558dc60d57535f9ced964ade0f49d08d3eace3a0a7dc86b968494f3f75ba334684269d799a248e91db2d4ff8096f7e941b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7730ea3b06b5b4b1c927eda452768cb
SHA13705413342a3300f2bae1eb41cf16fb61d297d7b
SHA25639febf482c344f61025b3a9276d74d9781105537ecedabc6bff0a83595e96ecb
SHA5123693b48a5c06564580785057d701ab7c9d8b9736f400610c410f9784e81f760486443bb0cf71f7a10ff2d3561ea6b74ba924bed7cf6a8f069f3c89841e6886c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa1484d505308c39201dd2911204196b
SHA1262b1d9b66d90a0db38606a05b3ffcf4320e88e3
SHA25680668b80929b5d6ebfe91a33fac5e718d0b9c6955e9874342056da3fbbf53974
SHA512bfe04e81fac6b4b594ede99745aa8a5de18441ab0e5cf8bd0c25112f173f26b15419d6215fe68481d2d4a36684e45c47c2c908073742521159abec55c65c7c36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b55dfd5a5451849be664cd9faed4546
SHA137cf11cc84c50a958231f6866d00089298f91d56
SHA2569846ba7da497bc2f232e2fd2efa0c4e9ee883d4916318f4a1d17851dacee1ed4
SHA512746915e4483f9027f2facb5c8707f0671d9be77de11f0428f2d7a70cdea0f8a08434e172cb51a21a21e9d6619b9682ea5449d54035e0fc8582d1ab2eda94a2c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51423da91d973cbaf8c0c8175aa78d221
SHA19caf36c6edfa0d2fc6063b131dfcbbcf8db56633
SHA25624289b2eed68c967b5147f76df27971c28c6130a2dd2ae3f4d4e92ff0574fc41
SHA5122c509b4248f843e0cb156d12d5a75907c65f55858ec848aaeb2c3cf20cf0bdc74089aad21506b3a63054afd10ed918d5f4cb36e8e2faa70fdda81b1d72fcd7e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdff4ca64f071b376d8a34599a2e0b62
SHA14c4ebe8899712b80be6c9196f83881648914952d
SHA2566c03982b50a208c7bfd723ac654148530f278642c634cdfb6d88eedb32f9cff6
SHA512f74a58418dc057d3c5a0bc8b0d1526f5a360afd6dfc59dcefd0c3384712bc88ac4daa50127e52d4620ba3c5f436356182aaa5b73568a7285ad39a07f306f0aaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbcbd68b904047d6bb2258debfa8fc4e
SHA1a96f5c24fe552c42e7a6c3974339cfe602cca23a
SHA256d66f29f92d5f6d13120e6824c506a9742d57250b4ba4305878eb66d3996a86d7
SHA512e1ac012e86c5b24f56af28a19a4ced16dae194e87fa2f93c83ad99adc0a80d559013ed96e875dc8e116bba39d16673257b29f421d5944fe0569179fc7b8475a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7986bc23eb554bc7ead6463b8dade91
SHA186882e0f73a50a0547a532544e7856c85bbf75e3
SHA2567fbff44d1f8e9274db9c074d450c936d1d32491c1d4b513df50c6a03fe7e52b7
SHA5128c5032c00a1dec2cba6889d4661687bfb24ee9bfc47626928212aa05eea94d6ca15d3933a914120504d235a95fd0ba284b948d3a9ca5763bca900746b2c30370
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b