Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12-08-2024 08:21
Static task
static1
Behavioral task
behavioral1
Sample
8e016880f066d5e5a72257d733e99d98_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8e016880f066d5e5a72257d733e99d98_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8e016880f066d5e5a72257d733e99d98_JaffaCakes118.html
-
Size
17KB
-
MD5
8e016880f066d5e5a72257d733e99d98
-
SHA1
0236c33a6d8f1a5444e036cf6545612bfd7ec7b1
-
SHA256
1eb008f8448ec7531fab4d840c73f4aa874296744a5f8574f3d48cdb0bd5958f
-
SHA512
393d7321043cabff077004e05591e7c1480f375f1c393e665489b563397dbc19e9f6f0be1bef500376ee0d08a2dccafb17d82231caaccfc798527815c5ed161f
-
SSDEEP
192:1IBuEr0u6jv5MDwHjp9rR86iESQ1EI5HTTg0RAMfjxZlsVsKNdXE0oh7VNL4Rr+r:1I45RFvTU6IETZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429612771" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E845F691-5883-11EF-9403-6ED7993C8D5B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000da02ac00b52aa5b273c06ec454d4c351e50b0eaefdbd96de4314592eb8228964000000000e8000000002000020000000b9d783ce716521455fdd603584ed43509a5a3b1d3f2d75b040f158e321e807cc20000000052b6b3f666061a14e7140859574d0078dbb01d93b05889cd3213d5663867ffe40000000d91a20bea2016b147260915ce19dd2ce0f175c0660bcc42eecad3e6fa17893a843d1561bdbdddd8f6500f4270c7bc2032f745c639b81765a61e5aeccc8fdebb3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 506d41c090ecda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2412 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2412 iexplore.exe 2412 iexplore.exe 1096 IEXPLORE.EXE 1096 IEXPLORE.EXE 1096 IEXPLORE.EXE 1096 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2412 wrote to memory of 1096 2412 iexplore.exe 30 PID 2412 wrote to memory of 1096 2412 iexplore.exe 30 PID 2412 wrote to memory of 1096 2412 iexplore.exe 30 PID 2412 wrote to memory of 1096 2412 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8e016880f066d5e5a72257d733e99d98_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2412 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dda6ff9d4057882804e38a9369342810
SHA1f9a86b98303709ebe0c7687457b4797a70047d27
SHA256841ebe4c80e97756f54e5254b9d2c20f6e266cbaf825029277bcd4bc323b25d3
SHA51282c1d87c62c2c184290267d17e33188cc0255612def9a55000902901b21a2139be9974d47f79e8fb89064cf316ffb977a18355da1251065fcc3e2b48bec618a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5938d588c351659b90b211ac9b24ef35d
SHA1b7a09a133e38d939916f9301d494cecb170b2fd7
SHA2565915dd94a3221e9b24ff31cc5d057fc293d84e64cab6413b39d072ffbb6dbff3
SHA5126dd3a2b36a62936e4259acb73c2c407280fa6eb37647c4e2e880932999a4782fdb4d051ee00f3a597ec90ebccb53f0d18d3e17f540e59be51c80bd379cba3459
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5735b738e27c0b2feb8eacb90311650f4
SHA102b5f5e8634802a34766294a5b80de2ac5ba5bf8
SHA256a051f636b2d7dc58b6adb725425d685802ba0f54977936733f19e4e5a7282962
SHA51299d4d9288fc0210fff62f6bbbe16190cad278e553b446f1230e200b2001aeca77e467b8e4c8ac1c5a372660989618359a29c72f4982c83901e05f8239520f772
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd9b309c58067b267b2e7ca6b3212395
SHA1c9be45f4a329ab72d7ff890154c624b6f61fafe3
SHA2569b3a7665b58687b0c3abf08dfc595da033055514277956013fd766190a981305
SHA512e25c2a6c9084dba1f36b58160d46bd2f0873da51a0a8266973b98e6b29482e8e602b9b98d2ef9e2e37ad5e2b0a002256baef84eae6103525b78c56dbe6bc5908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582397c8cef32cd97c5aeacaa8741e15c
SHA14d69f7183442f5871adb2dd1206c3417ba3f5da6
SHA25686bad173abbc40cceab4063c8750ab5d3291398ff69bfd451548d3f7d73d4ebb
SHA512523845353a6715a9ed959372e355ebadd8de8f6e6ebeb4e7161dbd89c5f66e320dcab088e10caa1ed28be1d943980990b6e245a6aee780a1c2a0ff12fd787e74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537c623bda0b64b3cf41c49bbf6934bb1
SHA1feb940bad7cdfec18ae533ba3e9ca774aef5eeed
SHA25670626ed4647354154d0698ee1c71da3bf1ca61a535c248cb59c1c06724b6262e
SHA512424b2a9a8f18023c4e09995294eda6814bf7fb2c6754e1139b2f1e7abbd554e8b954e2fb2a3af6ba03da5dbe95c4cfd5b169e2d9af27cbf50ba2493e43a1b74b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4b986c11cb68faebbc7e4c92f8f62a2
SHA1a8810d05787995c14ca1a2dfe4f11f36d9b45f22
SHA256c1078e1b22e5bbf24838be0e41acdd78f80d1721aefc4d71c92d803406ae1cf7
SHA512d36c7154006220758ed70d0183eb5271b5744395c7cc4ed4d79e709fb7fe2ab022a77ee03a18c1d14825a2f5e34b392ceec4c23d6d34b75f073fc2176c45ae4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff82c3dda229c6dfe2a409a529a0d117
SHA11254e3db3d10e539b722a6c8742b6d87e4bb74c2
SHA256307ef16cb884da43b251becd5b2be815749d5acb6f93bfedbf97cd2b77109af5
SHA5128d1f4ed5eed03753a51857d656990c6c61b06855778d60bc4bcea02cc406c359674c081e6cf3257abdd539db239b29d3838435e1e21104210cc5c5efa695db95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2bea9e90821532f296d2407d7438199
SHA193c4e03b29b8835bbb8e34c12b10e687c4a113bf
SHA2565e09de040b0d4bfadcc9be5891d565339c2c1009cf47b58b7aa80cf5b26aa8e8
SHA5122831879b05c14af3ae16ec136e85079115876c5ae5fa7153e1512b69b916ff76d4603f87c09721c3e34a7058c148bfbdf1d71d38c2196e90a51fcf159caf1e38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bb27ba5b4896a16076613a379b263be
SHA1a2384bc21caaedbcef471e05f247426c69f165cf
SHA256c99b19607044f247f21c4f4dcb804eb5332620cd97f04645078c870db7bc58b9
SHA51244ac8b0ac3bc497c1732dfabf8a3b1d168418a3243dd47acbd870c8cbfa84ed206488008b6328d4ff41f45c4fc1c1d3c643a868f31e6afbd20f77ccff3bbe65c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6144ae8a8bfbde1fa2eb78e3f7e7c0d
SHA19f03d4d776b4a6250239cfa5a7bcb81ffa7efb0c
SHA256a9ccd3f105ecb9b999e89037634ee78fcc4999e5009fa01f12a9d0abb534dd4c
SHA512d34be9c396f356ef909dbf0bc211636b2107e94017d259352adb9cacd050fe3552dbf06b9149e258dfba2158a86b2cd3dc88267f09d35b2593991cdec271738b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5bb8d6c5fde2c8820fbbc41d57fd957
SHA11c36b6a930e99c790eb913477f645bd1092d0e3d
SHA256aac6f76a9afec9b2a83cf8afdbb36a4101d05ba81a088301d95d2b1334bb92b5
SHA512ed40b8b7316b9398d54e3841ad5a7952a03575aff685e264966206ef44e4bb035b41e265404a11f3c967bfdc3f1271a57fe679c62e6afc7d202b400ec28ce78e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9a0513957572b9104b638a46d702963
SHA168909bb7f1cbcb10c1538a014997d147a22ea6e8
SHA2564d63b6dae6f3f5a357ac97d21cc9f4101a55459079bb340d9fc00ba35354eb75
SHA51290d266db14fc332d2c50b917327e5d8b53d6a3a1b002d636c6f1403b278f29c4702293ffc71fbe0041b07cf94156e44476723a4d1f1e5e88d1a754a1bc2a723f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aaf34235bfd7379dfbeb86dc2deebf1
SHA149c7e57ae5e195a0b7af59d53d76282f04d21243
SHA2560146f253e2834152ad418bdca4df61b307c320891740e8c361d3e5a36ad20a09
SHA512a6fff65c21db779c4e9d3ddb63682a5a7bb817ffa16a54414beba4d3ecba512e382bda3a2a066f5acb183a752d405954f5c77411faa056f230ed469cc1a1be1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58deaf83111b555f880e9c60f6538df7a
SHA1a470c49cdacf358576a72738238bbbdbeb540cc9
SHA256e183af3b68f15aa1ba1d10797cf094252cd46e9c31a4532d74d424099ce8b2f9
SHA51270194dc63c27748aaa66e7f18e82e3039d07f796689dc57535fe71a09aa19f223c9d22088a6204243af7938c01d57b9f63fb21d5f3cc180bd909b201cd0bc082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbce24522e45efac75cc503c7492b335
SHA17d5fd1a34a28443dc95a50ab5ce84a4f58c0a8e5
SHA256fe8d4ecc43e80cfd4bc34b5e1352aee769fdf20c1a034af7742244c809378b8a
SHA5122a1734c0c02d8a4754d8f9ed6b6c12c6c0e6eee8e9087755387d5bc3ede086226b094fd986dc6076fa814a48f55471c347d402fb6d4f24a6380d3a7a476ea113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db1fc26575d97a6ac0241c84e25cca80
SHA181087e0034a264bf8b92b4433985e68f5240b31b
SHA256631a1c910e7205e74fdd3b9f2a50e83f620ec78a8b99bd014f8dd55dd28de566
SHA512d6db431a2b7634f2d7383c5d44729985391b94957b0a62be568feca1d7c403cbfb76c07fbdd33669f13f8af11e0a3cf3c5bdaa0dc3a064e135d8b42eef3d3f1d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M7GT0RRO\SNHTV2NE.htm
Filesize138B
MD57389d931c86b3d7bb6b8af46d8c4172b
SHA18d2a4760aa0b47984d11cd1a66448719177fb791
SHA256301bd9f16f94feedfae7a946a14bac38cb73c43efe6117bc5586835af03d7d6f
SHA512dd6d1511e4fcd5bc09d821ffe091fb5946ac9654c48664aed504e479e9ac20c1cad44b6df90f42190d47e28f5f96bfb09d24056df6b950243d68ee8100a9a889
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b