Analysis
-
max time kernel
118s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 08:23
Static task
static1
Behavioral task
behavioral1
Sample
8271a95d859a5ea51b54f1a3e27eb5d6_JaffaCakes118.html
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
8271a95d859a5ea51b54f1a3e27eb5d6_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
8271a95d859a5ea51b54f1a3e27eb5d6_JaffaCakes118.html
-
Size
53KB
-
MD5
8271a95d859a5ea51b54f1a3e27eb5d6
-
SHA1
9ab61729cf99445689bf9818da1786f982444203
-
SHA256
9e00f5bb2bac3cbd1db044acefe28aae475a48f82ae484a362bfbb1a387214d8
-
SHA512
aecaa9b479d03f40c0504fc345aa46c1e8e89b4968aa2760b4f2ebfdabc67eae96657b0bb14d6a29e66a6b1bf8b63642acf1907c427da7f15cb55be398e65c70
-
SSDEEP
1536:CkgUiIakTqGivi+PyUfrunlYB63Nj+q5VyvR0w2AzTICbbfoO/t9M/dNwIUTDmDY:CkgUiIakTqGivi+PyUfrunlYB63Nj+qs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d01c5847702bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a907cc1344750743988d8bab481dbfbf00000000020000000000106600000001000020000000e8ebbcaf3312134ce49a4edca724b1e5d7b989ea77347fc43a27c6ec8319fa62000000000e8000000002000020000000a387124e6c82fafece606301f02b807bbd2c2dad9c6afe09bffd98986bb65880200000009860083cd6d577c73cbcb6e88f45dec2eded6dfd53751f9b5e14b91e8dbde84e40000000a32cbc9a23d0ba328ea20d4c08eda2ccf9a522570b3c011a2db2afaa83d5622c1a0cd929444734b1b0e06e11c535c28185cfa609a7c8cd391a86aa438ecd64d2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "436525741" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6B964F41-9763-11EF-8F09-6AE97CBD91D4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2064 iexplore.exe 2064 iexplore.exe 2596 IEXPLORE.EXE 2596 IEXPLORE.EXE 2596 IEXPLORE.EXE 2596 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2596 2064 iexplore.exe 30 PID 2064 wrote to memory of 2596 2064 iexplore.exe 30 PID 2064 wrote to memory of 2596 2064 iexplore.exe 30 PID 2064 wrote to memory of 2596 2064 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8271a95d859a5ea51b54f1a3e27eb5d6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2064 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5fe3863125e95ff3d24ce04bb0a7790
SHA113edbe00bfb0601e552b7bc92b882d708993233b
SHA2568491b518d8bd86b912d3ffb5447eca3729601ffeb60f6c19bd61ed6a826ddfbf
SHA512b8f00b6eb25ecc05e7100ef6a34d72576944b4ec6ce21d7e4cb9fe83106341f1078c07f7801ec0f19d9774f866b0843db566c5ba42934bac1404dffafaaca3ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55eb560410404069e6d30f0d28e044006
SHA1af8c44bb2c9bc6514eeb5188a9306173aa602a2f
SHA2569885aec6a314f28e0985aec2d08b1a08e420342429b2aa3637eebdf1e23e5a87
SHA5129f15e2afa4e35ee105c0dd86587b624d63b727014386a1cff6c76e3e73cf7a3c997db661d095e499527c7a52fe9e652f8046b613e8f20eb3e38b7ac9da7fa075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e731e610b9dae7606152246103699151
SHA192418e01aad985c55d8264e9d8394fd9633598e0
SHA2562226c93aaf4f62f56daeed49fcdd8c3605c49017920ed794614199c9eb3694b3
SHA512780c4a6f4d99635d699196d7d1ac9a335080ce2641f660af1c624a2009bf5ce0d1f3c511ed6f0a97fb354ca6dcf65754b4dccc88c69c108a66f767243e8dd3af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584c463b548cc37c4afd707ca950c36e2
SHA13e6acac38807e1c03d32fc184db6d1250a3663a4
SHA256243d107c99b23f418670b16ae40f65449be5608693a5097e8d78b94b932f5592
SHA5122f0d87ad6ca3b748ec9167d214830f7763ffd0307ca5c7feb788bc95664556f313a3a499e7176455feba90006e7022d01621584abf6639ccbfdf8dd0b99530f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51126af20d51d3c7a80f22e040200fbc3
SHA18b0a3b597ebd0080f4a3088a22fe0a5505365d03
SHA25657bb571983c8b94ad828f653696124652ed4262ea90405d5f98b4a40eb6821a7
SHA5126a90c02c30195c44938e2766034d032b5532d1538cec543a37e9943da4e8b0f1da87bc3534c95e4cdf4d283c8be3d77bf165469a9162131f4d16a79384f38a02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561dbe1e07940b4a32f5869339a27c409
SHA1c253e48530ff45a7b68918b8a0f6f4fca3a5462c
SHA2568b73bbcaa82e10156d158b241d8579cf663a7b11160425838ffabeda876f097a
SHA5126609842e338c467da4e00f305883f10a888f3eaafc9cbe4e2c8079a39273422247bd3cdb566ebcad161bb3e187472d48d25e23530bba05a318321343d0292811
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5770c4c2afe71bc4d0b49b8169fcd46c7
SHA113f355d4ba33071dae2a4f82270ececd53b961b8
SHA25696b2b60ce4ab8c9f7d4d17971443f9a9ff07fc997b1d024ccdc572bf69571291
SHA512ea56987d48899676637bfb9ea2c419886d12ea790d0cd33cb0af058aa6d1fac5a2170a1f7f9b732f3b891baf5b5731ece5b312da14519364c74aed2c0779f1ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558409eb76fc1ef1c7555216a7960e7cb
SHA1422aa73ce660956dc16a035fc9ce90d841628a8d
SHA2560ac8dfeb59caccfe3f18e68d25c9704d80c95a92b88cf52ef46df14786681f34
SHA512431f5525501572e00d3f107b99fb572aa60cd9c73f7892b81a671a1b462954004bfe4a404b2e84d95534477be9b13b5bc3274a310ad84c2e5e1d6558129bd0f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5435a967f7ae69091edb17703018727ef
SHA16bf6e314045ee224e081afa5fd496144cdfd3f46
SHA256df1c162ea3526d824dedbdcc386984ac300593251a65f50f47e92a06830a98c9
SHA5127a0fb8704b10cb247f10ebb01783eddded8c9bf655df74b45d129335b49b64e870837b623431a346318b20fe962209c9b2acda6a3bd2b0ee17f53dc07e4faba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c52e62b0a19ab1f506844a734b8e1dfe
SHA12fce4f9ce0e6139cab84551b616ae6d2b31ffaf0
SHA25611dd2c9c681d23ff728f4e43035339ffafb2fc54f0c3d3f9ef7249cca99c2019
SHA5120a0740e213ad9f27448c3e680ae892e42802afd2dbce3c181289428d1b8ad36585fe6c8fc12713bdfd1abc858e50b4a6875b37a1ed6097275069041736208a14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb2db217aaf436e4c3953984b510c609
SHA1a59ce00d49c36d3695ae47bd2d57e132b27fbd19
SHA2569b39cf372110dafd931a401b1ca5eeaaf0e697eda8cbadd58f2d823b8101db96
SHA512b0ac942e354e804c972e3bfafdf406675b9ab0ce17f0bdd24944a49985703517cde307dc4bd58e1c15033234e839046bcd1f0d97b7e29b6c8f5f6b32a4574870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbebad3c4198b699cfe631b2d83010e0
SHA1d3daeccdfbf0593a27acdac97b45013e06f3655b
SHA25649d6ce7453b18325c688829f7dc0f0392e25ec9e29b5b40712c85a49e2b30e59
SHA512d0d0cd1640dd35f2e961da880ee93d32fc953a4992093c79106e54b7b9bb9898d8933c7e331dc209171fe06fce9ffd750fee85743c2e2d4b2bfc9165458438db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b3b5ef189ec1455aaca0ef16cdc6b7b
SHA18c32db40c951f8ee4403240703b1da702c1d8122
SHA256c0ed5a761408a84725f8a9296af197588a38779d25a3a19622cfdab0cc5646ea
SHA5128a9f6a1befabed9f768c41b68fac976ee35968b9e90d0b094a9fa5a4cd20acd126f518db4c9a4472e357e76d95ad0569d585a19fa7b57782873b501b78a1d0db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b1064ef6410a5c8a2f96590892874ca
SHA19909ca3e710a330a11237b515c20953822e1e8c9
SHA256b666f3020f11aa662f9518390b11f01685521a88733b3589c12044c8c13881fb
SHA512cebbec3177ddb7f736dad761e9028e9985f2d904720fd90a6f3503b668733e4ecc7ef014fd650177c7242056de36637cef0f9292f91c2cf1271db7460641850e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586137c024304df15bde3a3111eb2ef18
SHA18ecaf0fda4d0d29d304eb5cabfe3e2635b59cf36
SHA256005da61aebb99433ef4e91f39ef589b11b23171cdff6ca01339bbb6b6b42ad55
SHA512616c4595cf0df8362b0816ac3424e6a6e28c61af4bc77375584c0efbebca7a0f426c5aafb5f1e3f9a92c010c08219d73a04c42064dc5100cd486c1448d8b5b3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596eba06d2dbe4fed8f80507737fac6c8
SHA111900ebd005e7f493d12f9d5f6b2f4d23ca75e97
SHA256e9ab95507633c78e6ccfad0ec1ac50b087ff3ab961ab23cd7f3021127ffc7119
SHA512259c82759d3f40c91fe84a31d9712435c62c1a21fc624e8dbf1c766af611012ebe07b28ba060e24061f5fdf112b782be0e823de1c3b1e2ba0859be7dfa4cdedb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5638b0dc8a2676aba5dde80655543c1bc
SHA1b6e338fb5767baa503efe1137b2d7aa6003bb913
SHA2561151f4d891526188a18181714da80e79757831995181d17a12b61c113ee895f3
SHA5122707553932ab6207c145545950ede30632aeeb8a1f1124eb385df87a7c02805579eabc51aea633822ec2e3cf0ba930370384eda973b3cdfdaf59bb630c7794fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591cdc8326c9aeb6b0ce69411004b1376
SHA1e7ce32f36efb07eb0d161ce03becc31edeeae6d7
SHA256d54ed5f31f4d27ca55fb8ba800a0bfbc1731dc891eb0deb57ff9bc92727c7dd4
SHA5128e1aed6b2f27bce9b1fb93125694bd88879ed01b94d41eab0a739483f1d2f6a286c8dee773fff44714002dd3384b10df53a7f14bf6f40ba787e08d45b0da7a55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5762a1f234260e4556c2ccff94e0d6225
SHA11d0603b6b14b12a8ac4975675fe0f1636c25def2
SHA256a46cc7b167847df7aee55c8563970860fc43ae29d83c1c4e199e946183696eaf
SHA512dc1cf6d5f4598958e2c90565ffb61a200a79d1fc5c7f52dbe93cc20e86cf4d6b85f14ad4f98e26b91761e1349c8ad9ea95e5339a2c2bc107d354657b739ea360
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L6J4GCMD\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b