Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12-08-2024 12:01
Static task
static1
Behavioral task
behavioral1
Sample
8eaa1e957660ceaa42bade122ecb35be_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8eaa1e957660ceaa42bade122ecb35be_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8eaa1e957660ceaa42bade122ecb35be_JaffaCakes118.html
-
Size
6KB
-
MD5
8eaa1e957660ceaa42bade122ecb35be
-
SHA1
fa5ed039d69a873e2e906c203a8155e6ef087ca1
-
SHA256
c51aa358cb30f5405de301cf4854ec0e03463abb89c4ac2d8370bbd28a3491ed
-
SHA512
77fc03459532e30c07985dbce04cf0bf19dea0a44f916bfa85298c0785f4263dea95ba40372b25f3574d1552268603cd54eb4e44ca07faa32ed6f5bbafdd03d1
-
SSDEEP
96:rMsmnpVx5G/ZBNtOzbiDThpiA5bdp5sCXN6Tmdc4wJxB/MPE7ViASDbLvC:mWBLONAVz+O8iDKUlA2bLK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9B29B211-58A2-11EF-A4C8-72E661693B4A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000d28255b9e4542403b4b5d1596864433d691532180922aaef050d169f73c5ef55000000000e8000000002000020000000fefd47b572a2a103cada39c173c1cd710a508ae1ba2523051ddece7224fdc368200000009be7bf648a82e39239baf29fecbadf11a8feb308390b3f54ea893c0d79a1197040000000b07cc1641e4e9816464cb9dfd8a52850a7e9fef2e673b5cbec252960168c9152cf252ecd8feff4ad8d81d5f6a4893aa4d23fbe629002655a37ee34b6382c86c7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a04dbe71afecda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429625955" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2888 iexplore.exe 2888 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2392 2888 iexplore.exe 30 PID 2888 wrote to memory of 2392 2888 iexplore.exe 30 PID 2888 wrote to memory of 2392 2888 iexplore.exe 30 PID 2888 wrote to memory of 2392 2888 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8eaa1e957660ceaa42bade122ecb35be_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b00be6cae060d0ba2ca4e2e4716f5cf
SHA1c0044d5990642108015c75ef871cd50260770cb0
SHA256c439151a55204574a1894a26adb09bb48689ef28dd62b3461b3ab92393abe549
SHA512da67b183468857773178067f8deb830f63d2cd36c868c0fc4a28da996b1c45c6807a822bb8761f1426b47603bd5f76447e5606a815f2016a3585b5e4a1a77500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff3a6b1c85681d8d63db0af6c59425ec
SHA15ef9d916c15ba8980781127d7a461ff238b3978e
SHA2560648af4cd7d23d697667228b98ec411df69cf3dd9c81080adb26908ad031b7d6
SHA5124f3bbb5923ad6a2b23739aa56f80edc98c7277fa3319ae7b579d32d1b78a87d731876b1b69c11d964194765cf64f5598bd0e49844c254c012445cc151d1bbecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543c02b87036a2090c4a790bba0ea9473
SHA10966669e9365f9c32ad7087a04a1c98f89972fd0
SHA256f3bdd864f28dc56f0e82ecc9e87417fc40aa55b572205bdf787fe84d8fffb1ee
SHA512e7007e3c6cc7c429eaeea16d74956dd932249ed10c59f5da69062bcf2cfbb12dbd0739d42f827e4c3cfdcf0e718b2af15b7157a840dbb87e82937c4a8b3cb05f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a41b1408c28fbd51e63b8cea2873a2e4
SHA179455c21c50d9433e5c900dd7a07049a281d940c
SHA256a2925d98b334004fbfc8f66dfab55a9fc7261cf8b906900970a0526adc5f103c
SHA5127deb83a073648193fd189828125ffc6db2ab30956657f5a30628facda67a5501e3e4c1a6574eb289366546f7f742c99a2ed28e4843d7576ac63655a0f0efaeed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d8b37cce106c7f2abe689ca4d4b71ac
SHA168be6c41a616fdcf726ba1aa5945e06564be206f
SHA256ac646a14972cc6c95e1370e7a3410cc3d39f3fef6252a5443593e992d49ed67a
SHA512fc5380c47353006e2e8bce3c9746ef612edfb096978f2b345896ba8c06accb553c7682fbc6c766079c889583c6dd32e3fa85b7d4b24d612b7fdf0c8022ef6fd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514f6fccebe6d1440034b436cbca59599
SHA127811f4bf94b24b50fcc8d425780a0778d6524c1
SHA256d6157f7e0ee0ed7d9986f7615d0413802373de02a566f1de8415df2a8dc24e31
SHA5120f70eab15da6d171433f24964c4b27ad1caa57987271b9c933c4646d3b1848c6397a1a21a5438ad0548af602163089d8614e965434be2edfd5c1408229b9c2bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d09cd43c0f64c10e63652eb377277a16
SHA140998edc98cf5a7e23472ddb0c2a2a328d32379a
SHA2561d01dde42107dc6781fcee17087c23cc59620c0374c33c4ff63731f9268cc98f
SHA51246882048b882d62233733d6982bceeceb8335c5539848193b1d3f101f9b067e9720abc4f084e3f0ed2e5464bf2f919b9823577757593d8f2e1cfb39bf9db1bfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a149f66f59c4f26aef6564d2bc0336ce
SHA182a55751151ad982ec07d53b20b218fa1f4e1025
SHA256256a5ae42432d35bf052a84316aaa5fb445fcf9e6b30584603516f7c4914fec6
SHA512f8e3f09b3421bcf7fac6b884c5f12b2d878c7cab31bf06cdb3dca36fd5c0b4ee0554d9c536c49d33a1aa1913d56b849e70dc7d5b91816da5b2efbb1e0e00de9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c7b1136f3a14d472a275eb19df4ab0e
SHA1072f22fa0913b29db384d6d73a8aae76721dc77e
SHA256456a411e3a61a2be74aac3b505346ecfd71323cf510c687ed4e28df77986f806
SHA5122047e096e27d2e237a3a14d85f4bac43e5ba28ad4fd5863f08d3b73deeb3d10a7f042ac78b78ed1d6de4cf7301d185f58847a7e9444c06bdf290a2a36918fd30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f0596ec333c70bcd04e913b4e84a446
SHA11a50d586b13e36cab89cbe6edb30f520a7f09245
SHA25656f1c852e9d4891ea7eae8e240c428d985d52820172e4efbc4334190dbdc7e90
SHA5127c1224b0663124d5fd36432924ce42affcc896131f1981bd93421c62fe790a2059d2d7f1c313d6f08e72e48b40ed65f082fc6bd0212c553fef41a4ede10aee55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510dde149e8516fa1e217eefaec1e974f
SHA161235c76c55cc2eceace1d777007eaf2de1b0b8c
SHA2568de1678f3c4d474e4875bababd30b3a3341d0acafdb3bb1f6e8f08cbe588647b
SHA512d15af03b59f8911890df90a9bbec33b74912348fdcb9e5ca1380ca9ae59f20ec1d7f24d2b66545058951460d0cea6f2a58724fcf2876fb328745b114089e572a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b41e3b59dbdbc17dbbc539452953c5c1
SHA1df2231852ee32cd5ff3871b031c0a16024088ad1
SHA256eaed1fd67ae6d669a1e62e076c094beecd8f278db95b3d728c5c3e583ed8d5e0
SHA51269b5fd3fad1ad03e6abc4e5a831a28b67f21033251134511cdbec2d6320e5a73221aed456caa5d2fa9430fc89782a542b6a9ed8d175a851095ebd246027279e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534d9fda72d0b56f9472d019a3255c0d7
SHA1000f5cb1b2e29b2791e928751b5a05427e395422
SHA2561261f13df09f9c06cea22a5563ebe7658634f79b61c72f20a096856d8818e7f9
SHA5122733a56090cad82ef86fc2cfe488a838950dde1c75bfec1aff8ca6c9b51a0cfccd22decaf64195d757af0552ce205ba18ced0b9b100d5ad0b2c2caa12cbad5e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58791124e762a8d739059f6073640bdb2
SHA1792f81bcd2f7d041a7faf026980ee2ef5d1e5bbd
SHA25612ee5aec2f1b5f6ff98eaf6d327dc05b92da3d291d2e7e02032e1664e787dbb1
SHA5126a823e0c28f423f64edfa4529bc6f58fdbc0e51e166fa9883acda78d3ac2b95ef8c1ee330f0f54986f1bc1244f600e7dde40698c31dc486d57ec3bf9a1277b46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0e90dfe8fe4fff5a6eebc2c2b856d61
SHA1327555e23743d1f40151a49afdbd07838890d072
SHA256d63fd13adeb43e1aadc4bc8b74f8181a9dfdf7b89173fc0869713f96148e2eeb
SHA512d6d586e355d6e77619a72ababace3d383302ab241f1682e85a98f2c8415fb90dab3d11ebddb7cbf4a71c9ec73f3bdc7de4eeacfe7cfd098a472bde428b386e4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd8bf1f8a5f6dad12c39ffeb18d5ea19
SHA1f9ee9dad7702667fd799d56bd8daefc4a25d0ea9
SHA256b203eacbac0ee657d0680751fab6ddc4eb14e5162dc38a85c17e6115df629577
SHA512d78f9efb5c11bb07f682a6374bc08c8dafa60c5c9f2414e0b233f20131715b19aa2bf147ae0ff7970343b991a1c4c6b24d722414695d1de838a1dca6b1025a98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5621c0c9096c09817b42be7c8c2c15d7a
SHA19fef963b215a50b45cf7fa952caff13dfce35077
SHA256aa972b7f5ce8f2a53eb97a1fce66b70f7d875ea403264a471c2a80b37e52249c
SHA512333d8bbf5fc520b88f3a5c55b4db6a13e1fce7720f908b990b494574cad66a5443d31de55b308fe0b4f96195bf7fac195126d6a70dba18b77916c6061f60ce49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c0d496ee11c28585e8830c2ed0d4ce4
SHA1ca481545230a2ccf278e3a019b92a93ee30540d8
SHA256340f7b99c85bf66a4fe7234d7bd04e79b2c799b1d428d03b91c3e1d891173789
SHA5125d56824d523f2d68b9a88ce1643ca5f4f854e2b820102e4a90e7346d3c66437d8dba08f28548206ab50e0e8ee5e19cda2525703529d573f941be585f0d524d18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e59fb7a62d85fb4d00cb0b80b472adc3
SHA1b2964289c5813c8372d9f945312c52719464a755
SHA256e566b6a92f4e91d2da4df6f41fd7dba9c7a3a6b7559cd7088f33cd6de96ff592
SHA5128b508286fccc9f56c085cc8c3f5b087f1ec67dbc5ff3f484cb65e48ef89130d4a91d074c2118c6afb85829bdfaf77b0637f84e5baf576eedc3fb5254c34f7fdf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b