Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 04:09
Static task
static1
Behavioral task
behavioral1
Sample
08cf4b661be9eb1218f760b8c6464745_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
08cf4b661be9eb1218f760b8c6464745_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
08cf4b661be9eb1218f760b8c6464745_JaffaCakes118.html
-
Size
14KB
-
MD5
08cf4b661be9eb1218f760b8c6464745
-
SHA1
0d058f6661cdc711e1fea75595bf1004acbe8325
-
SHA256
fb72449195f9b1ab5aed308021abe116dd898d656b6f372bd8fcdd7ce9f18490
-
SHA512
505fe3fbf1fdf3d6d58a4ba9d508a24ac1bac26b2d6078b06fbfbc7af10e74d6cd3f7a91ca0905031036b1ae713fa96fbf138f5e956c87aa2e60850f6591fc39
-
SSDEEP
192:+scxltRYW/VDv/nAll8kpk15Wfc62xQ8JieM+xR0B3XHRu3bOTNwlGjeTXx/8CIf:QzEkk85b+wll/8d2UnjotGgc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{17A1A571-8074-11EF-9CC3-FA59FB4FA467} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000464cdf9de5ed1f93db80b3ad95891f4395809ce65ed22964816b381227922803000000000e8000000002000020000000e80386a9743f99d64787d995bd371c5559a74c2f13d8ea41363f612faba43f6d20000000d361e95a80dfe4478ba6ed8abeb949f9ca4156a57db6468d773eb3d88a255ffd400000002b44e3d6669329cd6fce68fc49be43b4c897bfbe3a4b711ba9e3d62af5ef28ae898d3a8ace3fd5b796761c23fcb895c4687ce2959a8f83f16659f7a40df237c7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b04846fe8014db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434004025" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2584 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2584 iexplore.exe 2584 iexplore.exe 540 IEXPLORE.EXE 540 IEXPLORE.EXE 540 IEXPLORE.EXE 540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2584 wrote to memory of 540 2584 iexplore.exe 30 PID 2584 wrote to memory of 540 2584 iexplore.exe 30 PID 2584 wrote to memory of 540 2584 iexplore.exe 30 PID 2584 wrote to memory of 540 2584 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\08cf4b661be9eb1218f760b8c6464745_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2584 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2cea1e7038f1826c15ce32b222c41a6
SHA1709ef6fdc67250fa7b3cb8bf759af8996d2bcfaf
SHA25612082dc7f279587b8a2532ed08b5531a534a589e475d464243495ae1e5a578ba
SHA5121373d611289b82548f4d0f21fcdb3e07ce752a2a5f3e7b47b3b6025c749f1a7963c7c66bdff1ad8d846ecfc045b9df706cb2ae5226f7b13ea18f5413de3cd148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5528eb7769fbb339036f950ebefbbad5f
SHA1a91ce366541530a9ef9fb4aebd239901fbbd68f0
SHA256440c4b6d52eeb65bf157b9c173251618a1e1673fcb47809a4749718be6b149f7
SHA5129e6021616e4f7c70248b7a53998717e20dfe1a6c54e4942fc243ee251303b6de2387b77df04b6449d6b58cbf6c83e92a88205cff0a0953a6e0ce2a2964a37438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e3438cd8069aeb7d13c9a7f5efed11b
SHA186f79254cbc2c2a901db652897e9e4b41756eb54
SHA256fff491905b4667d5e1f7e84845dbd1fae538ad0a2587b375451cfe382b966441
SHA512a56f13b11fffa2ba137c561b4fa21869db5d0ccdde3ecff30a4ca4a2cb480607334e698f751131645cfbb76a546a03ef1adf0754abfb4dcbbc66c8e6f188d133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529d814d73a4e1583779e4d16e9ca9af6
SHA1efc4c3dc1356e1df8054e014448d258bacdb57ce
SHA25656fc2cbca662b9f9e15be600d0f6e78783ad980ece393e484cd050f2b86dc2e1
SHA51232f1f674985b11e9022970dd973bd7c21b23830f4bf854ba1d153c8d11c04773a39cb38232dd3ff76fd7d9ae4f9bbb8957bd8d8824d6fcbe27f5defd9ca0f758
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546a0552bf548fb767fad2f0bedc7c799
SHA106cbb3bc5f6ab490cc2fcaff39ca7dec05d08d8f
SHA2562510361d0cf10d6d948abce310d8cc3e705f4cb96ca6455eec5f3b7867bfe6d6
SHA512b159e6f330fc46bd95d53ea8eb1d9df5c949f68da59d4c31824a4c3b4ab4f49efb995c2ca6c3c0f8b42d00f20823ab469960b1304751487bc7dacb43a520859b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5851b6b7b9e3c9cf0945165f852bca2c7
SHA1799cd6a47b2a8db37d7afe41cee0714122fb7481
SHA2565d5525bb5577ff0a03dcc9460efa9188d8a79110fd9245e91cfc8264cf87cf16
SHA512ade7256e0388efce802b8a1c092fd633c6186b037e91ef316db7a3c33065e319c95f2e8b34088d4808585fcb8b8e6264b0c69d70f7768a52eb8428b31dc6b1ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c41ee391f55349c8cc0c432e4217940f
SHA156c0357a8c7c77bcffd7eae4b2a2fa25b362d801
SHA256bbea3af1ab859e1a2314ced93b63e32938942a3bb0b3d858aa5c2f17c424cc5a
SHA512338fa63ef6a9fd940d46f9751e33f6e228dc99f521276bceaeccc2d8388c9534be5d03572b7d3ecdaaa675dbc7de2fb0c64c6f3fec5ffb2bb5da280d6d752d3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7ba9054d8f4b4fd9417d14f62b925a7
SHA1565b8e9b99a9427140ddce65b32624cb211373f6
SHA256733657f98d70d1dcc74feb837b7c4a8b2792092af860e1381393641091ae7cfd
SHA5128cf0734ebb16c4745bc7caa88816628cc79113142376b8b7e972c0b2ca7aefcf32d601d17413df987db1e55c9716dcdafee0c66d1bbe48be55dcea4d8ac7be62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5931a79c08dcba406b8866348c554bbf4
SHA19066fe275d15622d1d2d604761614ab422edf57d
SHA256b6d5114dd232918d53f23143b52a2d8bd5c1e3c099c0d4a0136314085ad64b9b
SHA512c2acbd705165bf8a42ab51b1a09e017f9cdc4fee9eefc5b0c508164a99a6e5c5f6e34c0738496a0bd83ef0e2261418a6780d3592adc92862ef57862301fc278b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1e2599fe810390e4936a42334cf92be
SHA1c7452ee4e76a23d35690d0424eb2cadd0c66d24e
SHA2569acf52887734aa7c4f21634649628a63625018a369a970a00708bfd870aca32a
SHA5123effccdf7f3b87962a24d46186b9f9c3e6e34aa27af83281555648219def30d262725746fbcaabccba0458ca778fdc7d4f328467aae148dbfd4078314f657999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb2ee6284b5e51b564976d31c742d780
SHA158ed81190d09de0ce1389c7c8bd210e735add700
SHA256c1eed289f09ee5636dc5e8c7e7cd23f73b027a4c75fe84c620a8ee104c3cb558
SHA51258d54f90decd6f7d800402a092e51609ee3e10c7ebac1be83a9d05e53639d50504a4bf71de6b4d629c51af447ad854a1c7f3b0b5f13afcef881ca1c20a67a6d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc67450d24d8584406708a82ceee6a9d
SHA11cbe8240f36c2db65c7695b1bba25f5dcb53fbe2
SHA256b8710a17ee6159c663baea8d8386d4ae37bc1ab91868ccb497f0e4acbab17f9f
SHA51202f5437b4dc2c1cbfc116927ad482c8829e1259aa18d2c81b644b9abd7a0145eaae360e9b331570842c609da71ff4463b1605a7f2ec5dec8c981404f0f3bb27b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f175348040982088f51aac0291fddbc
SHA124e32131e42011430b0c5c7c6cea12282c3f6948
SHA25644eddac6b66597593d0678fe3be6e329aaa5659d3ca5c8222e6617997411a037
SHA512225b2971b41a6b85078980ea4395d47c99ec4fab04e633b07851bb7e5861b551d4c6b0bdf31d80ddac9b55e3251f41f701218454dea84efc06a18e0a43b208dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3c59b92a32bad86225919af2f8ddf5e
SHA1999c3b9a3f4b40000d685bd16c06a67d808e0b96
SHA25645d0a0a3d4f6256cce528f27301f2a4f12e6dc06ff8dd7bf9fbe217c854df5ef
SHA5125d1fdfc06f6d6f93f27518683f587499b78d85ffa63381b747b9635133756a07b55c7ef8b632344e0280145640d7284ad7ae72799cba25430ac9e59e079113d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8fd28006f7cd905530cfea415d48f8d
SHA1c0ba085841ba65710ff748161d792053e6dbb02c
SHA25652c61995829ae77a15171f3002c55f5f931f38e262bd079a4f270410e1a9c545
SHA512b261d65edfb2047a62c503a1fd61332e50d630b1a8f5917ad35168edde5b09899012522248deebf41bec454c6167008c9db9dd0bd31f2c996148e5bc684d3168
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ee113c814ddbf844dc8491c825e9028
SHA104415be7a734d234424f0a7e3914a5108e1395bb
SHA256719afde5a652126a9cfda0020bdb01f5b9334997ca331d1430d74f06e0864647
SHA51252f5b522e20a2aaa7b363162ba750c64f800a652cf6daa6c0ca4cb2c1eedd26d5701a77460772d373a3ac1bac9c2c82c16c6b665e8fa48f8dd3b451989036620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8dea8e0da98c240f1a712ce9f4249ae
SHA11b16f077ac68b245a2969ebe660abca2e6055c86
SHA256e16833bf07518963a66eab0dd5c3cc3a4c89e0ef262e1b634661d707e5d8c6c8
SHA5129b322e08e1b9d4cb454690bf3c68d03ee4bb538ba1f5049905cdc36642c62cc32b0ed0174c291ff58b08d0a9711ded9ba1b60e10d2e837c9fe541561681c90e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a754b5b754a1449be77ef0898ed91ec2
SHA186400fd498c85cd9a7b9f10e5bf7f2cd906c2ba6
SHA256c2cc558b15fb38f3c70fab2ca1abde8d06f22087662b573d7b8a67552db57747
SHA5127b6c8fa327a1cb2d477d9a8625c82e61322474ed56c6f64bcbf3c669e532c665ca1930e6296d44989654b11285e947ce0e716aa0deb8e3341ecb4ea9103be7db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c76b22f14e90fbccb1ba76a5cc638e7c
SHA1ce493b628f9cf5093bf08e63609e0d74849bde19
SHA25682c784d902fa3b8b1976497a389fd1a737bd337bf52b4c45c0d87c7ebc38cc2c
SHA512ef7c8313bca654b8695586c0910cb488a21129a940f1bb8acc93875bb056d80f4a00da704e68c7b423a8f2f88094133b991dfff42f7b1f76a426f005a85f5e38
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b