Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-08-2024 09:55
Static task
static1
Behavioral task
behavioral1
Sample
8e47b46660c20aeff753f9118f007fa7_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8e47b46660c20aeff753f9118f007fa7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8e47b46660c20aeff753f9118f007fa7_JaffaCakes118.html
-
Size
16KB
-
MD5
8e47b46660c20aeff753f9118f007fa7
-
SHA1
66f61359015a8b01cb29f35ca50ecf362ff1583c
-
SHA256
70996ec284ccfde11356dcdeafde84178b175810db4fb80a3dafdfd78e36f4df
-
SHA512
278b90846e2742cd614775a24dbaceac154b5d17bf5cc8d816c3b47b2ccd8fb7faa4503cf8eeb7db12948ce4fd20ec8e3976811720123a6af038c710b3247fe0
-
SSDEEP
384:FJbzKuZcOlr8a0NRGsX66nXOKxNEgFxSpQIxpDBbQ3gpwZEhQr:HbzzcOlh0NIMXNF8tMzr
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000d8b64bc07d30afeaa63ab47716fc5feb6c52e3fffded432038415fd1ebf3defa000000000e80000000020000200000009002dd63a55a15c218df30f71db3cef9e8424a80a1c055ed1576f9c6e1ce54489000000010fde762c214ae8bd065455a530d1069ca89694bd65d36ceff67cdd1bef60c30bd022bc030222ffb137a1b53e5899d7588cea5872829607267f935eb781eb7b94d2130ffb9b50560fd835de1fdc0e23ce675897b2f527496b60d910447fde1a1a2db80058fc5466a00ada3e884dff6a5f607ba03cf5c8236d471792b96b7dc0ed43d4c11d16a07ffc4316f83f21580ec40000000756dfa86589642d11a5f7a818444e849f9941d0296699da8fd9b356b2b9f74b2ba757816cd52f1ca83d2be43439f9780ea718b8830b3e798252054f7573cead3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000e1719db56cdc9a45563bb5507c78fc66aa2ed03a383ba61b17efc883968eaaf3000000000e8000000002000020000000ab5b25a1ed36ac754af1d05d02e69c37eebd3d6511f76d1078c307c672ddce4e200000009a968fd94ab3f4cc6e7537ac0e74d6046c4d32884be2e276b5d5678290f49c8d40000000795b7ca61d09a8f046e50854f9ce130a98da31043a56a0d0b5bb13068c2f008b90cd88cc310069997234553464edb893c8df4fd54d4f1f38f0b2d7a5805eb29e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F195D4B1-5890-11EF-B34E-E29800E22076} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0f187df9decda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429618369" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2880 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2880 iexplore.exe 2880 iexplore.exe 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2192 2880 iexplore.exe 30 PID 2880 wrote to memory of 2192 2880 iexplore.exe 30 PID 2880 wrote to memory of 2192 2880 iexplore.exe 30 PID 2880 wrote to memory of 2192 2880 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8e47b46660c20aeff753f9118f007fa7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2880 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57145b16b3fc8404c6baee35d15dbf77c
SHA1ac59d68dd4ccc363b78a99aab51f3ba1ea70e75d
SHA2563ad8ec5d66a0fd29511290b6ef57806a272f910734d0aa07046860e9f1a19321
SHA5120e9a53df2b59daf63696ebfc5376da949992f357c121ec8baf8d0e9e920e8908527c3409a8a90dcb43cf5feb98fb1072e25021dd144a62f6c333608a83cb3b02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b1ace724db0d662aca76443cfd5a8da
SHA1880d989888fa12fa28abb63aeae79f255bd142b8
SHA256ee4e137a61f6b79c657580e2d0bf241c374f89f0df9e282da750689f585ca881
SHA5121d6b86dc84ba700a62d09a991ea688e7377d3d8c497ddb12f6b766422780559cdad4d4d7f7d5c2e11ed30be5e773cf4b584c4b45bdb5d443e7c1e36919e0d819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cab30098f717b8a2ac08d7784a84aa99
SHA11cf5b87aa0fa8d4f124003c46e82a641964643e3
SHA2567fc7fa98a2a10b3df040c21744c7dbb843f9577f9d013462cd54a2a8d15007d6
SHA512f42f52ede35e5f8184204df00ec3a7cea17c8af1657090c86ce2e8c7f7a2f9e45e9e6ca7c6d057741107edd7f640c9cc2d111a3416ee56e1464db3756a47ccfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563b492cc524ba66f1c6377c48be38bea
SHA105222f307fe689f5176c31e4e90015230ee51aa3
SHA2569a899b069388b7f36979d1eb93457a2eb9ac89c4924dd88119eadae2c533a0f4
SHA512b9b74ec12999452ab74f352d6499a2698ba9de09dbf9565094838fc2d08055a78093c9de523a82d53d749ebfea4219f16d4b795446be7d0d1370078257bda76b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c576499df626dd1891bca4bdd35e16bd
SHA10716a63bfafed9421080b2af6b09dd70b1280e2f
SHA256c364f8c682baaa91472dd443e6ad5231d408612db61011545215661d4ce612c2
SHA5120e6b3233724ae4c5d328c0c954a7785a6c3e0ded51a006403a5b51cf8fb8603b3ee2a25aa7d47b36352ab5cd450e46111624ecc7734795f0305954efee021dff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d138cf2b8a9e89c24556404829971b9c
SHA1ac7f3f035d7a2a34b6c9a9dd9fdc0b28b5cc5b1b
SHA25692b3b1aee01fa0c64685fce1990033c01d19acbdbc12686db2300a06cdca7aee
SHA5121107a05562889a20690b84a2dff2e434741a4342cbb82138bd0fb209495d7738468b8ee282c1b85c784099836135ce4d988607967d9bfff9227f8d4d2ecc0e57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e972575db54da37de93adc0573772843
SHA11a63c7186c6d37f0fdaca435b4d3ef430163b612
SHA2562a09a314afbc88cebfcce81dc24434ea0032aaa3d3bc0866062c8d9101ecdc99
SHA512b075feb4aaeeeb3c73d24cb4641179df719273417190dfaf4e7af9abb0b2668a43d195599a5b33da2fb2f92c011199604afd432a305c0a0959d0f6282b320e9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523ab755bd7d4a3c94cceae8db369a277
SHA132c078a1ea6186866d8ebab9dc73df969b782d08
SHA256174983413e4dc8b1fe6fa96dd40bd404e6941fd4b0a60a67590dbf9dc257cccd
SHA512df911341c6a8c20f6b1df9e4cb683a05c7dc942fa2d5717fd02c22b07d84e9d4311b428b37ba70c884f45a1f82bcf4e475299e037ec29ceefeb72e70f11f3878
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab3ef6446994ad4a6f6d06981a2a9353
SHA1d6bb1f8412d031f952dcafb040fc877d1e80c5b4
SHA25661afbbc611c7035fbae1a41d42b9b63db7398ffd92343c116a41db6ed24f1e6f
SHA51277732cebbbd984ac89ebe2878e3581d95aa150454b924e1569c3d93392b10b1d5a84a75a048bb74a28fe5cd5a2638707980587ce6745e601b13b885ea8016885
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53506ba7d49b2afc080254ecc5cbb255a
SHA164554a4cc1ce3158b00f98382760ca839d146ee3
SHA256a308756dce4c3a2b6669b9bee01959168acea594f77b55bf085d409fad4eb7e2
SHA512d4c9139f1568b07bcf5ddafd4a430b916a14e2840e00a8fe73eadb6b74f41f0e7d6a6b6436267c241f0d756429796b35a37106ba324129e70bab38c64602bf4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeda9bb261f3c90dbcc6739d0b7a8608
SHA1ed64a65d6fbc27418848985a98c89efaf2c0b002
SHA2565ddd930fb6eb11c6af5a44a820e8532b40462915268095e280f5ab8506f2b316
SHA512bf13cc180838701bbb0391b5c651aaaa042d7784487dac037c19b0f8046f43355a391d3f69e6c67d1ebfce4e03a5f83a1cfec11c6d3988e61ba965843876c2c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575f12c0417583c71474743c05ef5418b
SHA192eefc106a56e3e7d26005861de9369560ffd69b
SHA256d54e56b7d643e1032d308db835005ab2746ced345179c649facfd3af178e1342
SHA5123b557f8430eadf27d752c1041a6173918cf6a93bdd67407df0618d0e450156fa4154b118636cc7335046650ebab56901fe06b34d5c2b20e96a3fe9eed903d59f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7f72d33bba17251acd162041238ee98
SHA158079772a3906a009dfc663fc94a98b0360c0dbf
SHA25687bc1cf72b1acad3bc3c2aad7bcb6289caa859c0205729eb49550dda6fd03f57
SHA5120eb92fa2723e34657d1e3f1a4ecb135a470af42a9bebe2ccd4f97540685d48a6535ec8f0ba103db0e723d38007ec6f78ee334ea733d607c88d1554e276d4e274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1c64384c4e799fd1aa432275426a42b
SHA104f25d1c8d7143b38b3203a0343cf05f09f2f9f8
SHA25682c972d16ca79fb8350e23844df1d8a67406368ab668893d395ff1917c3255a7
SHA51287298fb36f61ec192d91d1966ec175f456d4bcdcda9026e3b4688335ce329bb02620fa87f601c15776ee2f48b3d1b90adf83e0582048edec67b2e429eb9aed36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a869597b721ad805a3dfe85424f4cd98
SHA1cabb2e083be2d3d5de3a8a2e44ea3a45a9442207
SHA256ea5651c8e63fb9f15dbc524d2001a67ddf75bd9bf89af5f4a574bea14a9360d8
SHA512d5f56b32cf26d132ce54094d7c41fca072faef66de3d7c8ce47650e6ebd3827c0257ac9b5b4eecc0b9bdc5fdae775051f295ab75b5bf993f0b7e8fb6cac81174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eed34ee1df2b4cdb31a5fd36ec122570
SHA1fe383a2a2351b3d8aa50f23dbeaa6dd57a095bb1
SHA256ec3d28539d7bd1fa3b59984d92d3e8c03449ed46dac78c8711c2754cafcde1b9
SHA512f5eb2e8d20e91c79285fb9519d62222461b67e49f2c1c3f408369c85880ac85eb59fa9a2e37bc124dc3629d64cd2d1e4776b535489e460ae8e365b2f131de496
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2b33224339189feec5e93f52345038d
SHA1ae6a8e052992bc9d6f63314f5ec693fff59364f2
SHA256796556b917f4a2447895ffdbc2d4e0abd32dfcfbcf6dd57cca3b4cb3068eca72
SHA512e8de8528d8d3348f160cc7fd05aec7301382a7441d234c043cdaf772a85e2eaaf0ad91ff060a0947f8d774878e1d854c648c83339c81a641568c71ef09ad4767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b77dd248380a52e0e72cfdf487d92227
SHA1ebf6151727484247e123150e430bb7a7b328f6ec
SHA256bbf42aa94b26968dc1dd867a78a795ebd071ca4c99dba0e6b7566a7cf6c93b94
SHA5125450b3837fc556fdd971befb93e0014f3a56a0a15649049130389beff7668122e01cc25cb0e263143073951a2dc17bc8b3aa81d755848764706bb621f78fb07d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b