Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 05:49
Static task
static1
Behavioral task
behavioral1
Sample
8d8e792d3815dfad35f5808ad6c06a80_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8d8e792d3815dfad35f5808ad6c06a80_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8d8e792d3815dfad35f5808ad6c06a80_JaffaCakes118.html
-
Size
8KB
-
MD5
8d8e792d3815dfad35f5808ad6c06a80
-
SHA1
7f88da6e52a62ce09761018b18db0572814cd478
-
SHA256
88a799f651d996f329e554ef4d6ebe62e23850b9efb55c676050e114d900485a
-
SHA512
b7e58505ed210b7ae71d0a225536313ebe9712aa09b7b6b849c102d2a242daecf1947ae309428a8e9338dc83a1ea999508aef1718dbd3eddece4045291a220be
-
SSDEEP
192:TVWs1sDdACiaDMyznqV8rNmo9Z15E9TEEdQS7cllVTe/PqJAy/2juSGu:hhmpACaMO85mo9ZsyEdQcpPqiNjutu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2067ed827becda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AE1D7E31-586E-11EF-A1BB-725FF0DF1EEB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429603654" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000b0080f803e8df888d0f11aba20ec3bebc8269b27c8f71d6d0d49ae1f3b7e395c000000000e80000000020000200000001f15386cb13ddfa64507eafe5ffe4fb5db01b89f492f182256a7ccdb7d252f0320000000d13f1178937c2ed8c437c870c4149bbfbb528e8dc5746ef102e7d2bd3dabf97c4000000078d60d3201a04bff9f5c51c7a93680567a557ebe178407c025e03500b835d2f9159ebf587707bd60f8b6ee24b1dc9de8fb63f8b3283f932b1a47e52563889f1a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3020 iexplore.exe 3020 iexplore.exe 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2648 3020 iexplore.exe 30 PID 3020 wrote to memory of 2648 3020 iexplore.exe 30 PID 3020 wrote to memory of 2648 3020 iexplore.exe 30 PID 3020 wrote to memory of 2648 3020 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8d8e792d3815dfad35f5808ad6c06a80_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5166f3066fe9819f8b05bde662d35324a
SHA186a4d6ba415264b2d98a0302afe5099101069dde
SHA2569c4925958ff915fc3f00aab40e7874f7b4f59552dc8f11ea2a3583be8b5c206f
SHA512d2a4fc3ef7273f86dbf13ba9a154da11bf3dda87f4fc62ed78b9a8b86a88a91690e21cd67567c6a01b7f0f4c13ce901ea7f35938dfa280b4c8bdacbf1e0eca3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549023aeaa154dfea9b13f75c54ee1fbe
SHA1e3fc8a04fae1cf5537056750f03b86a502aab147
SHA2566fb82d249e95501f88416b4e13a6b0e013f729094a8af29caefb20448070ce6b
SHA512f828e7551d12419a81929859750d896a4bb0413b971500ef4d19838750afa731cf8830c480a0dfd646b34c9830e9815c9e266de3ab2458e7fa7797685641bdd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d890740b51d78b31fab78bc8d2cb1def
SHA10d2894d8ecc52679c46b797fdb4d3b8c188a813a
SHA2564c79c39d6adf766a8694aa8267acb6dfdfbdf0c3f549c437ac8e712af6d0c729
SHA512114dba5bdabe138c85242656c7ea0d07d4517880bc633cc915f12a3a86292996e613d1d4c5e4f6b698bd30d852c4d81d0fcca1292420603338f02b04a47f0fcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a6dd5946d8eac21e3ee7338ca915e6a
SHA1eeed3094587f3ccbfb31d17dcfa6d2e0d89409e6
SHA2564ae9c3f2299ea407fd548e7a56e25194ebba91ce8422802e348b35e31163cc64
SHA512ae96f1806d58cf6dbac9320ef3382f9150e377d4a693ba5f670c594b53481da2e1c83ad7a9b4860e5d93b971f04c7030583d3b66bcf4b0f318cb0eb1837fb1b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0452c9316c0c2949d31d94c10867ea6
SHA17bd62e4cd61e2cb4b5919d1b99790520dc1bcc30
SHA25637448dc18b23090beab49ccbaaa940697bd6b737de24c1f4d96f1168a211b87c
SHA5122a8ed1025345cbc91f36ea680d9a6027fc5f5486259b7a8dcb3010a3f666d7dbe31403f109f1e339c7de7e0b1ee814bef29d072e64d58f872081e9ca706e9aff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56988f979bfd5266e10ea1e141ab7b9b1
SHA1ca542c1bc5d3dbdd8be183977bcaf4efc264d7a0
SHA2565af778e15aa2950bab3a4654002b263ce92fd144d1ad13e899dd5a0b769c8836
SHA51283c258e75ae6985edd558d0604490f7b75fd976331317f048c81235c061d6730956f15643800b263395946b495330bec48aed4139eff8f65b1c0c69706056826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508ea20cb29c5500c7ac84adf1b23e37a
SHA1ad951a29ee91068e723f4940410f0ca99636a50e
SHA25641729cd6a8d89faaad6d23773319b89486de11440bd9cc3f9d72e965df380996
SHA512b941465e8e7f265e48dce0d228d0e0efae1f1ca2bb4a3cf854357df941ce400ca65aa366bb4c92ea131be0ff6afb9406d908d504ce3fe090979a4030d8d4be84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5356e024d1f3fbae20f019abce4db6ca8
SHA1cc4537cdf75a42774dc53bcc796ec840380122c9
SHA25640348fb8666fc45e9ee6fcb914bcf161053dd85a54a94c0a3bdfd0d709211066
SHA5126f4489e4b8ed06f01d7c3a5d270de28510505f28ddf8ea6003ed240b317a7a4e9474c9bf4b65070c59be87521cd48a32c26078698c73d4b31f32a71302ed1081
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d988587a3f982830d5eb933a631f5b61
SHA15ead4e51c135c073add3a25f708f4536e8c5a1a9
SHA256a69433ff407860f3673c563f000b12f887260ede60f6426140e4548198d97df3
SHA512f4efba77198b3fbd7bcf47b8bb183aa0df57f86b181aad95bc361d56fa211fbf59fb2c233eb1c8c625d4f31ba04ae92901fd7d3e944355dd756376191204229d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d98f77408b03396fe42a877b3c2038fa
SHA19cebd9869c26637075aec6fc96350bea0ac70dfe
SHA256566ad921b4f7ceff7343862b6674d27d2d2ff6fc274bab542ad2fc5afd7bc289
SHA51241de02b03c2d3cbb9ac577505fd1e9459e7eec27e2743e64b441d97e5c4ec0f16c83b923bfbf8425b79123be5b609210adf68fbe55b07566a4e7db066e0b835a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59432241c976e30336faee429a9a23bfa
SHA1463f66d408acdf273d0f1cdf437fe154fe332937
SHA2567442909477ead23badc2c682678c6aef8906938d9a8023e0ce4491058c975e92
SHA512436e32b8f81a7a386030ac35c71431a30354e0410fddcdc1d375dfffe87bb7d33464e6e8e5d92dd3a1c8489f7b832ea90a34b8615c2327bae1e4f7c2f9f91dab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3519bb9bda3e2ce6236b74c3a15815d
SHA110684879f24a212fd375c2e114e058fdce415765
SHA256e4a4920730e0723408f0bb71c91e0d37b7e1216353a0b73cf0cf25793656d991
SHA5128583253f61fd072f2aa16a01965ec0075af955373afb72016180c19c50b27d37cc2b489dcf3e024688eb4b28d3d9ae18c2457454ae833ff8307f1329c4c55d81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513d4cd750036398841abbe446d555711
SHA1373d12796f62542e905c8a9669e0f82df42eb1b6
SHA2565b440701104d393d48d518385db18ab5a4dc5d32b1c080ef11f9b0e5840725a9
SHA5124f78273571617c86b685869237e8133a360b038de1e57d83ec214c100c23d30131956af4d470d6b1f3c062f4ad2b57beedca470860ef394a4a06460663b8dcf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e615b31650b56d51e6b1b075dcb530cc
SHA1834e63d3c6a98b54d3d5497739fb3b0afffbd523
SHA25635e94b8ba67a8921108cfd165388ba4c385eb9272ed461c409389ebe3169e335
SHA51233ec7f10d53cd8473682ba70109a895b0c29b28db0587b1cff1be29faf51c7e355cfbc295a1e00c5221203397c80aa1fb663feb39978382ea22a3bdf1acd5c06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0491d0d1e066b1ca0d8bb0402dcb9d7
SHA10593db48a27f48d27d39d6666c2830c373447178
SHA2567ee10d5b0cc532a1cd5f4d7b2ee0bedc7380b17ec5c54cf8fc31d49445963b93
SHA51244a6b9c5afb89a572c99d2d6cbba096b0e0be2f3d7af3ccd08c5c1602c0ca9c03427eda651601dda7457021905768a5ef6c98780c167356eb3cfc14d5a6ad7c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc2cca9d2c15daa93bd3b33412e39be4
SHA1ee4eb26daad18b393ba4e2ebcbd83252e7d4dc78
SHA2563f7fcd4b119155f8f1a73483927b0efde4b32e5b8797487ba2199ff237d7a3eb
SHA512db673ae1becd9b95acdd1df7510919e97bdb48094ad8e501c7b9bd09df8283493b32a2bf4b1dd98ff48693e50567c1e3ffb57fbe41f3d6f9165d9b8ee1ed81e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572fe606e3d6e2fde2c38390f620d712f
SHA1963d253a3d35607b77ca10efdd36b241108fb0b2
SHA256007ea3b967522aa17ecfcf7583a28505f6680917fb96f15af8af8be34da0530b
SHA512486799c439b0e021e2d9d1556d61a03e27d5c53ebb2529e48fba54892d7fd295a324e50952a5a08bd7b3174a528da8c0d5de76be58bbe57384cef2fd06ea9376
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f02f56e58b280c8e1f7e690a749906f
SHA1fea8a18c3d2ca465021aba74a91580edac278bb8
SHA25691f3e26684507c99eb8f7b55f29e45744d5b310cf3881f3b79d95e2c747bc083
SHA512c3c82a01de66ff5b4664b4a1f2d1fc32bbc70e3daa5e170ce401abc89980fbecee61261e134c166552a0dad8062ca296508c0201b94277fee6d81a615624dd28
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b