Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 03:02
Static task
static1
Behavioral task
behavioral1
Sample
8d0ef475a87d439dbfcfee26f2437428_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8d0ef475a87d439dbfcfee26f2437428_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8d0ef475a87d439dbfcfee26f2437428_JaffaCakes118.html
-
Size
20KB
-
MD5
8d0ef475a87d439dbfcfee26f2437428
-
SHA1
dc9e9d264ed2495f19fae1554b7645a1fc2ded11
-
SHA256
2e95da9aaf82f96ccd00cdba45b216c6e59242c847592d793431d12d939a7b66
-
SHA512
fe0f46ea643f8dacb39e6259403c4fce4a729df55eca81fd352f3e3ec8e82389b921b34bdd429294be57d690d541c908d835baaff0b4a1de730c673a7f156321
-
SSDEEP
192:Vf5cVZ7oxo6wLd5H4ba08EFhI04YLXWJdWZSj0VuPfwHsiXYjlgneLallUI7bYQJ:B5cVZeKReMhJdWZSj0VuPfV1o
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f0000000002000000000010660000000100002000000055739e6da9d6a59fcd154748a7d40f96507fee513fad88708e23d96548ec133c000000000e8000000002000020000000636979bc62595b80ff0b3314180403da22648617edfd75703ccb03fbeb1bea2c200000000d4959272e4cd6a587036a0ae7309aeaa3dfba1f62b7fdf7a26c21bda1639a0b40000000948626602eb96316cb23e6f4eed245b32690344a0a13f7c51031d252e79aaadf4503abbc0bbd20a107713c7943857675d5b355701dedb166f65c7dda0b3370e9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c07fa02964ecda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{532B9961-5857-11EF-8153-46FE39DD2993} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429593623" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3024 iexplore.exe 3024 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2540 3024 iexplore.exe 30 PID 3024 wrote to memory of 2540 3024 iexplore.exe 30 PID 3024 wrote to memory of 2540 3024 iexplore.exe 30 PID 3024 wrote to memory of 2540 3024 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8d0ef475a87d439dbfcfee26f2437428_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9eab5fd85996b88f26e4b05b3697218
SHA16ea48d093cffe7ca92ec2d8ac842cb60edf9923c
SHA256e1ba650b52db869fe95d8b29ea3a44fa964b160d33a12f9af583e5835a4ddec4
SHA51287e1c7549a4429160e522f5796c60ed6993fe2a3e939ea2a8a1e349cea853726b5cfb7f443188854c1227c2189ce6ac6af82c607294b74fd1f59a3f18bb20526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7a0944ebe81e795cfaaf70c4f66d05d
SHA1145f90439700cb0a410cec18d16943424596014b
SHA25647f7f261f4c8e2536a12b1f7dadba2f7a9479e98464f6b1580a41bdaa11b693c
SHA512aba649926c7548c03da17bf9f433414a25c0c662786315801bb49a11487f7a514741d37be16d86e6f7980015ba77bdd89db71e60fb05414ac4aee98c6c31db02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ba1626e40c4f5016a108ccb4bc5de34
SHA12b12b86d9ea87209064b371838d53c9fcef873d7
SHA256e805ea9ab48304063bb3a74c0c470af053fcafa54c20228ffb86d82a7226e04a
SHA5129402f1f6e48c177c9c4713cf6e318ad9044059be4c18398c6c6931c25733f83492033ec9484e6e437beee58e32a023beb8aafed1679bcca4f4899e5d2a12c070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaa3096a8450e17b797a622ee1b6e6b9
SHA105c62b0188ec59b3b234c913a4865e3fd29963d4
SHA256fba3e9a0dfecf875ed0b751ab7d4f24301d017ba048a5afa7d6259225098bd85
SHA512ce5164d61bcb492ae373ea35628a8b15a609435b9a904f72f35ab61dedc5e8b76ad4b980a2362abe7a6a4cee523cd2fdb74bb75fd67c3948ce0101dc1669c939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5677b05c48321a0d541cacb39a10ef126
SHA17d4e4d662c350264a314ee266b963506e411487f
SHA25618bf08aa0deb95c3a725094894b4e32458e5c85ab8d4d1b88d963e58965b2bbe
SHA512feab9ce0b44b71085fc35448c0b1fb38f10f6c865be0375b7de669542405290996da85e3f41af188ae50d6e4d4c31fc36a2c0c3633033c1bac13814e4ef193b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f36669430075f5ed4858532cfaae6722
SHA14e916c12afa09ffa4b273ab1eefc388115bc6c2d
SHA2560faf7123b0ece8eab16bf9780433fbc8cd18c8e13b47bdadad11f46892c1cac9
SHA512eff6a93eb9280f92e0f4c8ecb544636d8122ebe3463c3decaf82923f10ddd56c99eae30b0c78ff15d53847c191f62eed54b5f04fb70c17df7c60f48aefa0d967
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597e8c92d574ab0f2e67fb5590eeb250a
SHA1c3dee3c051a8b19e2561930fd75417ae9b1695e4
SHA25617054745f2de94a88416f1676568dfdd06b4d52b55f2dcdeee99682c33658c9b
SHA512fd462ef5b4d9ce27b446aee65a021144cb3697bf61d504fec402399ce947a6379de48ddef8f8322cfb7524fbd0495b1dd31aa7f0b6b0288a94e92674e796da72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52353e16719bfe14b75c4dbbc58bb4ac5
SHA1725d3a90cc82bc36aeaa05899b85a33c1aec7af9
SHA2567e465d419058ba31c09530c13dfee8186dd8ccddca98791b83a71b529dbcc1dd
SHA512f645d1a06e6b0ede00dc8e833a9e2d795cfab5ccaa5800d81a790fc47a31c077a1850462c5e8a06fd6f21eeaab9ebe08db3fbd70c3586f321b0292f0f75347cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513af9e6efc20273cf65f28568c90859e
SHA1a77d7fa99fe5cb721fddcb3fb8f71c27e171f51d
SHA25641b2fe16bb34ac9f67fdf28132ba48c6bbd3b5f68e880cf7c7c401823a52e8f5
SHA5121e1ae66724406bd14f9b4ff6b94272548b5aa0be9687c4b9148a6e2f533736882290a95db024fe7292bab57eda8164d4f6cd58395e54c4a02295d848a327a1ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a870e67b2c15a7a62d40b8a6964734fe
SHA19e8f912cb8159c13a93ef3dd250735b317b37f27
SHA256dcae2bffc983508be36ffc3438bcf259a938962e8a39d3e439fc9167b742e8ff
SHA512b3377e971416d8f672904ac5c1f83d533d903754554be3ccc08dac3190798ec7c458e60b24960a0a9e9305cf6f9f9835be361b1d22b2acb88d933626720b24c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a736a2a8ffe3a54870866c605af7d68
SHA1b8438382699c464b4a4ff0ce3156144691d9cd2d
SHA2568d536d5917a86438b45de3f21a5fda60a78cc069215e5632e35a295053f8d9f2
SHA51278974d0594c4ec680e3f2174d57571620fce94e6b2fab0119bce53517b499316605a4da2f02eab0e334043b93b4549c98b962d04d0a789f2e82391118ceb6ba0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5462f39ce39ca73e9ccb3a2bb36e55faf
SHA1cd7aaa1c50c12e109552e241f0851c2e9ed1cfed
SHA25657477663c3b2874273571d1c49515129657a55eedbc08bd485822069d4138038
SHA512b0aa9cb92c478ae83764df4721c5505138fa38f4271e1d02ef1a0bd5c4129b4ff3469bd026c55173248c4bb94f9e05080ec5456e0406f4ad946748996b545938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afb819fa1ec1ae694ea696a38389943a
SHA1d40dd7257978740215dca95f9e61abdcee4a6a8c
SHA256dfdff216db07c4fb7bf5458bcf7fd6d08f0d2787216aa023dce4b9c43b58f17b
SHA512b4a17c5a8447d1b56a56fb6bd4c47c90a432e0ceabcec09b4ad9fbdbdab9bce9cbb193640bb952b6911994ca1532c5444042e77d34a9e575787437b93071a0fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fca68423c1ddffcd7889ebe690f3b259
SHA13cfdfa9fc3b9b074c89c9f81692164923f833428
SHA256590fd31ce8f58a411322e4a387c51164912fbd0efb702c8ee53d82d78ff2f7e2
SHA5120d8d0aab50b07ce497c038ca0033c20db0f8135b31a0abaeb2793e192ed561896d3dd2652a99116380719507d07a5cd3d737f16af4b15246ad0f1f10be2dac8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5151f7f91ab46667759411c07101625e0
SHA1c1b3fdc37911103f49ded6d8da2a93fc03391726
SHA256bf279860b4819b40df545d2509b4179aaea6ded42265fd70493ff5303305ca16
SHA5122314d4a4476644065455a2d11812789a0e8fc755d414630f07261c53df198ff0a698f140d2ba48108c6f036b1d64cb8cbb103fbf9b647f1f922a260d76394e63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57251432bdca8425e949807f193f2a251
SHA190e034d141520873e34989c1d82631c391679482
SHA256f80444f13d24ab08d77684e515d23a4283854a72ddf00a20f226bb5f39272c10
SHA512e6b7067f897c19a0ea058db288ef1b4371c2ea2b39ce0e241e2fb20bc54ab448ad9f1962fefa8d0063e37bc50915c4e5c81abc7dc35f2101ee3e428a9954e134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f0dda9899ef98a8ccd3f51a7df19e94
SHA10f7b649925c88fabb5f6cc3d548627a01207c03a
SHA256a5b448d1b47b9655903623d826955b96bf60e8c27a9e8fa2143d99c9ff4fbc63
SHA5125d8a0ab87a9442623dc7b0825b277fc5ff74f3771e8c4027706ebfe59844a13f20b3aa8ad135b73eee1d43263cf7128c8654e9e8ca4ad39fb19639867baabff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505b6002097514116ac02239e3fa7f0c0
SHA11a1f0fc2b6aac2d6f02223320594d5da216d381a
SHA256683883205262c30125fa3b6ba467952405495fd6f4c181d685d92321f8d4b420
SHA51259789841dd099045f8d7889767afeb6e0471218cc0794bbdafd3d2a576173116dd02022059d85988b86dce524f300aa2f5272352a03ab9ef25249bca9c89716d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537662e5ab59bf5116d7ae34cfcff9e69
SHA1188a0a66daa76bd7ade09cb57511182dba3c183d
SHA256fe46139b7999575f99c9d68ffa86094e6a3c39be54b74b934d91e85417e66a01
SHA512f364a2226db3066f4053609b162b83a90ff104fe4968ad968dcdf2b280315b362b022b8c82f3c38f929c27c7e3d7e39f11e3bb633abdbb8b05f9f696ab18b783
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507ddb8cfabe7ded0e10944f8b210b219
SHA145c4134f115a93a910064a65ee167bd1548c2e55
SHA256481501acee4c88422f7e8cb94fbd0b1d0e6ef16bc29a2df0d07b11ff0ea70690
SHA512043f2a3ae2b5da64bdd92b6a99f03820a45c294d9b02062e0f2e7593cebdfb29087da11601753ba0c11b0b90de6d72f6eba110685fb9e0df3d89838d09d42577
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b