Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 08:27
Static task
static1
Behavioral task
behavioral1
Sample
8275a7d72fb7eeec5bfc36e5eadfc39e_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8275a7d72fb7eeec5bfc36e5eadfc39e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
8275a7d72fb7eeec5bfc36e5eadfc39e_JaffaCakes118.html
-
Size
44KB
-
MD5
8275a7d72fb7eeec5bfc36e5eadfc39e
-
SHA1
505e271dda71e694f0aad0b9dabd1303e1c02f46
-
SHA256
3e82cb749b8a1ca6b4f6320d03335fb2ed3fc64488fa1b8f0ed58809b24e6b29
-
SHA512
5ac5fc9eb0c6a242c764ca34858024f28d7c863f9a6a7f8dbe56a3eb3042f7cb01dcb85a390bc2799ac9570d463c7208b3257f9ab3ff7a9b19d4ea2dfe48766c
-
SSDEEP
768:CKroMDDG10a53/kEtsIxTNG4K0J+fk0f4l4p4n424V4g4B4l4J4T1TGPmP:CeDG+adbtsaxG42gCG4JyfOCmUPA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{041FAFE1-9764-11EF-B666-DEF96DC0BBD1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b1319000000000200000000001066000000010000200000003d9e774054412e8bdd936590f1a392bb026ef682e2b38c0193b59e9fed84da9d000000000e80000000020000200000009cfad96ef23e89f9ec7e825fe14366fc2a8e90b594567e7ae496055505909825200000004a21f28c42a5c703f7f6019163a92059166c30f7d58b697f1b2d8f87d19fa6ca40000000f58a547613e0f5936179228f1daabb94ceccaf56e688e1f62c4e24151133237ba0461e4cb63080e30943f6a45e6cbd524ae78d00645a21085a504e8f11aa8bfc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 802438dc702bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "436526002" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2076 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2324 iexplore.exe 2324 iexplore.exe 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2076 2324 iexplore.exe 30 PID 2324 wrote to memory of 2076 2324 iexplore.exe 30 PID 2324 wrote to memory of 2076 2324 iexplore.exe 30 PID 2324 wrote to memory of 2076 2324 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8275a7d72fb7eeec5bfc36e5eadfc39e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582df9156df63ebe5ee46cfd1331943b2
SHA1e3367b6880748d21146e1b7497d91f00c4612673
SHA25686db30c60359d72450e7f3198daeb2367f3622df474b292088e048aa9bb2758a
SHA512a5c8c38e6cd0cea939cb7e69041a709b53a542961f1dfd1d14e6f59edd2f5e66aba97c0da532cb34deb4941a980a9968726d4b595dfbd8b03443ecb4a168ed1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588ac139eb70105bd94f561c423f59c1f
SHA119336e0fbb1745eb17b3f3fa18ba082ddf0e4f46
SHA2561b5dde113f619469c486ec8cc1f2acec142e13ab2586a1a0f42104eb05572542
SHA5120cb7e1b64fbc1d2e6e941ede96b96b87b102e5adc88e345c9a0bd56863759d9bb5ba6313dedfaaca96409122002e397d89aee35cf84c342fff29149ac9e15e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5471358ecdd6e2cf0479f34c321d5a913
SHA10cc86ad1d89b7cf047a67f583eddf6d35b7e9e4e
SHA25689f9e917b439782d0d4505a173e846c5bade6456e2d4af2d5a040f920bb89e47
SHA512b5568cba584cf5087dcb1c6f98c04afdbe6e74c895ffb24d921dfcd6cc296e647233f41c4431c030166b53fdec4ed536a07559a4432cc655d7fd90f93b2b7841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5463add0fbb9e3a5f2d7b5acc8aa83c84
SHA181321a03ad13093140a2a1cfc05c95c0ebc58609
SHA256771397dd6e99806252036f2c970a471314def5b394043630fc11e56c50ea0b4a
SHA512faac3c7df9d43c42f6e874e8a882105acb9f5c1d611a15bdc9383f86ab728fc4b582304dd0b4ffebe2eb4e684599e0db6ccb67c7f910f4b7af9b5b02acf122c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c135f6d14fb39370acab13f43e127440
SHA169ed0d73e4b7128b5a9713ba61faefb75866f3fd
SHA256d6fa172d7e71a9620ac1770efaeef07349092c9bcb1aab2602c9961ac058e45e
SHA512bd27d93ecd67c1201e29fe5f8690d06d6d01812d7d83fd5f6b1c49f3980641284b23df329a8aa81c111751702ad5b37b926ca616500a13c34a24f651be2d1205
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bec6791cf44e243f0e042f76151c46e6
SHA1ec19a9139e196414c51c8b06d18bbdde15499304
SHA25637f2d92f6d380940097a7d978e10a55d60294fcdd899bdaacc889410ed350678
SHA5120e3872ce549937bd496a91e51a2c8db7e1915b6876ac6d79a9083593360888d223dc95771c8c39c4921df13d1d8e0b99f345f23d117bb321e11f8b1611e8047c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eadb8b4b161ac03b59a883331da5a49
SHA11765578f8873bace7820f2e32d04db288a637cb9
SHA2565a5d785fa97e12abc992aa40b783f29366bfe92604d91c1c2a9ce62eb169e84e
SHA512fcd85da3f87b9566e66bd4209e38e86926ff56ae3aab0ff8ad012bbecf325209039d93d92b62ab544643f7b66b765e1b06e0b1b08045e3f50a633f864315b326
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da39691561cf980a6e1c893bfe31ab10
SHA1f4f2c09554cc66f2e72fb8aa0d0e8d1099154b7d
SHA2561aa477bdb04ab0d5de472ddbd19617ff0c35ff5dd3c62472a08dde3dd0f620af
SHA512830fef952052b5b077a67885812a4347da3b85acf53af119709f10bdfc54b6f52c079c85a5b2c957488d350414f6cdabd9537df78884ba75d095501270d8ca48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c4b5cec9633a886ee8eab14707a74e7
SHA1075cb233e4eea17bd9b00500f0cf442117fcc37f
SHA256400d4914dafe1fcd1aacc74dd4f55fdb54a97e5a44f80cf33ee390dcc03ab7d2
SHA51211453ab7ae4177f7b2e43b442f73cd8ac835b477d6b2668cf73613c96ec9ec3da3a7e12fde9eddc345f9ab94206405fc612eb5cc9f277f4f351ceaf9da910abe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca6a3afa10c0c000750ba1bb95a02ec8
SHA179161a51f2a9b7c09f8d13f1e46ac9e635e9eb78
SHA256ed374fe4f9e4d1e855f314b5efdd1f76a713f54412bc41baeb7651319fa7551b
SHA5121f8f8496b180044e2f2d3ecd90fe9c9c13b9a4ed2e25e849bf9ebb74e1779ab2152ed042cc9b57576b769721dfa71ec9ea0ad0507c1253d04cccde37088ed5ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510280fddd601812e0c60bba30509388a
SHA18c513d84ef24975b64a965c48d253b9e3665c386
SHA256431cf6c5d305b33bfc104370a7d1b8ea53267e0eee8069c9a2ec4b81b98398d8
SHA512cd45723c8516594e8ecf973ba5e2dd8a57f8dc553bd064a0963d71ec3b76c707fb99f9b4f9df51dcea6974e33c32f065d635d07e982a43ff3bdffc257430fd02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bbbc9d5cb855ca7478de4b0424a86af
SHA1ee497218003be9828793650d693868c8a9be1813
SHA256a41e06b15d3e639a5887d5f599bc13661380ba8b950a58a270b710b2f9bdfe59
SHA5120e917071fde1778f3330dba9b10d21bbeddf095dd5371e6784c92ec25dbee3c0eac852650e85e2a82ec9c26b587e6b32d74185c21817faf888f4ca8dc21010b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ac7c2539e5113b70287c0300a909560
SHA1b91876c7272fbb18f318b384eb6710ad1cb2f0e4
SHA256c62a7cb645c0900004e234353e9a9631201ed1d5436931a5f1db045a0f2caee1
SHA51247bd2e19749633468c9945c19271babe83c81c23d62c85850f746f9309f8bf66fa68fe2c71e306d514db69e1326c12e2924a0f8a25010d475e2b112c02efd7f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ead8cad12a0fba614db747aecdc67c1
SHA1e62fe02f8fd7714a7e2716f944f39a4222dcc172
SHA256dbfa5678dddbf9d5390ada8ee0990b02ffb65682cc9cbe5b844021d52fcdd86e
SHA512c75d663ef6042effa3bf2584aafd4805b928a16629f677d034d45f1e82158e46a56d4d9d57731f4de1cd8b47772b7c64cf801dafde2c65f117c6b5f3e9efc12b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592045e02708088e3b1b6445525fc7226
SHA1f1fe708f1a092bd2eaab4c72236f4503b7a3afed
SHA2567f422547108bbf0c1059d87f23d647fb4545426bb955134e92e330d665c3f4c0
SHA512dbaf8fe536d6a38e81fc7ab856aefb106b91f5b9eb8bb50ef6cf3aeafeb0a15f261ebf16f673634d456d442cf86d0033a0bd41e318dce543f13940323de54b14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57993bd87b0ca60eb7e82e2e9e5c2d9a5
SHA19af0b61565b6667afcebbc89f68bac3cb390c309
SHA256670cce98451323855a9186efda3ebb3abff58d993e9700b2ee1377592bf62d26
SHA512a4a660fd003ef7c13e7bef7c6c5fb9dfa380f526e70ae0ed59c197077e6e28f06a8f17f61acc082bd7f97d8c07eb4da5302754c6bdbe064ae535c93948a7c16d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa989f3e5ae0f4cb45b11dcb4b8c7b3b
SHA1502670c735475d3e633f58fc6d7a040dbe128ff2
SHA2568857cb03a9604c5758ca873ef1c13176667696073d35c23037f4025682cbbb77
SHA512847473f8b667f676b2a328ed649dccd947dc00f019716353b648a62cd8b23a7ac7038c482024bc79fe4ac1adb0f601c72bb03393bede45ca27c336eec96b5c47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5246b5412a4722c37475c5f06f5aef255
SHA1aa5fd6b9809053dd32e25076b6461224e2a7c7d1
SHA25658644439322335ae0ee2179f52c50e36e2a58c60051dae5dc8e339170f496199
SHA512b175b24a5da23843849ec40e6434ca3ff767b148e52e4f7e103a94c9547fcf058023619492ce006c7927d8b4810b157edce74e0d46fd045cf44052ae1e394023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570be8c72a0a44a74cd56cf628cea8066
SHA168d2641d1881981e237df9a867fb9d9fad7106f3
SHA2566370d670a699e547bde01b9d1edb531b7bfe4ed470219aec1cc65129e96e67eb
SHA51263602485977221e7a2e135a79b6b2ec4c0b9aaa46d3ca109bb6e74184434dba9218fc99d6a2e0a975b2f29789bfe5096927498cf83629a8fe05e0d0714804bc7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b