Analysis
-
max time kernel
136s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 11:36
Static task
static1
Behavioral task
behavioral1
Sample
8e96508defab0db20f472b0b56353417_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8e96508defab0db20f472b0b56353417_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8e96508defab0db20f472b0b56353417_JaffaCakes118.html
-
Size
85KB
-
MD5
8e96508defab0db20f472b0b56353417
-
SHA1
7d0284362778c1cba3200b1a1ed18197a4918506
-
SHA256
0f6cadc1bd1928d7af09a54fec6ac1c187a67c74480a3e9a29f7f6de13b942a8
-
SHA512
e45bb541d776a5226b514ad632f9b934f0f7e70a43f338a1ebf694da3666baacabf811d3428a39ce7058120e2cfbce7e4ae9f3be69a2b69116fd7314f6445ca4
-
SSDEEP
1536:8uLmkQk1zhuQ4lmNgpVtxB9lPVJHiWS0n6I/N5ptmj0n6n9I000Wyt9r5pq92RtK:ukQkTuQ4oo9Hij0n6KN5ptg0n6n9I00p
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{213D3331-589F-11EF-A69A-C2666C5B6023} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4000e3f8abecda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000055aa044ef2eb6ae25a1a803115257d5313fb840b47957ac9ee2a6e6a7fa5aacb000000000e80000000020000200000003d8597345ec129e549f14d52c7f44aafde10a2d6a86d4421399af08bd51fda642000000016e8101151db2bf7a3d633b83172cf4f2e2c71fe22b5fb4540e44d7b291cf09f40000000ab9fae4a1fb9cc1daa5dfdc739fa54d879e1a55b55af7726380679664d5519c3dd3519760429aed4d898a352d7aa2e4fd749775e73909b140d4e6c47bbb5c5df iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429624465" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2144 2072 iexplore.exe 30 PID 2072 wrote to memory of 2144 2072 iexplore.exe 30 PID 2072 wrote to memory of 2144 2072 iexplore.exe 30 PID 2072 wrote to memory of 2144 2072 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8e96508defab0db20f472b0b56353417_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530638148d60a21e5e706d96aa6b472d4
SHA10e1d27b395849f37dbac94fa850012470c9b4fdc
SHA2564f6f3e7a499c8033f7bb1d565e209d26f230af32b0845840177ddb6e2735a422
SHA5125fb28a5bbfbb87d4cf8b0a023ae1d9fb9ba4eaf041d260799f60d3ee5426f96f6b11324e372d2dedf1dc399ef60818f13c4fde6876e9c065e6354f4c6bf2ffeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3f6612aa554ba44ad9088ceb6ab93ec
SHA13614598793de72d687e19f10306aeba5e946e4ba
SHA256694d81ea8ab9c7e233695b7cfb80c88d1db9a26988b411d761d2eb0b9a15249c
SHA51231abda2c589eee3f4c799659c4f7e99d8d4984f211d56a13a105d927583244f01a4bb84f0e608d4df0d5e64c308ff29c2ee150aedccd17b862b9464bc71555b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4c744def720bfb43c22cd736d9988df
SHA192f96c82c6ef53504986f6978e59e4f627630004
SHA25641966501fc92a8cd38e64c792db93346353b38fd003a271d79bd03bdd5268576
SHA51233d2c9df4b510df865d348443f919a2ed2ebbdcbcbe37a750342720532286fbbfce1a1b28cc9826ce887561b629ca9f857bbd002a26eb05346f7a120f33c256f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d417646a29e266aea094a75fc09719f7
SHA16081e54d60a3b24f5377b267f274ca254f62459a
SHA256fe327b3e1fda94bd4f0704e2d6bd3c9ae647ca5f364ef60f25811b8e0c1c43e2
SHA512531a5d816b321778674bbc4185045d805544dc877a3b76be8df834af2635c74f9659c37059496046bc0a8dbcbd4230723b45ac644014c63544d747bdcb567279
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b3cfebe1242dc3bb28efdd307180b83
SHA10c33a32cbfaf1b60587e8c3da897e4392497cbcf
SHA256360e5e6b8118d872e484b65d4f8ff8cc43129e300597514e26dfd4f35156ab8d
SHA51246cbe7b8a5312691d48c6fb61118e9cd7313bf192b900bd98c530782cea7d466d8b08ee1af7af9e8fba66702a1a472c8acc964f5f04f801bc7811f41b13fab7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f0cbd8e74e6f60566b33242f8417fbf
SHA1b49f575f6ea0a9dbe229aeccdcb7731b82c68911
SHA25635dc56e00033265ba3672f7ef4b990c67d531dfcebe807bb7ece02ab1ab80a22
SHA5126e942c8d9b7cb63d39e3e8f3b3fe82d1b907f1564c6beba710163fb25aff4271de09c9f39cc36e988d3ce7ceedf5df984505f166f114a2b7e474b08503fb4c1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf753d549cd66ece869b718f118fd542
SHA1f92ca7c2642114617d798f87b2dd9ca86b5b1628
SHA25606e2c40fc6ac4199c7a89005f3809c4d5eed820fdc42c1310eca28c2b76df206
SHA512feb7fddfec58fd79fc6dd06762a1564100236f6cfadb76b805658a8c05ad1f52f084e180ca3e6b452b9dbdf244530d3753304bc93026b2be947f99bcbb77a579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d22dfe5c3e64a67681fe93251e8cc24d
SHA10d83b2795a59b379361d79c7a2f53337bafc88ef
SHA256bb559111e7f57fa555e8921ae078065a2df9168db12aa14c98de5a4ab908bfe7
SHA512e137659c0bac3dd6cbb7a3f8ba69c728b7e25c3a28c763207f8f175141f62c08adfb6e8e779a395a951840259e82992a80207b9005be0aef144350c1c8ec288f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52081628290ca255e6837a6efcaabd4a3
SHA1f6f2d35eaecf5f07023bd8379bc994d8f23c2dbe
SHA256e4f9932969cc752430cb3de55dc2540eb8cf0a27928b472da3f697ccf8b688e1
SHA5120b3862c53c6ea9a41d210e8fe838de902b2ad2c829332fdd2e6ddb2699fc33eb030fc8d21005fd16ce2b599399ae84e7c1f0409d7b8a008975e689322862a1ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501d8279e94133e065d0038cba80eb491
SHA17bcc398efceb80998d7f3c041d681ffa630bfb21
SHA256da2f803472c7d59c4b6c569f2af78a6dc2d8ef2e6aa0e0c74904ede8307606be
SHA512352037024108fa8815debca8a7d62bba29f88e63b04c85b50fa0bdbc13caf9e10af475c201e5d67402a67688e7037be4c2ad3a806fc385029ac78033a2043241
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5240e8a9c6ac2516f93aa545b74ff92cb
SHA1e88ccf9d73bfbcd99af23b45f3a3a3d36c00fbec
SHA2568bb5d73d496136109736a2f04372587ee8f8e000e20efceecd28dcb266889ea9
SHA512f3cc643cd048c5994685d9e72427ee6679c16577bf2e1c893414377a75b8b81e36015e5213080e1206d52dd86a300758526ec892140ebf7684e1d67c185e064e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d14578e0a124eb2fb10297eaf2ed33df
SHA149eb2c80445d02a3d29d57e4abb83f95ba551545
SHA2562d326e9fa70dad0da370dbcbfeb7d67b0c9d636621b80236fc34a7fe62a762a3
SHA512f6cb8971de713ab959d4e764057521629a7ba972ac3fcb48792e7a709cae0d85d523cc1bc834ba4e574bb89afde4ba0b6937111e043273051a17ef912d76d6a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b89544a644c05827b4cee137ef274f1
SHA1ac901ebc9673b40ee601868e59ca8dc09c9b7675
SHA256dced0e1d0cef5d1e1a325237a6b4c913a75bc68b665543d5e531e6362560ee9f
SHA5129d672e494a1bb29077d16b8fa86523389ceeaaa53edd4b4bb092c2641ee89e943197164615919cf2421372532d78068842543eee394c7a8802b75703efd8a3bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531215e999fc88516aaaedf4b1cd1584d
SHA1d037f738eaba9e3fa185d71ce61d9114409deb1b
SHA256acdf4b73dde55485a72f97e457122fb19b44fc0f501fb6196699999a10609689
SHA5123972efc61f848ef220304a03c352703dd16087634b6b21bc515d632d8de71291b62a9dfda53bc924a3377cf7706871aca141591e570c6da20c613273bcc321f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50525d8d32f2eeab7c7ce2420b141aa6f
SHA1903cf1bdf50a958e0a92b72a1de395139e8aba47
SHA2569c5199e3518d66616ec06c393fc36d17f8c26c7bbc5463a388f27f691c65e898
SHA5121b0ce5f50174cbe6b7475fe87bd6652792910107898e5c7500bb1da7057c10c7a0e48c8091c745ca8bc9ad86fffa6abaf9f0a3ee9c353ac13a594b21fde160e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef37b914c494000f047e57642b5a2f5c
SHA1b3d3eb894e61512398ef0176b74127865190c347
SHA256cccad2eb6f31a8a168183e19dc491e09508a0629734238cf5355ff489cf99c0b
SHA512c85b3bf2d62ebdf695c9890fa79132f13ae2c147573e7c219c0183feb1271466897b1865497bc88c7382c19bbdb5ddb7c67834d12c25eef7292e09f3fd0af61b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f268e5adce865265ecec73daf4e04571
SHA1fdc72e7f270fcbdaaf8b610ebb936ecd81aa5ee5
SHA25647ea7aee80a4f84de225099ef149837e6359172c8b5053f317600e4956feafc5
SHA5122361063e38ba61cace39be46a2d7e59235491ccf24232422d9cfa39c4ed9ae33802731e667e654920bd6af4da79695b3ef98ade7912737900097954445af9972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9600b521ae327faabd85b85c71d4826
SHA1cbce9a2368e5db7a4119c075916ffb1c9cd59711
SHA2569b576b0f46fec1764501ea8ce16d9d096f7bcbea501d51466728c0f0d0d4016c
SHA51298a7ab414bd92e21aa03f48398714f0c9bd279843e18355545be070970fe03753979ff4b43c0acd655b3dc78050b3fa448fd9a62b7b96efce65916c340934385
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55540e23e74f50ccd3073b5e045fde716
SHA1a46705f4caf8aba3d23443f45750be0f77005846
SHA256b4b8771d9c8edf50b636187cf0e7476fa338dd6ac82048a92a225c1ff4b30ac0
SHA5129cf83489dada5a9b27ecface5e899376a2ba046632a6ce226448892e3573168ace263dce470491bcaeeed774b25eb4a2d0ec85d8f0497159ecf9e809e7364c4c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b