Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 21:03
Static task
static1
Behavioral task
behavioral1
Sample
a8333c9a6c4abcc602d5aba791bf1f98_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a8333c9a6c4abcc602d5aba791bf1f98_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a8333c9a6c4abcc602d5aba791bf1f98_JaffaCakes118.html
-
Size
9KB
-
MD5
a8333c9a6c4abcc602d5aba791bf1f98
-
SHA1
ba1754d83a4f8882a675d181b7f277bf5edc167b
-
SHA256
d05cd20d86ed3abd7f8e11f8eecb580496a824278b8a5defd047b2570baa8aa9
-
SHA512
ccec6c906810d46a78d5c41be00109e5629ef16d3fc59aedeea6d9571c7e22ade716dae83d1d894cc363c688d58a56f6a51b6dc47f4bc1eb343c8bb2dde96ff6
-
SSDEEP
96:1zNNBxZ/Q5iRDWopvcA/XOiNSeGlbmLAKkJaU/FXAA2ksUFz2BYJQjq4+58O3sst:5/Z458pkFiNS3lbmsKiVXD3u1uCg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430176887" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000000035ff0897b1aa0453ac1bd2097d27e75ac45cffb1ae6d1cfea018c1e806c0df000000000e80000000020000200000009c3e3c55734811c1d40674b67fdb8c84057d12aa83dfd89d6f43f213563dfb80200000004ce4c38428adc9c40299c7882148a8aab8fbce0f0c7b50cad58e08852e0cc18040000000b776a8de8986b382b823dc420c37f21f5d5ae03936e8f95a54cb65ebec514700f485e84d46c9685c807b4e7c3270cc3b6eeb07b1ab334211dca22e6cf6ce6d15 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b024e32bb2f1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{56465E71-5DA5-11EF-9143-7699BFC84B14} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2124 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2124 iexplore.exe 2124 iexplore.exe 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE 3064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2124 wrote to memory of 3064 2124 iexplore.exe 29 PID 2124 wrote to memory of 3064 2124 iexplore.exe 29 PID 2124 wrote to memory of 3064 2124 iexplore.exe 29 PID 2124 wrote to memory of 3064 2124 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a8333c9a6c4abcc602d5aba791bf1f98_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2124 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d178acd3cd73b77ee122ba7975102442
SHA1724430dfa6c4b1889932ed83ec0861d6db3b9923
SHA256772601e2bb88957e1a79cde2b1d54bba9108d0327433379591eb19c6739f2721
SHA5120fa95bc2eee98465d826e0a7ca817b1fad40dd9a31dc7c637244ecacf0304564093d8b8eff00828f4fcdfb377980b32919b6690cb8d97b184ee0e6f6bff56c37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57154e2d25167f2d19b87da8682d17745
SHA1d12756b0ca0ca0c8249c9b251b3faf9540142efc
SHA25673e06b9d2c586a6c5feb67c8de3d5a0efce2b6cd715ef90f9dbe9f052a401305
SHA512a42e65d1be5177069a6b0f2bd710a26441ae61aa214f8d12457d60ce0ccfee22493a02519e9e5b45201b2c931782f5092c7b9ee1ce328a9340bf4be4b63eb339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510a28d848747cd2c086b90d028f565df
SHA15fcb18d7b1725b418cf29ba48c4a5e7177461cc8
SHA256e7b621063d437d4d82a8a9072333b1935c455b82253c65ff464242b863569a90
SHA512f17477bf493cc84b264b51c429bd716906401d0ce847e29f863baede125526351a70170f3ccf3aae57cfd3a2e3d273ee5248475b16b7641d9aea5d623cbcae32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51de749e4918e92f39a967a1b6782d1ad
SHA165cc09459841ef96c5affd00d20eac74fade14c4
SHA25627deacdd340538755c126acd5c8c6d7b08b2849e9a2bf2c69c63cee081058182
SHA51237692cc8b44add3a5a0de2ad5c4a7d00e65649b08fc8b455bd29a89fb264295af8087e61f8e0647fe9d1ebd9124eb9e6a8e79f9968898c470e7fe1b77308c577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0dab9a5d1cb12f64517a064efaa34cd
SHA143715d5319b70261985e16453d439e00b5606340
SHA256b8761a86292d0279d920d6c1de2c973479768c536b4e047a96102464ea489940
SHA512f914e5d151d7790816abf4f59c4984faeaad036cc800c85335ee6459add009ef91e922f21c3dbc5fb78398d6bf8f0c56ec5bd3afb6ce38e92435408acef9b5a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c74060a30c42badf1bf0760a1319d50
SHA1b418e4ef444123fda2608ed3021164534e6664dc
SHA2565d5975d76c0d555666d493c5c2f965fc2bf453413ffebb7671614f26380d6606
SHA51250897b93f0522710ba1013e305ae405d098f6b6cd787a89f539ac5051ec563f9c8fcf7c105931dc3a12be31c1b634fb2b9c015cf25fe65079370f8e66a85622a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50120e1aa468c1acf54597231e6fe45ab
SHA1ca96ad7f640dc3f537a372365ad1cec0deaf1630
SHA256165a1e8702a42be1196e45b98aa5217b0f58257f118b6433dbf5d8364e46bc5a
SHA512fc068a0986de20c2ac4bc81c040b526ea36b8567820f10ac73f1a526f69b8610444dce45ec19716cebbabc252ec91770bfe26c50ba9964049368f0e3df81d679
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508e5708952d584ede566fad34ef1ea77
SHA10e0fa38986a77b74d153f3cf706f69a75591818c
SHA2565618a3e9b12911aaa5b592e244d0d95b28e826d4d2323d5bbe518975e2290968
SHA512ae60c75b1a66fbd435a1bcb564101c112f52aeec96802f54abd6e251be579c868ab75d391cd1125881005d880bb45ff9f1f6b4bd78f1cb7b66a99e95e713b470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d58ef0ba5e4d594cbdd7aa64d1e41f8a
SHA1d8efdebc68c171895cd79a70df981a14c0c1a803
SHA25638b820b5f2fcd2c3c689ff25a12310ee6a9c1bdd6f70d320e2fb6c3d84e8253f
SHA512933e33a6e2b1e3193b96c61a664d03a56753d531e4f2b7a709598438bf98facc5b2e18f35577e149696d6e9c0e57011320f3368ec9d50e9adc0278cfc9476da4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57222d697fa031b2e5e704544ab2e41b4
SHA1e00551b95c03e8b6107a367156d0c08ffa21f2cc
SHA256765b365c549f4a86e1204ec0b49ce5fbd9d0572a398bbcf7d05fc6e718958d30
SHA5122994836348ad1c01d4a7eeedeaa0adc4fc1a1c657fc22c240281c2b70a38ba180b5caf3d0e3f159669817ec9968e8ab43ef8c770150bff8efb3bdcd0f618a3ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53484919ef13aa064764a07b049576eb3
SHA13db81f2a8945219c0db2227af688ae00657fe581
SHA2567c3e1b8cec6028c783f9f0e76ef5a1cb31f1605e2d6bdae49a4606e5f885e672
SHA512427a640bfc009f39529299be9fe7a4288d655e2059fbbfd3fd97b0655cf817892affb1a38b69025df9f4088ae79b01999298dbac1e91a63b90d4b970adce35d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598c12be7c283d4447c6a01dd608840ea
SHA1fd0cbb696a8dea0d2b5b3985f8d0c8fa939a58c1
SHA256e35c099c8d933ab48115e5e46281006f7e8db481e09328adff8b2021e44534fc
SHA512feb21432b8e27a9237fb7d62955d2ab127cfd3bc84c887bdc1f8b26a33a1c3684e0e41c7398d86b57dc6071d787eba6f31743841d51d63ae20fb3ef772523e1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c213835996dc5ace3bc6668aab983b60
SHA1213cd9646dd594ecba0c424014a5ca4e8e1c3430
SHA2567ffe11dc01eb10d148a24ece8afac986c76893d60e00afc712bfca066096049f
SHA5121cca55194e5d6f611ce5e0d5a301d82f288da117ff5e6b7cf1ca5c033088cc24122f06aac455c6d029e3beb5f775445c49ac026505464cb34fb58fd0104d4dc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd378a6f6506f0c1462b171173c73c35
SHA1519f75f693bd528100908e78b276ac4cc93c8618
SHA256137cc6ef6bc899e1b5cd33f18ec03796218abaa6baf2f6a02c2766b9ea9c015a
SHA512a670d016e300c194343b8d0be4de5affc75c48f91ed1dfa969e337fdaa28bbc16367f6cf228b35b97d6e80cfb5a3bf4689257d1184fce467c964e36996c529a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a3bda1e2d232ed30fde3b6aa1f1e37a
SHA14a2e4a824da18da9439a79163f61f76f261c4f2d
SHA256d65fcc85b52ad0b3a450909dd665ea2869417bf7c314f3718c73093ba059ec6b
SHA5125317188e0d974c3e2efcc91dfd4ac2f3c1d0c2fd5c32740d84347c4fa2abd907b9e686e051cfc53583cc2de355a324ec0a7c78657a614f01afa36cf101246b66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ae5548839503f39889fdbcd3498f28c
SHA1d7e306474dc8e637b0e4ce1a13df0c75f731f333
SHA256d3cbf46c02afbc160d7cbff852bd74a95eb1fc7ec23df985fa6cd0befe18540b
SHA512fd5385db17a4a418f3ff11435ffe6d3c8fddfd8efd99ccd9e59b2019a9155bb9803831a2d1675d1a1bee271c0a23277cfb4096105df0d113336f3b1e44787f20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e71d28fa88add9044a9e9ccb899db865
SHA1235ec919ee47328f3db02ed0c15323064c154012
SHA2561a895b4346741c8f4479a42d2b095ea1b2080fdf72677fd916467fef96d15bfc
SHA51252e889729e624602a62f8c0e58085f665c6a7ac85fdfe3a42c238ac5d0d852579ec986968fcf247c1c575a40a5788896f35953699298040af66e6821eb8a889a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5377c10a561353b572bd6e22d8990433f
SHA18637018b91c19ca2084befaf4854279d6a126152
SHA25676094d5c69977a29a088825a466ad5ca83f1cbd1eab66ab169115d9764073969
SHA512074f76af4bd813dc8147f299c14b3606c344d18eda36454afe34623657776bbb21bfe88fb0586602087dfa60b6644723df70d4cf878a1e46b566cc13186bc144
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b