Analysis
-
max time kernel
135s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 11:07
Static task
static1
Behavioral task
behavioral1
Sample
c8b3a1bafd2eab54f5ccf8742e3dfd93_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c8b3a1bafd2eab54f5ccf8742e3dfd93_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c8b3a1bafd2eab54f5ccf8742e3dfd93_JaffaCakes118.html
-
Size
460KB
-
MD5
c8b3a1bafd2eab54f5ccf8742e3dfd93
-
SHA1
3b8588c0d38694651f370bef9d56bc2bfe9c9f9c
-
SHA256
9f46a64e0b703aca1fba4b0b8da30787f03680cbc80345dd605ce374640914ca
-
SHA512
5e24e0befc3d096fc40c05777448c9dad613abe5365eb57f8054aa10f008f0cfa37dba351b98e5c32ed769ae6ced40a674b12746e2ad6ca618f7f26177a94a60
-
SSDEEP
6144:SW7sMYod+X3oI+YQxIzsMYod+X3oI+YgsMYod+X3oI+YLsMYod+X3oI+YQ:h5d+X3f5d+X3U5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 405cfbb003fada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D6D80441-65F6-11EF-B961-D22B03723C32} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000887f7e84900a5f563495887bc501e476a3c9239acdcc4337866133352cc31af5000000000e8000000002000020000000f785058e4dd2a38b64f83a089646a598390b986e59daf90f12b36c4ca615fea620000000cd8184c9ae16d883cfa316bdab0d753168c89afac9602ba767a0c24129b9fe9f400000005fdb715b6071c8e64dccbc034e9d4140c3dea65c12ca538cb7f6f9a9348a18b628b0b85643586cc46a4412ee7f2a3c98ae7f5caacfdc32c48adacc994dfee605 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431091501" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1488 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1488 iexplore.exe 1488 iexplore.exe 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1488 wrote to memory of 2516 1488 iexplore.exe 31 PID 1488 wrote to memory of 2516 1488 iexplore.exe 31 PID 1488 wrote to memory of 2516 1488 iexplore.exe 31 PID 1488 wrote to memory of 2516 1488 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c8b3a1bafd2eab54f5ccf8742e3dfd93_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1488 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f16a73bffaa84832d6032e3dd5784e49
SHA1db072f03a8570c33659cb67f58d5f3cfbf2a34fc
SHA256dac2526406bfd1df00860e346c98e4b6f8edc827c5bd50078a389684db3848b7
SHA5129a2ad25121cd00269fed49a3707860cc4ac13f2f96b3ed982b91aac2b95695406862b718ee6a4606267df6b9e70455e0c854a12d4453b57ae1fe19cdefa97f78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a5878c029a71c60d9ee63e0b8e548b2
SHA1422175c0f2ce3d71c4f9a3807f189796ff6305b5
SHA2560d98b27bf538758daa17cd915c70f8cf99d26961d776c094fe2650905f8139cf
SHA51207c48129f25eed9f8a6cd4040c2bc019baf6516c243211e8e7e1de533822fafe90d175625369eca468e068c4a2491667004000b290925b0296881413cbed4b32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5dfacaefc542c7e6b683b868b2161a8
SHA1260f633eb679bdc9e30d61e82aca75661704aa30
SHA256e03f416125720f4a78b22c52217966a2cda8d4f27253e596412b4c65b895d82c
SHA512f2f56d96b91f865f2b2444e54a6012edd5452ed59103126a3bb08e31d23943e8b5c0da2fb572b8f579a7d2ecc22f60385cf7b2259fcd18d6699f6a238d631315
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef1d347c882a9465461b9050b25c89b2
SHA12efefb912a72349ddd34bae0b1e77815e3818a4b
SHA2567fc0440a06983d8d9ae93e32f6669e92a9668a8ae898087ffb8c9dcaacf651a6
SHA512530dedad7084fd53b5c009754b878ec12f91052944aebe54034dd3598eba34b8b21a80063815971bb4c4e3cbd7e2431476b0f8d4557aaab792d4a43fae70b184
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5543d40f535149af4a62d56d39ea1c99e
SHA1c67ae05b1f739597a0e79fb4c420d043eea2a97e
SHA256a4e3c53166c951c72931ed5705b423a01e5c7d6733481f091c308c939dbc5c05
SHA5120352ea613d1df6076a4582553fdeba5567163120fee2d51666ed9c67922e87b998b47078b34620b0d4880c7ca5a1c3460e637038256ba164ee6657a3dea284a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594afcbf9d6944193bc290766addbad77
SHA1f2715396b08811f7d0cd832b6195ab1cabf162ae
SHA2565d0b05012892db0e88a9bfeb2d765de7f9548f48c952a08d2822db3611a33167
SHA512412bc24e11a08eee59033266ddaab59b9137620f3ea0bcfd75d6add5d9e55609a97f37295279b1d300121a402538c394bf42332c13a6767501f62895b2edf573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5825caaff63b164353f18a710e91d749e
SHA15bae02675e5d86838e78e9524a6e66ab94fc5285
SHA2568b9ccfe4b3f6b42dda7613bb27c2b9db30023ac9dedf6b19ce5f1dbb1554379f
SHA512d43b07a926132500d8854b35d7bb56fcc5867dd4817916c0553de76b21f5b01ffcec1097090b104bf10371f9f610ff7ed13474c60369cfc57e90ed7100a77e3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f16687362c350dbacf38c83802e83172
SHA1407349ead2f9eb5f6ed15cc0c0f8fc8e67291b64
SHA256bad869dabd46bcc2063fcc800cc6ca59799e33efe3d92d1d6492a9094b836bc2
SHA512eb4443225838acb89630021198f3e915703403633919772b9a147fb0fab0931185e679a2c52dd00f7fbe710844a27a48400562259002813098c7efbe7f6a72a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c2d5d993ba9053d407dbbc8232178d4
SHA1ac086e99c77915d0ca0f2fff5e4f836334468e8b
SHA25634c2097405ef1948bd14afb8360ca2d0df4d4907698a59563865ced3ee2834e7
SHA512c5841e19999e485bdf37b59d19547edb78734e93f81bb50461d9b9e59e7dcee36d6dbd62603690cdf3a4ff7dcdea1c4e300700a77d14ae4a78dbd4beddccd9e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55215c335dc21cc695e213a3a17dd13b6
SHA1986353a4a9a4f2aa7773d170c02644ffe35d17bb
SHA256508abdfaf98d54552beaad0a5da37ef9592687cf9d04f327aa515a316f86db6d
SHA512852351600b97c31775778d491e7b2b38dbd8dec0f0e7e0c8b1e6d95eee4ba32181aac9fda0fdfe986c4d93f6956c3e6aa060fbdc70efaaae118aa1625731da4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5859fac067236161425f49262a3f4f7f8
SHA14628dfb8d917e4a0cc24f54111860938a7c1dc3f
SHA2562139bad2682018888db4ca1907c3e3f064fdbcb7d0d8623d49de021bd57ccb4a
SHA51272a352ae587015dc721494c05fb7ffecdefe72f0becada841b718905b9704c69d1d32647d8ab8176bff795968930ac0b3427a5ab316057a3479b5e59fda3e2cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572143fa6b5adf93c0047ce5aab3b9a53
SHA13d81292578f859d50d3e893c255c561038ad0b63
SHA256ace2db79a9a9a2320f4319cd8379b020d40a00649e7f568cc4f0d3cf8addf12f
SHA5126df2cf2936c18ca6e2e6381b0255d1bdde5be54f46c2d619ce99b6a638808929babc0546b6df20de8b5305ee63a28e4ddf8784623be396c136402ffa1d08e651
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5989696a9c4f83c4bae2026421a527021
SHA13512a35bbaacf44acb05678fdce451cc69016135
SHA256e62157c79590461ee4724fe71852f96e774f94cdfa3b9b90acd1de80170c2082
SHA512b2b4dee0a118d00db7e2bb8688c87ee31a729a7972ded77fc3cac788fb81e949d1a864760d4d9526f47ae03edc601489dc898584cdd0500fe2f6520483a651d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5108940e37afd5d87248362e3f459c479
SHA1f28b753801fd442ef6eb229472accf210733aa18
SHA256df60e16a93dee832b7075f0d70b5df794a2589d9dc9b453a1d80fbd97fa1d006
SHA5127b6191a6dce09aec8e614a1b6f6a735d86d99502d0d496062854ff30ae18071d8312adbdde179c2c39c69bc2452fbb1c23fc5cfe99bc69e4d6a72a6dbe9b84c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e6642a3ef05c9c39f24ff1a28bbb87a
SHA15ec52fcc8dfcb15487b46751a93a346fc544befa
SHA256f3ffca76b4f056e5f4bd17ea4b1e6b18a14acf1639190ccbe95019349ebb8a0d
SHA512128412ef2099e8133510f3897694f7c7c5783c19f6500df284b36aa005be5ad5a1367b151744cf1e59e8d9ae584ddb2669a502d6e140774ddaa697518d126a83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580714b77c0372e66fb4e5400d895a905
SHA14f8581094908e10ed4544fa04c09e450eb3b23d6
SHA256f14cde46462b7df23f089a1f6cc019e07fd6b22df53111fabac7d15874ed8344
SHA512dcd89910a9692cedc316d3a67e9733183e8462fe37edcc7ea60713e6006e969aa56e997338971d8b33f76d3346ba198146dc894ba3afd5a246b29890e02120c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c0e3c34edf1cc83ba3e7b254127486d
SHA123bab8f5d9f7561eda828a40b5a7cdc8839e5be1
SHA256622d71508b3aaee77161d15d529c553c01703221a7c4b70c133f5f59bb8cb126
SHA512c89ebf009b5a8320dd76c17db3e53239f3bdcb146c3556527a83ea870de78969a24ddd49785ca82e0341c69e4f99928b15c49a7fb2a8427a0db0029a71cb8a95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebfdc7a248afff541a8add36b290c966
SHA198c469c08c767c946d1a026b1bba725bbc1e5acf
SHA2561e2b275b6b945c870fdce21cbc12204e7fd7812d47ba154de122830ea57fae7d
SHA512156b60001c88fa3ee2eba7b97b274e804408062938b2e1330f4ab61c3829aaee853b6a108d33e7098a6bdb9d3e6d2f9ca2f83976661418e869fd0f4949ec5602
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b