Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 03:23
Static task
static1
Behavioral task
behavioral1
Sample
8d1d59837f904a58292e38fff6b24081_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8d1d59837f904a58292e38fff6b24081_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8d1d59837f904a58292e38fff6b24081_JaffaCakes118.html
-
Size
17KB
-
MD5
8d1d59837f904a58292e38fff6b24081
-
SHA1
7f28c19161e53800164d352e209711eb7dade9c1
-
SHA256
7a2d1968b65443fa16b32960c2150b119753070f913d77cd0431b2bcb3e07bc8
-
SHA512
8ca21c94135a56ee6c428c22f8d8a4a856022193dd01f76406dae4a42f2ccd0f35c39988b4500ffeab07180c4661311f64e811652aad71e809ff070e9a1ccdf8
-
SSDEEP
192:1IFuEr0u6jv5MDwHjp9rR86iESQ1EI5HTfg0RAMfh0UkWlsVYKNdTCkUlDpNL4RO:1Is5RFvToMYETZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000285784836281ebda8c6cd56bb2992fac6f45ce23d4a57d5447ff688d33ddce3a000000000e8000000002000020000000f10af2466d7787543496d1fbca105724cb837282c5d8d461867df6a4be13f05420000000e9fdb17972a9359fbd0cf6b2aac598c4eb3ca67026969f5668bf6d4c0a3ce2564000000082a1d68c562ec69613ec990e6c4b983edb2b2729bde974e86b16accbe593e917b72dbfb1d236a651cdf15ddb7a9d8607b3eee06cc50559e5b67785d6b44e5044 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{321B17C1-585A-11EF-8AE7-D6CBE06212A9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429594856" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c061f30a67ecda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2644 iexplore.exe 2644 iexplore.exe 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2756 2644 iexplore.exe 30 PID 2644 wrote to memory of 2756 2644 iexplore.exe 30 PID 2644 wrote to memory of 2756 2644 iexplore.exe 30 PID 2644 wrote to memory of 2756 2644 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8d1d59837f904a58292e38fff6b24081_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539dd4faebc89ffcd3419ec54d08fdbca
SHA1793a958329d49fc5a0c2780c9a5a64a0416b557b
SHA2563a51749c2c0497f3ad598cd07fa5eacc53c22b0170c64b7f9fe052f641bf72ff
SHA5124334d5a67edca155572042511f8a1dc7933f7010116bf6c7d29301b065c02cc48e899f3ea7b44002bfed0b91148cb3ab84a93a7df4c305ed21f07efe511cd87d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c3904cbc95a2c5113b4b47b0c20e00c
SHA1a72a0ce7e6e2b87f5ca2bf73cf749e1622e137fb
SHA256481f961c9892d3e197add05762b1db92cd7c51aab3e07557eeb3654ac53262d8
SHA512dda3bf20798cd1e661e2053897cbfff0c5de7ed627022022f5f39ce59d0d9c3e4e285626af61aebf5982a3d0197714f30f1457ffc5ea4b828bc75ba54703d116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5546edcfd99f475b8d888ed68af94b6ae
SHA10294ab9656143c86104d08d00ed56594f36bcb17
SHA2561170c2e8b1377f55b24aec896e97beb916fb7e5df6da9ae55f122a805a08118c
SHA512200a303348a681e570ca0c0e84f575ae9040991f25238405a0700fd512f996b1190f3ee502784c5c3707433145c485f39f1b6099d63e069ef1992d4469b9d444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd1d63f379515aa9e63300c505a14900
SHA1b592d686705f031782815aa361cc8a3c90ca9f0a
SHA25631dfdaa4686c0f37a50c2bbb6686bfb4a43d52c4e7f460f0caedcc26c6768513
SHA512cb9df8327ad73cf2fe79b41c0aee0a4963ea61d663286ee42b53f516285a43d9907a51ad51a3cb4c34ed67d00fe273d2213f4f6dbe30b238a89d2654c00698fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5006b73a50670e7adfc7b54cbde87a55a
SHA1a7d5405a215bfe04ed22779b062e6a791354d3a5
SHA256d6cc1ba68d0c9f964913b3893fccdb482894dfca90104792f28c1679c9f2c7eb
SHA51225c53023ec19688ff31e7bd14c32871ac0bda7e54adf53f3cda6c5d0bc366f7035bd8138f3f7612b339558be41f60f757c03fea1e2cc77a62182053f66b305c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6293953ae597b2444d5ecee9431afb8
SHA120b745e0367808b577faeba920a9e999ea2f6ef9
SHA2561e6b68890c3f885ff2a959f244048a75d3f60d089ab9b57f8421c9facaf33746
SHA5124ffa1b4783fd7a156d8506aff5a3b1d9bfbe14141260e176da85e491819d7f0f744009e0e39aeed78bf25ada4bf8c957036a7d9cc015ecc16712acdb3998d1a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8207dff9b7d24f418bb6c60a5ee3ddd
SHA1ae8186da4fff6986dbe61d19702cdc49abbcca3d
SHA256bc46b51defe05254ed2fcc864b1bdbd6fcf2bebb7ae14278f10851f51d9cba15
SHA512cfc36c84820ea42776d086f21701667441a2a4090462d11dd99983b6e7821ee7aafba30b23a36b8270489a5f94fa885fa4285e4beadc900ed3ed7540995b0dfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca0f7747b972da16cee5b8d782205156
SHA117c6acbb850d56dd5688a0cb673ed1b10a7bcd1e
SHA2569294f1727c4903694c118e8861b3f60f6bb19e81360655fe8b00171f2687327e
SHA512b7cb713fc126c1a611c8ea57f02acbf4b5ec505f1ba95a0ee7a67afdb5bb066aa30dc65c0e368059dd3cd99196c2d16a0699bd399c8f64c7f4cfaea738c68e5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556bd2c74e6eda0323004f0f05a11a80b
SHA1508f196d1b5712b2a9c506642cb8489b0156615b
SHA256ed521c435a00f1337aba53d4fd46270a928838b8b17d13fa7ee94b98f96cb453
SHA512321fbd04d5cb0304f0d0d68b5eebf455684d6fca8bdcd29c8c47102b13f10dff4fcf8f497b814f7d3d44d590fde62132d502a189c53be9e3f3e21e543cb50794
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbc4ab725592661f0ea28a98b20aecf4
SHA1bad6ec39bad5150ef10731559301c531f2712339
SHA2562e7c8194355fe62f936e4ad56236185be4c7727666de85d2a7a84f86d8257c03
SHA512e6fb03210fa7426d234dae908d69689005a51071b7c0e8ef584c870bfc6b5a0720860a720314bb5710c3b6985326eded3386b339639017b9a5977dfff7d8a700
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55325d81a1b707da4adf1248db260b4c1
SHA16bf911168538a00b94e7c657187838dc5fa34763
SHA2568125db143dfe196b063bd151621454a846be8f29e349c0196e9c86e20ff85b4a
SHA512b87830974b1442a557750f0a9dc02b7f855d34a3a40e7a8d4ca690de7becccafc6a3e611962bffa1fffc856545edde35ea93ae33374741bf37d8d13e8ec3d96e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fea446f230098d681c397de391a6c5b6
SHA112cda05dd613ecff20cb9415aca0e0690b5080bc
SHA256db80ef119ade81fac807b12347195146030a2238d08ef93e6130e8d248fbf830
SHA5127273e7f9f66fc88b03f225cc3e6dd0cd408ddd6a745b8200ecd68c1b45f26652a4fab66ad3445292e341ed50d6644dc9e13bbacc3fca96afc94caeb7d1080816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5942bcef684f8ccde0fdc27dde635b0bf
SHA1eb9bf2892fddd639e0b79a8ca663cd942b5c3879
SHA25618946572cd9bb494746bfbc56e44ab369b6a07ed936b1ce89f11176b723c53e7
SHA512f2af2779b1c211b9632e8dfc75b90fe8c4dcf1b3d48c9b1ee91b4d33843963d00f85098c63afc2e78d4e0dfa75f94dca08a98e6a2ac1a0833ca4b697e241a3af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d13b81298e1b4a307cdb2d1a6a7a30cf
SHA17089660945c5c5a1eede54ffcdbe1abbcb972517
SHA2568a2626ac0e183075d01038eb29a63283bf8b32a37702df16df0be1f8f4f304e9
SHA51268585970748ca58da8c7a6b566000452634874307a452cb554dfd47a542fa1d5bb6518ee70f58ab46538f3b1e813acc9833ffa71645d990de14f991492a67228
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f29377f58bffd1c9bb8777fa32759cf2
SHA1f92211f215226209508347b2468399e5ee78a2a4
SHA256a3c7a09cf7f84f312d392f2f84c2907f69aed0401349d8440a7e45420ec60437
SHA5123138e26a238d01c40b77222506af4450cc3cda6d21b64d282752e4d03f4a7d570f43df4b67f2bc9214c8faed915132ac487f7d4d1507faf7c14c0044cac8bf61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569d969a78c8349717dd98fd628fe715c
SHA1bc6866da1faf209afe49e0931f3c9503e552257e
SHA256bc0eb992eb62a35ad8d925d54f0c5838aed8953219cfff352d9282aac61cd305
SHA512950f7c37a9cb614ebace25dab1450fd1ca48db399a3516d92b9453bdf2fefdd2d548b7224da21cbd01729c395c726d34e8ada5de7dcc2242423e3f4fff28369e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534c5afd5696c1f6b2fb1af7d05f70a4a
SHA170635bf93411993c716a3210d0a9f1118c03b827
SHA256cc8334ecceed3fd1dba12b4bf220702251daef79b8535c6931408eb4e255d8f5
SHA512671949b910f98d2dbc8441c41ae9033ca32a4d82252e36a7dda41af19965c3545fc38ed7a453fe468d274a18d4b256532adbeaacee1988d4fb526bff55c4da2a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b