Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 02:17
Static task
static1
Behavioral task
behavioral1
Sample
8cec65fecae97d7a55151102023a20a3_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8cec65fecae97d7a55151102023a20a3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8cec65fecae97d7a55151102023a20a3_JaffaCakes118.html
-
Size
11KB
-
MD5
8cec65fecae97d7a55151102023a20a3
-
SHA1
e22d5cc0295f3455ed102dab13d7c792ab696663
-
SHA256
d269a121fc9812794a1ba2e5151a868398bf37c4d413e3fc53e87b19ec85d610
-
SHA512
2450a8419f0af946334335ea3f64242880bea2167dbc01dfcc4236b9626c44efc247a13c2c17aa2b406522960aed71a01f285543ceb01fb92cf3c98f57dac62f
-
SSDEEP
192:2VGlIsr03yX8k/w1wvqyXBxon0xzKMX01bAuBuLbdU8d:sGlIcuyR/gcXBxon0xzKMX0bAguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429590894" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F9279EB1-5850-11EF-9584-DA9ECB958399} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c02a98ec5decda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000087c1b5b4032fbc13b116ee0f7d99e0f23f0b56eb3199681acedd4a5c206eb4fa000000000e800000000200002000000029d67842c1e16af9e1dac4dfe54afe9ba635f1f46204130ee5f3feaf80435f60200000008832761b51c22766ca4d839082a37ada8adace22172faa97b8d4f31a463aed8d40000000d8b0fe109c638701dd996eeaca1c326bb75bf45dfecebafa457361f4a010024740b9f58ff202360bea1f4d801d504f334d9f05b23a3251b763a3d5821310c5cf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2480 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2480 iexplore.exe 2480 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2724 2480 iexplore.exe 30 PID 2480 wrote to memory of 2724 2480 iexplore.exe 30 PID 2480 wrote to memory of 2724 2480 iexplore.exe 30 PID 2480 wrote to memory of 2724 2480 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8cec65fecae97d7a55151102023a20a3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2480 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5784223b4a246368a1e6b00ab61f751ea
SHA138734e5c06fa975ceeab2e3902b824d1fede9c68
SHA256e5a8845cf1d0bacead1b4e050461f8208d1d06f2307d172c35091070d79f2e5a
SHA5120308a38e568262270b9346d9aaa217703c95999c1f0940312b2a447e292d0fb6fb3e3c6fd0306ae8101c553814f35c3647197ab27ce30c8c1b8f366e55cf0b4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd5e7847d12f9a90f0dc74a5e42ef03f
SHA16d058ef63c63044fbf3c98bfbdf0dc7a67f75908
SHA256abffd6f75894d263ee70954843cf57c27df53a85a4a18b412c1d0911fe24598f
SHA5120c7c3138de655e4471c3270935e65734452935977c66068386d84c24f55025f5a23b197a7753993d58d1eb8e3306a69603a92f9a558cd5aeccb196971ce274bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee4af772a5ea0a5dcaddeaf3bbb78cc5
SHA14b8f33f41b658d1d4999ab6241b8c9ec5a2a2202
SHA2561550c926c6b2dfc0247164292e600d409abe6a79ee8087b57de79aa1feeb7ff5
SHA512cb572542eb7c2a5cdf5b425432f5739d968f3d4c0a927e3b089b2c4ecc3b7266832dd6942486fb68d55331fec922b656542dcebc6666e495f98ea60f6d130947
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598fadef37ea092e07ee96bb76233382f
SHA14f778e3a16d933ba758a0a8db08200cc62c1937f
SHA256d3b8ccee3d07964251efca52b2459b338ee2b10028bdb8850523021f723d3ea7
SHA512187deee01894304c363244ecbc51bfec609c90e939b7016eb258749729c4c8acbe6962eb5d202ddfb143c2edc644b702ba1f49d6a4c933f857c761a2bc8fabeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556f19f5c3e119a0d2510f3e48fc2df33
SHA17f43a6dd8d07c2973b6c997f3a1b86cbab9405da
SHA25677c7bd6ead84f976f365008740a5cb7e7885b4c5f71548aafa905abeb22c0b83
SHA512b1d55c13f790acdb4a12bebd8d8fe1ca1625f9d87a74c1b689ce0363cc0696d93e7ebe93b98b4b86a9c2bd491fc52f391f7148eb2c15c9bf14885ee62caae836
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505de59222355019c89b226dc3095eaee
SHA13f73a5659c7e7ce31440a20e34b639ad9252535f
SHA256881778784c0faee4e3074cc62e96b25580b5bf4411218c4d72f437f8a5f96e30
SHA512a962cce325e12a448276c0d8d40bcd0a7ba6b8f8b1535ca3d6acdb65ef155b4b2a0a32e03e67f3fc6b1e6119c4ca176f670e4dbe78c5a5fea55f218b36b986f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb5728e6458beb23dc17c1c86c3993e4
SHA164a79f84bd602f017cb131ecb44f658136acb9c4
SHA25696e26a2494053b646600ff998836ffd148413666fc5b4cebda0d1c40e71e3857
SHA51229d2462c74a837d2570ecdb54c9b1716eff17eccf7018a374a4ab3122a135bfe10cf74e73cb0c8c01657f6229f85954540673ce4cb955d4ab599c79e3bf18f6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e837b5abc0c710624a46467ab0c1bf3
SHA16fb1d9c6b8878a04bda853d3518642b2056af7cb
SHA256c01cb0e3c7bbc19dd494a46e92f4039e2ce25813dec6d298b377e1a5ab45bf26
SHA5129f04b29757d9244977adf542d946e01675daabcd974430ad38bdd2105499a9c62bf0cc8b840e7feb1690863a2edb2635c0150229eeb37998c84425e80d7fcfc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7a72ee85685d04c8808af59ebe0c4e4
SHA155b9ec9d18c532fad2129a535269ddf6b96c8d63
SHA2569f20f7c9ec2a3f992548658547a9a8e15bacb960390006de79dcf02f9952a49e
SHA51282603c9164b6ef0e5696a4d86acd523700bee110d946775131727b192fb73165c175e1ab2d2a071f9de78822d3a61caa155ff16ecdc48384d448965bcc1f068d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5634c6654a861cde19b48094c7ec0d660
SHA14d719b421d81cd1344aeeb7c56067e5081a47a56
SHA256b5f4a95be319c5f0a2e286c24128d63506ba5f7808c695474985b89109b9ab0b
SHA5124917204bee3150aa71c3a94441507d445efb10fa554679fa2d62c8155a387c464f3e9a38af564775deed243efe060fdfae6195a5def60274151bd0e11c01b70b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596d736b802a773a7962edebf63fedd13
SHA15275a47d3e521f3bf6f877c832941013daf3af55
SHA2568ba8eb4ee87f16f7c435bdd23bb618e60683c742aab73fa7624a4a93cb164ca0
SHA512928a7c783456fb858486c0e931b68b09f4d5438ae7fa34697bb6b232db2670cc892495c5263e52d9a1c0e2cf979c6e4ae6d7b14ea6347de85b45ab3b1109cb22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526577df705d7ed18931656f5fd0f8825
SHA11e3ba5f42770b0a80f89806364d42e62f27a7ae2
SHA256ea7655aa6e5bab8e45360ce454b740cbd6b12a8e6139c3bed4eb3874de7559b7
SHA5126026aa78d15dc0dcfcd626f347d178291ab0751669ba53ab98fec235f17e15e5fea967e57b78fcf4dcc38611ae644a440ef4364fb823aaec39b330b6ca9a5603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d53d189c8c28ba29a13613b5bf61111d
SHA1015d2e3e11775943f078aae86cf32215c01349b4
SHA256e4577bc27c848cf7063101b55c8ded19b6d97011a066c7524008120a0fb1c3ee
SHA512c8cc56d55120f96fbf71b5b80929d66d37386cb91a6c0e2b5d691bf0fd8f4a119b3ca5723d785b0ab70f7734ef70481df0097712a50a3039b3729aec9505aa54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598550e8feab13f11d048a42853a491c5
SHA122f0855d189f70b94037a87b710fe04a019f664c
SHA256ada62568f0888fc8b5ed12d4f0e77709d48994bc2af1b27facb98d6be2d44909
SHA5125192e4176e0bd7c1103fd6a1a305c313f841a531231f297bb1e3a2735fdaea29d5fcad5b8a4cfb41f1fb33e336381b7429506b4731a82271e3cfb3f67a84510d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5718c0508bc05fc70c113d01b27e16719
SHA10e2ef2f964d5b9f343e94300f0b693d67da578a2
SHA2567d04d91f83e1a8a5bf55566c8d7d606e3e7f8fd3d5452f77ad19648aeed961c9
SHA512cf702604c65ba12cd2d0f9ab2851b951252ce4570f5cbd1216e305a9b1dd0bd8680388a8f09fd4f370ba5e88c6c43db8b4ca1890ff91732d6a391bf6d3b7d4d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ced379635a555445c8a776684e09a68f
SHA15a426121b7b1b2092265b88dd9b36797fa7197a0
SHA2569ed6188b69c46f6e093a40b06daf32d07d8941f6e3e85fe4a7fe2f58c6e04f55
SHA512777b36b75f49919e16f95c542c250873ecdb494ce18f42de3220c742d124fd661e1e673b184bad64ab1ef43a628de5486b0b526783fa5ca0b3269e9ae196b0a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588a6b5fb9df79b555ec56fbcdf6d10d0
SHA142a1a9eb8c27dda958a3d06afdf90d614078bcd0
SHA256147ce9f9512c39d094b8bec0294c0a4bdd27f9f33db259de43d95f4508f3d4a5
SHA512654100c84ac38b543de7fc2b7d3a5ad428d3f6cab4021f1d3ee3895a247d89dd8466f5cb69782a5e0a444be238977eb7438e2f8fa77c9640e957d437ed8c27d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591ccc2493b850d5e20da20d690d7744b
SHA160dcf879c965c4e9b9fbf9f3b364edf0d2e520a6
SHA256813fec121a8385a4f4992f3b5b8a12fa22c0f420e95b96e068b621021a3cc1d3
SHA51283c109e46d455d5c895421b23c0a2f100e87fb85c80edeb5f0c7b4c5db6800eb49d237586742619a705fcbfe4ed00e08ba2c62b0489cd8ad8433eb33a021017f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f8d9cc0c9ed03ba522a27bfbcd0136b
SHA13eaefceb19a348bc25068e31d451431a3e4fa2ab
SHA256a43ea2131281d73907ee9a94b772fc5b820a1deb38add3d8e857b6d147d8b14a
SHA512fa05bede8974d8e0d471a0335845e972fd5e069081daa29768c9ab711f0395ce6e45a65499160c1dd081220866ab779156f7aaa3b23b9bf18e40b63a3fb0871c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b