Analysis
-
max time kernel
118s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 04:39
Static task
static1
Behavioral task
behavioral1
Sample
8d58e1a90cd13b1f5e00a30bd0f0d18c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8d58e1a90cd13b1f5e00a30bd0f0d18c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8d58e1a90cd13b1f5e00a30bd0f0d18c_JaffaCakes118.html
-
Size
7KB
-
MD5
8d58e1a90cd13b1f5e00a30bd0f0d18c
-
SHA1
5a4fa8a465bf8e1f072d114390652336ccf84401
-
SHA256
efaa0cbd54a0e73dfa7c610e254dcd5a074b12bf6b8a5adb09c2147fdbdbfe6a
-
SHA512
40f6455dd731f7f4eca21c1f2d2fb0c80a2436e16b5797be976245b1794f85aca945989f6ae6c2accdba8f30277c7a6635865fa8c25217394596feda211ba5c6
-
SSDEEP
96:uzVs+ux7FtLLY1k9o84d12ef7CSTUOne0huAcEZ7ru7f:csz7FtAYS/mmjb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000006a4829071bcf9f12f81b8676fa8b8a8ac71cd52d75acf912264716dc74d00c3b000000000e80000000020000200000008740343d2c5ce0ad96e5417ea6dcb421e846bc8516c77b234eab2b94a13a66be200000009f8a2c907c148655dc6738f093c1860e21dc629a30a3e776f2e6c423bfd2265e40000000ebf7aa9d710bc5a8051fbaaf52bf7a731905ed2e6639c031d8a3956eda7f7ce04a677dbc67b2cf5fddef7aa02a0ca8fa6000a97e07233767aa9f665368ce46a7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b02dacae71ecda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D99C9411-5864-11EF-BD1D-D238DC34531D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429599435" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2884 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2884 iexplore.exe 2884 iexplore.exe 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2720 2884 iexplore.exe 30 PID 2884 wrote to memory of 2720 2884 iexplore.exe 30 PID 2884 wrote to memory of 2720 2884 iexplore.exe 30 PID 2884 wrote to memory of 2720 2884 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8d58e1a90cd13b1f5e00a30bd0f0d18c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2884 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535cd993084c63ce059eaa50db8d2ea9b
SHA1eba5817ef41528db26bdfa5b7263362f21a8bec4
SHA2564558cbf213c01cfeafdaf5a71a4c9c19145a17a0397dbcbb621d85fb433b53ba
SHA512beaee35485e37914b05e3ed076fd14b01a501c04fe09e120f1b3f315c0c9f787f90a3a5eed65821b9c7a7026c47db9e7df4ab5b7d6bb5277120969945c8fe0f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55eec27fc143aebe08658686f46a81002
SHA1cccb3eea016fb61aeb60c7c09047e69fe1885424
SHA2568d54705df23854ea36146b3086a5176092a8108cdfe24d5dffd5d6baf19a6f22
SHA5120310cb9cf54604a672b19a34114249abc3a683143861f4e56c759d80d42cf493ef6676122e58e1dd39decb1893b92d1dadd224cb9bec0d654b215106399c2cf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5205946fccb674f4c7a8f4a27f2caf897
SHA1d61fb949d5e72c4f70ac099587f02e917e0c5480
SHA2561f0348a18aa4dbf656d61b1839b51c19d4de0a6bd72076989feca406f8e574f3
SHA5122a7f1d7f883bb70a90c65747dc565087ae8746e97b7f2cf1637393ca794deb74db09973a768209a96538e88deb143dc095ad9a93e5400b569159834077d0ef2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e336d2606bc15870e490ffbace3af391
SHA19705a6b1b5cf9b0dcfa3c0b3474dbd33be2801a8
SHA2563d982c4b57efe154cc9e347ea1c3a03bbae2a620dbeb078e10e2fb826ea754ab
SHA512e0042c9f06b8c7e4c68f4d4234f0e9c695a76a77b6f7ff5a3228f5de0d3db47328872ed8e1a1ad065450e056ed9449a3f7f091858522222738535f3484a80168
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a84c688286fef6df3894c1d9da2864d
SHA107d65a1f0b8eef13a8c170c4f7d8364376f33e31
SHA256dbb9147741aca40954f0900c17221bd9c1d42bec81af0f82b522a5222c520ff4
SHA512ffea3699bd5db8286f34cd87b8bf4296882e3080a6874f7c908b5356cf7098e51d8627892f4d11693d69bf9a44082ff45d2b979fd826f2f9b66a9bdd2c5e48ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5709c2a3a6d052207454688d2133a0b18
SHA15dcf0efddb510dfd2c0da8124a411017edbfea53
SHA256d6a432e7566a9e4449f0eb76bee690d8142d6f2dbe9d73e423f402e89a5cc96e
SHA5125322968e7eb1cc3dc9c2cd2bc71efa1407835d64f8619498362c7993113068fcc0321797f4bbe3a0cb6f00901b40434c3ee1e30396021a08f8d36dfb2aaedb68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54da5740777ada4043dfe75283f69aacd
SHA12d6edcf56641a7d5559d5a2431d9a464b033b9bc
SHA256fff73737b7144b0580551a9ac3785065243a8e2f14a4f7af5c756a972d4d4f01
SHA51279544f8e01d95cd45d223317f432a3e69403a90025780fc9faf4d5a09532a98880bf977059775f95bbf80e6e16318f56746af70d9e37f82effb2c13bff010a66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513d5306c549f8f226163b2eb6757fb76
SHA11b1c861ac7cf7bad6bd9b61c353c834bb5e44697
SHA2561f60cced3a73af6b7dfdb0b0a0a83011a3d07f8b3f274c3aae29919cc8b00b73
SHA5120fb54c2aa9019d91ec94c4c71a652602e2f325acedd24389fa161ca79b7e9efefc75bde0b964d0dcaee3bd6a053b0b312f98362fac41ebdccf7dd671acb1ae7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ceb257f75832bb52de181ac4e129da8
SHA12116a7d489e5e5715a5b9e9316688a4a1ec3c20d
SHA256e5d1226672c35321f55052ea2bbb52c2bc677de486220ed8b85340817894e938
SHA5125663545e5ac5335a7250da36124ef5b7366f9c69aadaae894582bbb387b3b9756880c74cec3d14b73fa42e8f5835dc96817658405ddafa444e2f55705679c64e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c71db1fc66f58ab9cbd2154cf87a6019
SHA1ad9814a0658b48fb0dcc703c777748a92779e35b
SHA256e215d341020813ea3e267577c05e7f4af33339598cec273aada41a7910ed6b50
SHA512b547b1075b63303d92cfe4bf1df2506aabf594504465afcfe6ac122645e63bd0daae6d64f521550c22beb70bfa7eb655d322c4e09858472a2ccfcf8b345baa78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5f293e1a36dabb3828c1be1f944812c
SHA1574cdb8a5511479aa3d5c2803b286855652e1bdd
SHA25630ec4c391869ddb0411e8e359318c70baf04bd9fd1a42dcdba5d08fb82da2f00
SHA51250567ee464cad0cdae25372e7ce87383e8aab7caca10686ec7f6ed15a3d986c614b06384a4ddbd00d0bd470b55958a85ccca5f9a01becc996d538fb118fddbf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560d887b4f356c3ad9dd9f3933e1d33ab
SHA1e9a8d7b503d41dabcc12579f3df985d04529872e
SHA256dd5d0676130d551e1f6e51fd184afac9d3a61093550bc7920f136c9f9d27144d
SHA512c5f2260931a76faab8e8d4e82576f5393af2cb8d511be3f522c4bb3f9cd4eb3174ded7f03e2528380435a1b402c40716ecd4fadcdbbf71e55065c3ba7b7b38de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3d469f19a5fa01cfd5776f41ae94612
SHA14226118d2ebb406628e4d029790e1debbb450291
SHA2565ce06acab9d6c2a49820f17b0522c7192373c26825e9941769f72575c77405e7
SHA51253974b982c8c6bb77e2a44e44c9e48d784c07847d3e59c1534dbcfba35fcda450d4cacebd5d1667d3dbf8b65aa5dd64b98a12089597634dcebb5b5895c14c299
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2bacc5e9b96df18b5219a98bbda75e5
SHA15bc1d0b8f85ef266b1e819cafb21cd24f07dbfb5
SHA2563897c67e0a3425173c4b291ba2c782edf409bfd32e9cfbdda3a9da367ba67fac
SHA512b5b0cd8fefc04b8a4d1d13b4fb6d5c91273f9528b71e6cb266b5ddcf62d625bed6da2c011e1f7452fb801628ab43e97dc870ad82315fe9d49feae115f9f8c4c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c09d489b5e14e32f3d6bb9e226fabbf
SHA170c36041e2d624990bbbb2c22b6a3d0d8594bf1a
SHA2569c730ea6e73af49136eec5441f137f05c830c18a085e249fb71bef64b137d27f
SHA5124bfac03f3eacca86942c663358f1819876cbfb2a1e06ece45c3fcdaaf63d3e400a3774b0ee33ebe6d5e2cfae274e7ed93abf0104b9b0f999477b4c45bb5c70d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58140ba62c7f3c1e08173c51d3bd5240a
SHA123be5a247ef8fa4719977d72955c9899f60b26dc
SHA2565990828958273357b336debbb4531da73e4a02080d3287a5be9d026e1e6cada9
SHA51249c64c47c09570583b748531511e23623903a6d5293484160e79bd4075f7a690cca23cb981d364a4163c89832a36b5d4c92fbd40bbbf646d0b0225c785c50423
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb1aada329d5e2d9be6fa64219765ca9
SHA146d6fc85465c96e70dff311fd791c403f1f28156
SHA25692bc76ddade11653418f8ad35ba03e92f30c7508c1f700ff5b1ab6958990c788
SHA512e7d7a66abe54d95dabfc9581e7ffbf532b184251db33182f7bd69e2bb86fd82164a6ee2f89d3152671ddbd3f2389afb6a4ee7f335d334c2a57fb98197902fd30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c742c8ccdccbd0ebe34f7620dd87b5c
SHA17df3361cce08aef4b858da784b9bf80024a43198
SHA256ddf8579322b7424bc9ae84ef2082a9e44d84670285f05e9aaecf2e12bef3b83e
SHA5126e38648c9720149d32b3b5eff40762872d212e20713d12e9e91f2c83666a603de54393059caafc8eec973c1392d78f108fc41dd9c112aa6ca91d56e10046ce12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c052f69cbd43285a31ba6bdd856a4a5
SHA1cb207e7fdf7de85f85ee18d03d1f8ec71055fecb
SHA256cec01bed96291854a98aca58a75fa0e75de1b2496c99b18bc62a4d6d09168995
SHA5129cb94502eac09229c63b7a1685638f0122fea43bdeeb9d13b3028b2585b3f1d76994453784d63e1b8f35ff623604a3238ca8ec584f66ac91c52247a29b8045f1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b