Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 08:34
Static task
static1
Behavioral task
behavioral1
Sample
de108f6704581bef9de0dccc9a10a60a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de108f6704581bef9de0dccc9a10a60a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de108f6704581bef9de0dccc9a10a60a_JaffaCakes118.html
-
Size
23KB
-
MD5
de108f6704581bef9de0dccc9a10a60a
-
SHA1
5883f6b4c3ca76b528e5bf6c9f6c9615c7f482ab
-
SHA256
72c9a0d9981f561e3fe107d67235dd79df5d442aa9bad20a6ab7ce5940d9bfd1
-
SHA512
b2b133667c3a6a4293d751988522c57b395e52d21c053b18ce6c2332bb68d47e6dc6e31bcf3a53eb173c2b2b5f885929d225cb6585b4ab208591418689a16333
-
SSDEEP
384:STM9Zx/BekqvJlSzLgRqLSuLfzHRqH6OKS9k470HSW17OiOKGISOeOROFOkWGQDm:SIFBekqvxcYIVDxYacoLSMqZHBs+1D
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432378314" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00e8a6c7b705db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F0681251-71AA-11EF-BF50-D686196AC2C0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000046a293ed68d2c13f735bdceeda2d32d8f04fe375192ec87b40fae9b135205045000000000e8000000002000020000000817df4614fd5537b1c95bcd8964512435ea92c77a16152b369b06e24963af279200000000834c7badec53424568e6ee0629831f424d2d2a343317961a82eac3a453811914000000015513186ff013fdb8587d62d8a5040468334269c7758da7f28bd78eff715c7f5d4c7d6d480c98a5d816a8fbe4e9f425bfbda3a07a7ad89f2d7f08ba2b96eadb5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 1664 2236 iexplore.exe 30 PID 2236 wrote to memory of 1664 2236 iexplore.exe 30 PID 2236 wrote to memory of 1664 2236 iexplore.exe 30 PID 2236 wrote to memory of 1664 2236 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de108f6704581bef9de0dccc9a10a60a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a3d5eb2a1364a25b2a0277c7357d3a3
SHA10140139558191f5b8a594b655fcca6af31244a80
SHA256065b6dc8ea08a806d70933be9164dc7a00b77f15a3784567a40920e9cc01a304
SHA51219b7c5000bb676972df8882b9c3aab62d94fe1701f87291e4d149711239de431a76c798f8d7c0289409739b6fb070d747839efdf251802cd434e06bcdbb21ad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505f207413f426f87d51d4611d2e3526f
SHA195530ea48d7e63e2505c8e06db15c84d73b15c19
SHA256477f44ff5a31ac9453a88dbee790648233b921fd2665e4df0e5ac97d6bb61c18
SHA5122d79674f9ab140a1bdf3edca25e20a73c94891afb40ccee5c32c9efd536ad976ac452623d809d9c131c746454c658a5890bc6abc8efdaa4c11bd1a4b5d282c2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576672a4a97db6d0506a566ab0e90ee9d
SHA176773f36dd7d2e29854dcf2e164a2929873a740c
SHA256adfd9c04370ba4c9adba94aeba95c64b47538be5fa0ab054776280a8c9c10287
SHA5126c71848974af3a067ac53643f71af8a88c3dceb90357a33f4d138445db15ab76ed5bde0ca743c5b3ca49aeff5454462167b8ddd662bca63a243f654807f51f1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52134630cdf993fcca534dc6cd0bc65f2
SHA1c90ffbbc3d5f90d66b19d896de730a4be4da600d
SHA2569ed22a595709b2f44b368868477f812ed8a1c8fd84b805b7decac873044a8897
SHA512ad178a4aa5ca39cabd7bb19fcc86800a61b7827d31f5383ebc82b433fa190aa8d4f2b12aa9ae3a9f50f770dd8f014afe3a5db75f233bda6be110c90a44c3cc98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0b6c5243ea072c5584718607117f65d
SHA1e3bb8b830136cce12de2272e4b8be603e73363c2
SHA2561ad4b2cb38ef2fc8becb5d3739b753226d49dd91c2915e1819041d8435e3c061
SHA512cd111e92a174e542565b4be2837236241e22e34ae1c351d45d3f9dcfca4a1f06c5f75109af27cce0b1020e999e0c232464e58f9f8b6a333c0a368c37b62d1786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b713fc974217346da116d1b73622aa8a
SHA1f641b689ece06544af1f5454405aa725cc48002a
SHA2564b8ad4b56d6b7b6bb96f0ae3258c7704ca900e11f92c9750aeb88357b1bbc98b
SHA51259bfccc25dcf3dd1572758c831e8d7790a8b81034b7893086be74f4e03e704b6868b3e62bbfbe2e16f6f0fe8f299799d33b7b472e747ce6f3d46f1d1e0ef4bfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db63f6839c5276b293050db437edada4
SHA1fc823a845e0c03e97f62b7e057ddec615566ae69
SHA2565c1a0c0ccc90d504b0b752632dd0f8f0692f9e8b2a780eb800d10df857e99994
SHA512627e824e3c6226e41add83c465d83c9c68c662ff3229db40914cbbcc2a8b21b2126a97f8dea5304dedaf0da202054162b39cb686ad38fcbfe0c71126126325d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5892e3225ae1b4f37a9ef90c3a4044497
SHA1e3fd7ae4d73afd875a7b3d1ac20abf9b395f95be
SHA25628e087f236c3cf77a7daaa54591a60ff5435fa655b2302cde74367587fd6b345
SHA512aac36ee14cf9c95e309dbbe34a4b249d55e360182a0f843ece673daab954c4ff2f05aa29a1d08964e385626bd6508de837ee36cf4039201d0794c57d927e3503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcb3092b2c367fec03a1f97753ea4f6f
SHA105e4a5aea046e726b731b155bf49c31c3bcfeeb1
SHA256a02b20dcc260c2ba6892da949dc5450f9f5efebfc720256ea4ff898d7e2a4b5a
SHA512d0f1d21cbf6f05afcd6c727fd19119e40666815c76c1a789ca2c3b8fea7bd47600888492bebf9d70aa7144169aef3ee24a4f19ad43fe47ca4157b8842b39fdf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c396a598dc79e53902b64251a6eb1fb
SHA1dc6ef5185d27167220d27c3bbed92ee5f03e3b47
SHA256b970c3e4e5c2632d85c9d861a82c65f3a5b11a64c867c7ddec5ee200aaf593ef
SHA512aed6b4e1e869557b858c4331bef13dc0c366de38e51ebe00253fd45e1dd60b824d5eff098d58d2e2046d9edeaa27246cfdab3c87f665e3a48d43005747dad4b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deff8abb65e53794e391b9780bd4039c
SHA1fd3d578f342638bebe4a93f79dd8e03847593544
SHA2561f9748a12d954b2d6dde1201f49b37fe0fe436b2486c917ac9da0a264f33b2d1
SHA51230d182649dc162cde42c13a2aeb67ab00d7cdd5033b233d3c16210a67d2b2678f1f31d3e561dbdae32da01ade583409ecac221c150f221a4ffbc3f520732e3e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5403de3fa272a8571e7d889925a4c4e6d
SHA1e7ad31ecc72f4c79e8760cb6c3e9311c70a68a2e
SHA256d666f501ec3cb3826861bdf39f789538570d86b1026b72871ec9dc2b81e2d27f
SHA512b3bfadddc4713a9f7a2e7b93fe7b2c4a38cdb7aabb2afdbd094a57130e6869e804a82fa97c7aac6cfb5e7b1a1443e0f6146450c21affc602f3628c6684c9b645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c35fdfba35040cc99ce794069f00e33
SHA171fbb2b81cd3d3ed0a9b5c97d8cb8ba5d47e26e2
SHA256822330d6d319f153af2bf092b82be4f197d723b493b53870b5b117b7895c29dc
SHA512ed34a0113511b354ee5ddfdfaf4932b8f2b6fbb587c9943700cf9a00299dd4d129de095aff6e5cfba3f427de1f0810b4fd5bfe1f998b688d18bdd8da46caed11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53760a3a37e9a5be3a1b65df845b22389
SHA18e3f961d47c0bd3e3ad36fdb115177554396b5ac
SHA2562af5da9c9079643f6d9e541dc05ba8a5d5977beb7c38617fa31206daad32793e
SHA512b544bb5a12654e6442e036196f7846ba23b947d5351095adb1dd9b7f77a37a4f0edfb83de2dc30b364478d89f9e38fa0e20b09eaf78ee6d35f6186e106ba1818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c11d337d42714e9d78e9dabded20f707
SHA1a01d0eb9685b055a14eab3cc33a7a35f436f518e
SHA256a3e6dca39118bba2f2ecc09b5e28ed4793c01546e108a5afcfa63568eeca9b27
SHA512f66542442181d776ecfe40c186b338b2bbd4c47e48c6be9fe619ca1edec1eefa69978444c8e2b5d1e23eeaa50e8d5a1781bee758ebfb87cd1c7fccefe5de066b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf98d7072e90b7681613319a64c750f6
SHA1045f2eddaf87ca537ef6da24d45fea8146e3bebc
SHA25633a8864122905a852081db59ac929e1f5fada2ed8280744b02825d85a9ad629c
SHA5124a7b424e45a2e075df6be0c2ce99efb51a01a9457f40f371d6519dfa7fbccd59c4c43cc97a6654277332dc669569b556a4f30cb99c8b1a3866fd39a54d974018
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e483112a49aa08dbf1c97db1c2b0df31
SHA1e565620d986ccd2cbf954d6f416319764ce6c68c
SHA25604a718ce21362ff0b3be2b04e2d4ed45678e377a7df6b13e9d94a94d8b50ee5b
SHA5124f96bae46e5754a4355aad19a6daa970560829db6ae78f50f1867e5e638400c225003816295f243a39e8de460728f7c315a2278af84f75773fcd8af7599d15b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534382754067b4ba49d53e84c5dab58ef
SHA161566ae1fa7c9e88933792a1dfe146839fdd5b24
SHA256fdf70af37cfa0fd9faddbd2a6038ef3accadfe2ac9210bdf4a5d1ebb87c58e1a
SHA512c4a29e085c81cadbe8223254570a78f7dd19f2a806e31b39cef98db784f594648445e19a26ce0224a288499ce5cd6ddc2b4359e1dfc1981a31865697b4aa76f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595ef16211966ba6f04e739fa22dc36c6
SHA1e553197d0f04b12960dea0ff559d739bddb76ad8
SHA256e372abb0df635475bcda918aebfa900bfcf1176f1f7d17c8c139ccfa747a2695
SHA512f026f30c3d6d98625a39bc34673937e71b51cbe430eb9fe3c4775a185bfa1375faaa4c8f71aca4b8530309617d71ae875ab674864bc517eac7babcf144e771b0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b