Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 04:14
Static task
static1
Behavioral task
behavioral1
Sample
08d5908cef3848a2f3e71b68301a1dac_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
08d5908cef3848a2f3e71b68301a1dac_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
08d5908cef3848a2f3e71b68301a1dac_JaffaCakes118.html
-
Size
11KB
-
MD5
08d5908cef3848a2f3e71b68301a1dac
-
SHA1
1d49211d8ca09f8f10fefa581ce5a8cf00a75031
-
SHA256
bc5c1bc44837bf70d3c6cca6aa9ade5924026c0de92367239f347a36e928f3bc
-
SHA512
cdb38a178cbed62195b41a9248290d32781c139f367e277a6eaa5bff01554a483e1028c097333000117c44e357d5f6438721d522ccbee9089ee2e990d08de04f
-
SSDEEP
192:csz7FvAYS/7+NJowRCVPUyRhYuPikPHb76f:cSvAY87+d0UKhZPiAHS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D4910451-8074-11EF-94A4-62CAC36041A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434004341" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 503511ab8114db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000eebf1e6679cc3e658ba80eab9bd56f2970bc9b57e209110a85e118f187837ac2000000000e800000000200002000000091b2ada3d50dd0a6705a490e4a5bf966ae2ec937bc9a96de91f1e97a1cd80cae200000000c018a4ebe9864d6c328d9590418c2cd2e6d61bd7be6f0badabd43ca8aee4b9d40000000618d019dbb13e41a1c86298c878fbcb152aabd8695d9d2157e03e1b9da5f46457353110e954138b6c097104573e9926e7bb97eac2391239e4a9ae436cdf94762 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 3032 1984 iexplore.exe 30 PID 1984 wrote to memory of 3032 1984 iexplore.exe 30 PID 1984 wrote to memory of 3032 1984 iexplore.exe 30 PID 1984 wrote to memory of 3032 1984 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\08d5908cef3848a2f3e71b68301a1dac_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544ad1e5d792accf7a8de1bdc50292976
SHA15248c62c2193d99dba8b470b04f33053dee9a57d
SHA25644d52f8957f9fe5a16c8a35b77a15e855f1b7e23dd663cc3961c3ff0a14bb15b
SHA512940866cf5cb8563858bc8e329ef9adadb93443272694c522c68149a432468ce9270092ff1b1e70f7b046828645d4a59bce49bc7ab4b72079d666f28c32b0e043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcf517adc078f2b15142e89b3185719d
SHA1333f92ed0cb95d05d190521d6f6f38dd7ca1c810
SHA256ab9453f5eef29d52fe14e19ceb730135b8a4b23f96508091a3746bffae5f96be
SHA512efda0add1e1d4db090c85d5a09dcef7eba41ee835bf76abc97fcac340ab30886b63b79bcc19a7671eb0809ef410235f3a2c580079e7167a8ce0a4a5eead9b96d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5377bd5f3f68a97898667b7df3118db19
SHA1dc42c9761b7b83400ae3d6275211fcc9ae77b597
SHA256185b26a734b4a0b898615723d976cdd579785ad548310c9a04e9bb9be30500a5
SHA512ac0bde8f4aaa5addc08f7fe5e7919bf487dcc23744aecc5d920e9bfc99e5d526a5441a469c01420cef37426805bfb5540ced229bafc8673e8e070c572415618a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51843dd37c8f78792804e01f2ae0d8573
SHA16b14219d4f7c3d69e6aec5826e4b76ba7839eafe
SHA256807555e3709fb097c38fdf0b20028b817df6ed689ad9af96b12f873c67b5df75
SHA5127db3ce2da5e6e5649197d4971b40260536c9a506779b25846eb991a93ab885ce988cf7f9529fefc12a90042a5e725560d81dda3ddf4bb9910fe31ed77cafccb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c54dfa805c0ecb60a6f058c18a9b3d0
SHA1c17b35fb9c0ee3792f30f93f44b47528a3fad593
SHA256d8761358d1391feb43d6a5542127b66ef0eb73af53f16bd4195ec0768e846198
SHA51282ea85cbc5998c05f4ec80c2c79426ea1865e53216ed665d044a3302abf1d902bc045c1a12bcb6819d31c0a64e3e301238c3e0e2fb08e79e001b6e273386625c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a175eabcc2e6629b8df2b53f66912b8
SHA13dfdc778818a119b6d290e46dd6f9df2522e08e4
SHA256d4cef73588aa6f5bed79c00338c439f0887701b0810e8e830c73dc2f51adb8f1
SHA512f3d53125fb45384e0d3036202962e8343e0c00667390fc5f47a312959e929db9619d0020562168357497b39d9dd65461fb16729ffafb663b1f53b6d20306a624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aad50c0b495085ef2aaf6984167a5e5
SHA1ae95c9077d9d81a97c5c7c36991639edea6d2fb1
SHA2567bb741aac83e4b58773a8bb1eaf71d8c2e2558c4a32fe17eaef9a9d52740451e
SHA51229a977455d8ae81270592d1ba22f8fe2cf919c8544236276b5ffba5520cedb4651988e8535fa46171df5167ad7ebeac30a92413f530daddb7bcb4f7d09700ddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc4aa8ab1c58e146c53ef54d458983a7
SHA10c61985f547ed5b8bbd581dbf045774bc2c08d3a
SHA2568bb41f23bc446899aa88c265440d5d273bd0bea1cbbafab45096a7cd6f02ea0b
SHA51200be7755b6d0d75f871a1793774890b8932af0b51c613d6f905e0a7af9b92f0359a537950dcfc182c6305a1141df8fb98c822eae679bbe3c2546788e387f28f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5986167e8edc10152841ca0e652ad76e4
SHA17e21fa6c0d997e266979f54be9dc20efd627340d
SHA25696733ce1662225284476657a16f04d3d6ae960b3931b6bff4a758fca471d2c2f
SHA512ab00e431c06652e22a4b2b38b0b6ac3c79f1a3401d398327caadf6310d9926926dd9c6fb9478467ce11938a95c51a1d6de1d53611bc419cf6f096e88a36c398d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585439b2c545706680888ea94f041a109
SHA1b895f1048b79bdf9a524a2d6809633388a53da53
SHA2569408741daf15c6d0bcc6497a6106c241db711b6aa4d9b8fa34c00ab5d20c8213
SHA5125bb5eadf4757ff00a11c2431d1e4b759e41070735de1a96fe7b71c546aed61b719afa35383d4dc4e056fab297b3497117c45f166e513d4b3051cb05afc718f74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554c8d83f2971d12c35abb109ac69a91c
SHA1d53febba2f30094c0621b90e8913fe096da9a06c
SHA256953e1c77cad55e306eef69468d61a3124393f06a6a89d5ed3407d83e04a4d715
SHA512adeb333672e588e0a16e66add21d0c9b3264a8dd2ceefa7b1d87304d157f13738a02f50324208732f5b5a1248e2c2b00a6bb21ae75969552294cea73703051a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a56df718091dd6498b7d34ae6b30740f
SHA12aec8389849b4a75eac53a35e74fbfcc6dc97801
SHA2561d98a93cb8fa98392d09771f4177c5887435ca998045734f266cfe06e1c02cfa
SHA512d678b86644746080c607e8398eb80a94e47c7ef7779967ba169376739c9ca99fc29b8dc633c857ebb4603db050a8d64956110c1ddb556e6beed85d8bd3c699a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e044eaa953e64df55675a789f0b1db82
SHA101d964bccb9d827e1c204e916c2c4ca0a55ab024
SHA2564b6c36139afbd9e9c79c546e9e7cd2c75a86f1c6acb5f11d0ad03e7be06c4446
SHA512634b3aa011264fae23a63ba788e4774e1e878d8405ac539f5c6c6575cec5704c8229cf9ec90d1a456de76a9c5bb06c38e068b58b74859ef9d46cee601b615337
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a21e9765a9fc4dc503763c437f05cd6
SHA15554a53c0481e4637abad0c08adf6066a592f169
SHA2562b4b6ab47a5ca01b63ebcdeb5ffac985b880bca54325124c3807f1e37ad7f5f2
SHA512a85a36a92e1ad63ed66b0edd4a0ee32a28440277d4b03bf0d086e20debe7e400e1065cca8e8d3178fa443bc3ed3734aa44b9bb602ccf7720fe15365cde2ea2ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5354c978732bec5142c04333db4888e71
SHA1ebe74767b12f1c534ac3a30d587c08efd92fb6a8
SHA25697f3d5743a5c6b2a455f590f5bd19ee826cd4994feca9256052ae0ab605be825
SHA512447c6e5f82adbe7dd15f55e983d4ba4e9ed971ac5efaf6564a3280869b6a0f8f71b40b49dedbbd147d19105697d41d7c7c12ba7b4eb47760bd530b2c2c994e11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b82958eab9d96e954fe8e91336b899c9
SHA18a61f965d006e87eda9ab2cfe2c679e889828206
SHA256deee51659c108dd8fc79a5029c90b6fc7b25745acfe9b275e5f7c1ad3d47ac53
SHA51248a965e0966e5fa2822f0f62e05a6465d216090069584dc286a972746e0c95e6674ce99042e1e9352267c7413a455d1e9574405223c06992502feeeea1f9e6c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fcf4ff211d95af7ce157f990a3c08ed
SHA175bdf023f856d1eb146be06e5a51592e33b02a54
SHA256a25ece5dc83f8367b942e86c7a842000f91942d89df5f22ea37f541e4236ea8d
SHA5128af8e4d9a6ee81d6d8bd43fd86b5b343a77698081945982a498cf3c2336f07d727323a069bc769d755fe4968f3faa41d31bffba46f347681b6497bd9724ddafb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c695e5d1ce3ea6096cabc832d5f46674
SHA199c251a31cfc0efd76f50d52a78e72c26da92247
SHA25609ebc88fe067a0919664b10dae8ed6cfa1c2664579f71e46b08d2d7578a57d14
SHA51298d050154854e42192a63d4d31009f3807195d5d46464a0797196c3e05ace7d79d163d8c50d18b9e588ab6e0c09ea666c977a629a1c1fcf10ab86929ed11f84f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0bfab8682bca4dcf0fffd7fe8e1fd21
SHA1d327e74006b051991016aa47b0d62136ef011735
SHA256b73f71d3779ada3fa1e1540eecd3657a503f8c2bac0b3040a4f6315bb923e346
SHA51252316a38b311284b41b5d9cdffcb894b03731dd5c5cebfb9c5563705b446a678e386ee79b6df53a4af3c689f2bd04069f8ed59f213a7e3660191e8507471255d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1bf897000c717ba53ac53ec576af37d
SHA17a972fa08cc922e6e147db5a4021fb924ad3e488
SHA2568227ac37ee938ad2ad8b4cb8348e0ed6738ae390dec13cba9b737991713c4f76
SHA512a143b710f5909c533f765b7e673e37ee6d8e27894d6a63b00b7a4e9e5395b1e65462830b157795a6c9d7d83b54ff7df76cf86d5133edf504664b9d2027e21d53
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b