Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 08:27
Static task
static1
Behavioral task
behavioral1
Sample
8274debfc7a7cdb4d6e8bcf9b1775cce_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8274debfc7a7cdb4d6e8bcf9b1775cce_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
8274debfc7a7cdb4d6e8bcf9b1775cce_JaffaCakes118.html
-
Size
225B
-
MD5
8274debfc7a7cdb4d6e8bcf9b1775cce
-
SHA1
2b5c7291728286246c81171b017fecf4df196f9c
-
SHA256
c6f203a10378b2d11306668a97583a686b74945f5847fc41c2952939c951b5e3
-
SHA512
217dd1a7f372b2f09ee47d68b66073c74039b95e6912e79c41a565512351892860e94a93d51f70332727ceae0775957263dc6e415890e774e606f2dad9b86bc2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "436525953" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000009e8227d619328b98439abf2461ead79cdbd8278ad744ef5377e5c1a3419ca153000000000e8000000002000020000000ea10852d52df08d048f88c4d0809cfc6c5cda8f8c445f95d10ff24eab478bcb6200000006ddeee0227a4a45c790da3a52974bd4151c9f75d18cd7c31de3ad18c423d2dba400000002b2d79ce62e68c362928b046a0ca0d08f5a3eb018107805e066f4a8c0de477d2eaecefadb1e22317874d4b5aea281886519e243517cdecdee4e107590fdbde3a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EA7F8971-9763-11EF-94CC-EE9D5ADBD8E3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90dae9be702bdb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1628 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1628 iexplore.exe 1628 iexplore.exe 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2088 1628 iexplore.exe 30 PID 1628 wrote to memory of 2088 1628 iexplore.exe 30 PID 1628 wrote to memory of 2088 1628 iexplore.exe 30 PID 1628 wrote to memory of 2088 1628 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8274debfc7a7cdb4d6e8bcf9b1775cce_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1628 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59df19afc59d027a9809d2e46d044e522
SHA1cea663b6ccc8ca1370a565e2bb9986342832d53d
SHA2567af6dba8dcbd289be032474fc34c72c1fb98b3f3e8974efd1bd5392f4ec5c329
SHA5121c1fbddadd1cb0b614c44584fee61b683b0ea36b0093b2436e00ce2329c33928a661d6e18c8c6bfc507fd6f5d37397343f1230cda6c4da4906fb3dbeb7995dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e08fc2d1c37b7132085f489ea79e1c95
SHA15d72f18593922a82b8d0e56184e0782514032e33
SHA256cd08cf9dbf264804380f3c9d824e12751e351c8dd4458471b6987d103eb4f4df
SHA512d325f5c5680481e79c024ef9aae04277e3e40d4d4805f65e6e5bf4477cd9067ba349d791f9e4e2b887f108733b3b83122531e62ad74fe8c6121758dc97e90734
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b12a0abc339fe7057ee86546462a347
SHA135fc5f9eb0d71a89bcfd9656b12d940c01785b5e
SHA256bb872593a70b5bf1b058eb5b850ae9a07ea0f7a357b3bd8867ff18aae59947eb
SHA51207c008bdc913a9e2f190d2b301d72a81615c5f51d6c2faffb8f2d8dfbb9999c96a32db8691d432abf819a9f30bd82760b0c206e4d5fbcd140615a6c1a52d2454
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd1e77bc9049488c3cb2118cd8dad04d
SHA161b49d95bb6cf6c3ea2ebb970135f18a67f5a5bc
SHA256060a2c96c3b81ad99ae769ce78fd418a78df1826de751cd95479f15c5b9c6865
SHA512764bbf96b975362738ddb999d176280d049b3005e547efa39b628c94c245ea8d4c2b6a95069fd5a97d8b4ce3745a11cb926e269be2114899e9a202a0e659ba62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b0e59e9f8152c2c14c06149d56093c1
SHA1db45e50dd58e3fa4febf920aff021e1d9430224f
SHA256b473093985ad1e60f60e913f0b74695eb68d7cfa2d20f48ab86afdcc94860995
SHA51282b28a82489a2c64cea32d6508773102843b1743af0bc7db5ba02197b8f62469455acba0182aa28db63288a61513b23149baa714814288cf202d3a31fb86da1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ff03a61673ffb7f63ae90d6b5abbdaa
SHA1145a7b71fec25795c900c6c74a68fb1ba414f4e7
SHA256ae655affa19665dae46675af56839ae0b75da2b220bdab05f3c62dec2222625c
SHA51210384e600f70d137a212bf5a1397f5df3f121e503edd2cd05d3cef30f949defaa188347b55214d75c714ee4c3882795e6b18d6c1d5b9d4c7a986fcd8c2261b59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55227c73290a6307829fd44e0757919da
SHA16815b95e8795189be6a97a739ddc3bd42bc317d4
SHA256794ddbdde99afe80bfcf798798a39c9803e33392ad1d13f71965f9571d5babf7
SHA51245643c00e3800e61929173975555a9e9c2735c1deacfee48c9caed7f91b740e6992fc0c8a9c63c7ddcdb34852ce709dc02e49133b1bf7bd2afec0eb1b01e7017
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59da6a9dca7294541c03f5d614ccee5dd
SHA14cbf3c28540f74448d77a024a615b0ff6f9f6781
SHA2561fba686f765cc088b64fccb99501b0a60b1829bc2b9fbb47e667e8fb639f1d14
SHA5127df8466fdfe21606d12ab36e4ec060f325be2de083a6fd94f3eeb97e1df6e2cf1d7a6b2e37d6325030f9505fc8a1711d3466eb30190e832ef69ace17c5802c97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dab93d76d5d9e267188a6d712b4aca0c
SHA1a40c3e8b1e1c06c5c3db3c77917b8eaca9bf6a22
SHA25625dac78f5d2924a61ff52505109c16191611c8e8c8040b9639423be4f0090e7f
SHA5126731f09d969741dc66c4081941646b2845632b4f59eee57d2020d3095a75517a8a710b22156ae79d620cb7b9039be1bea77b16d468ddfc34ed4b50fa588e5538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59304f77483e98e5f1d63a485cb003147
SHA10477f791ec64ab95c4954e7dfb342f0aefb6c7b8
SHA2560736854428b488c5c187be36f113101b7ed92c0fd0f6c86e3b8a3f5aac5602cc
SHA512e5e24014caac9a40660ebcb1ef29a0174270b82e0fdeb1da2d2b27342cf2c0e09461adecbba9a3420e02b7acfa26b2999abfdaacb32d9dfa3618ef26f238fcdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f780846a4c06088e2ac81d38321b2ea2
SHA12d63d2fa6126a6826a185e682660eb358f6aaebf
SHA25649d8b380001e5b973d113c031f85abfdc591f0ab56ae0da70c91634a41866433
SHA512b4231bcb83b829973c82a7393298479a7354e135efa231de7d8e90133eec00ce158bd4b1cbd9727c49b0b8a1949bd072ebccf5a7cdaab744425a936b6026a6e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508fad45f31e5ea37ed78a50e26791ec6
SHA18dd1f2be7e3bb2e64e3059517c3f33937288a9f3
SHA256c37e3229adc624cc09b4b3eba630ed5582d3c561f67df89ec88fd2d928fc08a6
SHA51278786fd9874b5414cf61d1f6618415eca3ab7d8b4817b88da022584f19c451a1466579090d51f5fcefa858ddf92f2de202ae589d12f246ffa11c86b5c80d21ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540cce3f5e163b6879751293a9ff10042
SHA1bf5641cc61b3488893e204daf26f2440860a12e9
SHA25699a422ced2c517e4215ed68e1e5a1725b702ab3ce3442b7bf8cc4f47e13a6fb8
SHA5121e149fe8e7bdeb2c07e7cf4df5719c8d7e9b41ca72374156dfadec35e8831c504e751172331cef5356e4606a5cf1590d0b72c2e40fd7c2d79f950575ff88bace
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f4094b3bae60c0389dc01b27ff17f96
SHA19f66938a40228971fe0f02011a11b4ab14fab76e
SHA256eae7e033cfb0849fec8cb5293e996607fab2484ad1a6536deeb8ea1341f12caa
SHA5126832ee52e370b1da198a3ca62aff59168ae5e8b9128af3af8cc0095cb783624730f09c8a0f1251da859ce353055832f8122c5b7d10fcd9daba5bc36df0c37f8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5808291a7f15ca0be38a7fd796b996c24
SHA13a674cd85a1659e7675e22dd8ac8129717ff553f
SHA2567ef06090e2013d315784bf43559aa51c8bc5fd5ecba6ec70347c357f85b30c6a
SHA5120486fa71a2772f86b898e9d1fd64894024c04289f436428a308f74211730e1d9daa7c593c488349518851056cafad939db6c7a6d9c8a586415e9101df1c64ea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5566fe92e8f43e794fa0d0530827985ab
SHA17c0373176b085c893d17067da48e8b49d00ba1e8
SHA256e129e0d5690a6e1fd1d8da60ddbabcf06b48f132c2e798b34861305cd6c1b098
SHA512d9b6ee3d3d460cca92d193e0aca9da89c152b619777b009c88bea6b6a2800d8ab94e9401926d8824e1ab3e1d912794637f1a37c678e6185e07379594141f4d4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541ed1de7da5619e7b2ecea1687a16715
SHA1c75607c68b9b447b1440aaf14cdb1acc3e5382b5
SHA2561340e59989a4f0d40fd22264e58610ab52fa24778f01eac8453f18d5aec3174b
SHA512990c5e1143fa6b250d261b1bda70feccaf47830c6387b110f7b2a003925e9b835598d2ee62eda99f0602b34e691cc0fb12c30087cf2f98828dee9e6a6420696d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527a8fd43f9e5ef68acab18515b1dadaa
SHA13d42204a63fe07d8b5355e7ff2fc4b31fec8370c
SHA25671b4aa17f7aa2bf8fa688b81f536177044c0ff8cb9ec8aedea0fda81d3bbb9d7
SHA512b04e26df9589f904fe435da48451022148b0fe887d92cabaa084ee5763c4c4ee95740961a2f67517f17c976b36657e5191128137df2b0796cc1dd970f0cb3185
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ecf9ba1a852aeeaef93618ecbd35d22
SHA18fcc26737cb5142dcca28ef6c04b94a4d80a24b9
SHA256061a04ef63c52a9f71a92ecf60d89d794da44e02db09aeb59f06c6ef4411b159
SHA51200d7c88638bca813834640b341fdedc77b739981b0663f72ea56fb8404b932dce446d6052efd896bde4787f5d860d5497360f10014c4a4e143531f8506692452
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b