Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12-08-2024 09:01
Static task
static1
Behavioral task
behavioral1
Sample
8e1fec5ce582940b0e8b8820008855f1_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8e1fec5ce582940b0e8b8820008855f1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8e1fec5ce582940b0e8b8820008855f1_JaffaCakes118.html
-
Size
214KB
-
MD5
8e1fec5ce582940b0e8b8820008855f1
-
SHA1
64791e83236f5edf8d03d66bea315dd079b038ee
-
SHA256
e257f944eb3ce8ee6d1b52d5efd9d31a80c92d5d39670c592fa505d2b4d5d6fe
-
SHA512
3d2f125728775ed223be11be9ed1f913c310ea96b3611d0299fb9bb877461e6985f7440fe8c0960d62bed71a3e38b36a5909a8b41a7e25360930f3a12b2fa7a2
-
SSDEEP
3072:/br1Xphna2D5rU8kNzitHjlTtDjhHp5sAQLqrMyonch5NMmwMGpb:Dr1XpVa18kBYDHT5sAQLqCeRwXV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{78477701-5889-11EF-8470-C2007F0630F3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40a4183f96ecda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429615159" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000a25c3156c80b14036c6748c615ca22b17ab4642deefab439359de5c8a5ac2d88000000000e80000000020000200000000da0d63e05aba56579f615b4f3fdc85f6ac1fde1d58fcbecab6cd3a9b0a5496e20000000f520d12d0bb88ff1601795e96a8be3bc003e1805a4972e3d3d24f7c325cb95ab400000001d89ca6a37036dd027c4b6e95feff66b591f122f5986a2d3a915782e6ea41b7c85de92d0d32519ab04d1180c9be68c44805bedef83c645385918b568d6748786 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2824 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2824 iexplore.exe 2824 iexplore.exe 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2728 2824 iexplore.exe 30 PID 2824 wrote to memory of 2728 2824 iexplore.exe 30 PID 2824 wrote to memory of 2728 2824 iexplore.exe 30 PID 2824 wrote to memory of 2728 2824 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8e1fec5ce582940b0e8b8820008855f1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2824 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5252bad881b96cb68030c0ca01f109d31
SHA1e5ad591c488be68f745363ce53c164883ceed6ca
SHA2566dac79be079958313dab3c93c4f9f9875e1c34509d867771f90710994b83928e
SHA51277fabc0aee4cd38a6c5527130a0cc2a26b958a6279b41fedcef3b94ed8935bf897aacb955121bd17dad05ff33c276c4fd2f057f57abd43752ac8b166803f3900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a04a493e632cb9bd6054dac2f91fbdb2
SHA17a7cb5bcfba72556e2499dab1b2f80e60ce87419
SHA256bebf84c952ba3dce347efcd351f358221ca96827d5326d46105fbcaa22931c07
SHA5124ad8985952b2b20584055492d58b760901c2259bb684991a46b37f97fe8bf53e9e1c815becc25c57829f1d0f85f6e16bd3a89663e219dedbe206a4255fd56aa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56626270c5b5d9917ce3b67c9fb74127c
SHA179449dfd135a299d12e1ea8eaa3bdd4d8a2fc754
SHA256456eacff330e03e0e50ecf155b6a85ed62289adac806eb585662dd9a7d49f7f9
SHA512d84fc536ead2fd8317d1ec1adaf8daec54948ef9848954cb7543ec75e5d211d8ed61ce69d9425720ac840a43f64e12122714bc2749ed24972f50e1351e6a19bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab468870a92b4b4d6bffe6a7ef95f7bb
SHA10df2a445538422c96b27967308a9a31c3986403e
SHA2568339f3d74620a9d4ec2e5b9abd229d5ffbe2c699dccf3f27cdb2963c150181c8
SHA5126cd9053268ad320966449eb3ca4426d8812fdb71c2e7ca18fee227dfde194002ae911922b6672998caf9aaf29b7541fb93fcbb8410f267256baba8a80fb5b44f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d275cb00b5c7cd6b895d1ef09d10037b
SHA15b90ffc9a252ed3fcb647635dfb3daff3240dc2b
SHA2566da83d8b870db53a2430d5ce7f9bff7405ab99821efaec0bec815e86ce70ee18
SHA5127e948ba0012bffccc021622748c95f545c61229f38b696f5d5b5a1061073360c8dbcb6dc79c926ddd503ed7d83ee4414c0ec40ca38f632ee80edaf05f82ba862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ecf1cd4ef9ce64fc8dfc5bb12f41b42
SHA149fe566e91392a34b7eaeed6ee67fb294cb82e1d
SHA25617278239de60e78e669d8c178ad2c37a427878f13b09465a6bc96aa10ad63dcf
SHA5120c13abe92203f8ceb800b7276a88cd45b90d3446b9784f021ad3c7cd424efe9a077af980985396e7c466ab89f0c6f2428684fa511c6de1dd46ca791adbb407e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564364110fa929ec64aad9ccad8834fb9
SHA11e78b8d469132282ed1d71caf4b6200ca87ba974
SHA25631f2c2a87b5f0a5517cebf08ee97c7ff9f86910c11d8924d9994407d141dc927
SHA512a332a3d6aab7a540b08ea916640b2a3bb38264a9aa75f4bd65d8e08dbf5711df1ab1fc93f8f74e9f610129018c000e42468f3832fef88fd7daa1d6729ce5faf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a65295fe3cc2d9233f6d07e5812e6f1d
SHA186fb20ba96d13b1ae6cbae5cbe789ebb360f18d5
SHA2566763882d0bd67de847773264b8d185612fde0a27ba1c3d249b6dcf2a9290e701
SHA5123b1bf4579159fc849585bdfff575705ab5394241713accee274be41cff9796dd68bdb2f985089b30a5dc775a27a678d82ba7894ebc514b3a69b5799df0afa6cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b53890c234cfb68e21be5d542ef263c
SHA187a41275f2b4dc6360c95b9a77fe532f7aaba725
SHA256a51fce02eb35dcde182b6e0b7551b5b31efa40ac88fba6e26d1f7ebfcb79e20f
SHA5124e6f39a4f5655cc8699ef0ed020ab571981f12a0677e3d9c494fd42af507b3b6b1f6eafe241c97fd615a7e204cedfa450eed8f27a4828423fc0b92b07e46321c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f38de9306aab24bba3104b26ddb4e2c
SHA147ca77f98a6710f7334d9491c9ea26ca4e32f007
SHA25645699ccb02b5862c02172b5c7a43f91baad6993c6d3e0b3cdfe5328592baa300
SHA5127cc1b0f07c915db4f6127b622541a8d9e2ea53056b1338c2022d7575883a42b8c0917cfb46ba0108117a101de20dac3d43eb6092fa416c2f9dafc30600463834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e12fdcc3f6a20a658f09d2a3a47b9239
SHA18c576b1bba4fe43e53a5b139f5106067dae9adee
SHA2561eb2526d9169d2beef693ba2115eb8ae3cb20f8dc07f45f6407d74e922751297
SHA5129dcdedc2c6a34b01dc45279dfe68a5bd6aac6b64c9a9273bcb42f860903cf87a3c380709aa33436e3011329edb259a57ae7b78f57f7a40b888bbed6eb4a7eada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3c65f1cc18d258fbfbe1bc3e0d4d531
SHA135dbd2786b671dc0fda27470df26f4b4c4a77834
SHA2565a0844a0cbee0af94e8b217ff9b1cea6d1061d3ac08fb7c875b2c5b136b1070f
SHA512f96ace811187ae2aef9542e8d8ab3a29edde14ebf8689e4b41956af36973f13b41f5a2bebb547ecb9f011ff586cebb1d6e34e7fbf63f4a89c45ada4ba287c34b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547a6b8211a0451532eecfbfd827aa984
SHA1169f3dee0339abfaeae8bd475e8799fb5f610006
SHA256a336928cd903efd9edcb261f1b3c1ae137c5c20b9fb4430cedfead22048afd88
SHA512404417e846566208e367063cebf67c3b60d801685c409df7afe8677456e1c889bdc3b0569988f596123f0fe5194d312a8e99f44aae7c823275f80114f37411b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575e95be9e67cac3e1da2602a91010683
SHA154fcc96953fff22dcd79e097f3b635690eba74aa
SHA256d968d8776e4906b7666d33713ded71685d11f9f99b5e8e5a8634b37408b5e73d
SHA512be1192a80703e0c265dd10e75c7e32a31d5d96004bd00e96a06b11e455950883b0023d4c12eb6430d64ba9a58d3f4857eccd5ea865f74497fca118f2de324e98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501ece2c287d749eb8c8bb5afe7dffffe
SHA1caf318d3b9095f446a4c4fcd83de04acaa004770
SHA256840eba9dc648305147b95fb21f69620dd688a54cb0895cd3afc9b56494ae2b6a
SHA512e4fa089b0525d616b94648215e2d1707935c0bcb14e3ec8a60f5845a157c04719caad5283dba81b8eecb56214557afd8ad6dbdcc0fdd89becbdef3fcd25d08fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b1cdbfe535a50cb0dcd82414e9b6b2b
SHA102c74e0cd1c50df2d0ebbae3359974487f9c9010
SHA256105b2095292373265f7be3f78a91cde3d497a78d86e9a480333bf5049f439332
SHA512bc536f5e7328e92e88f69b11afac7ece799abfa55c1a65502f5a5b22c4507a36fc21b6ec628d411b2e127489fdddf36a1a93f5a032220e958d0168a9dad1ca31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512730559bd2d6c4f486179c725763fc0
SHA1b472e7b96d8744ed1d33b93d41bbfd2581ac34e1
SHA256adb8e390a0d819fabe523e0b39183618c01ae9ae4fc3a742a02d0ec74b7f26ea
SHA5122ce5e3107aef7a6f7af9826d5cf0fe34e447b180945cc59fb5ffbead9f2711d4155e025399bf3d030a651f1704649d73d61ca482be46a68ee2a9a8f512c98336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d52f6172578b0fc9301f6968f84656c3
SHA19c0c193271321601743ff1c44738b48e32d93f98
SHA256ddb9d7e39414a09c6e8e445b8f77f5f7638f5bc9bc7f102f3a87a29984ac59d7
SHA512c478cac6ce0e2d85ad7d07ba8fd75639e042b665c1cc0b83d60526d7daea6fa7aaf4185535326a53b722d7fcb4395f98b5224a64339267feb4f1d3bf466132ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520971ecbd74311cadfbef43eb5cb9154
SHA175c7853a0d84449324a99844916ac02b7798bdb4
SHA25626b352b7a820d9ac129dbb3dbbb27f917d1797acd733084407d8902b356780ab
SHA5121c7ad7e17380f900897b4cd536b6a8ef15f11d67090d1bcf748d4effea3f8f3d80ab8321fa2fa1ac66193ecc89ad0d7560a5a3098d4d4f84e494703644a64939
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b