Analysis
-
max time kernel
120s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 08:28
Static task
static1
Behavioral task
behavioral1
Sample
8275e857560da7605ee858d788df1ba9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8275e857560da7605ee858d788df1ba9_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
8275e857560da7605ee858d788df1ba9_JaffaCakes118.html
-
Size
116KB
-
MD5
8275e857560da7605ee858d788df1ba9
-
SHA1
044523d4379652a4926344dfcec150eddcc92791
-
SHA256
32ac8df1e9ce53d1d805fe8c67153bd2098fdf0738841c2abce5fadd0966af67
-
SHA512
74bbc8073327040578fcd0f9971381834fb243495756577d401dad3273ab33964d7572b60faa68cf243eed5d1cb1094decd76b8469fce74c2295481cd451d3c5
-
SSDEEP
1536:rvUxzcyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dK:YxzcyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000008bb8a153afc25d82eaac14a7a17d24d5fa67093e08196f46967fb5e3297f9687000000000e800000000200002000000063c17780b9606bc77b4a14d9c1b784dea4c642aada91c1286921403d9ade68172000000071d19723f19786ef35ecc40f7922a21372c0b7282ad24dfe94125c3502c313b14000000022bb3efd2ec4c423220a767305bec46a1c7a4180f94752463b0eb1853d63ff9f384801ee6d1e61dfdcfee6c7c044b128e461870ba4981238744bfcb44ca3cfa1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0077c3e7702bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1315C3E1-9764-11EF-976E-62CAC36041A9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "436526039" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1860 iexplore.exe 1860 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1860 wrote to memory of 2332 1860 iexplore.exe 30 PID 1860 wrote to memory of 2332 1860 iexplore.exe 30 PID 1860 wrote to memory of 2332 1860 iexplore.exe 30 PID 1860 wrote to memory of 2332 1860 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8275e857560da7605ee858d788df1ba9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1860 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ab6dd23a1dbe8b7a8a4345080bb0595
SHA149d10d9099bdefeeb9282023ee272ce15622d563
SHA256b05d31ea9a1c2fa3e04b888ce209e27b918d2f4ceb7c90f029b3146615b54240
SHA512da7922715e2c1973c47e04056bb0e25ae29755fa607725cc613e6495561edfd301c168676b9728ffbc6a2946946a53e1818cab0c007ee2ddfab8317ea3deca2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b2a067fc8a24168235716ecd6cbbe6a
SHA1dd7ee10c004018aba1a8bfa9d2fce89554d00484
SHA2561d0c9f74ee5284adc8046e92b1657140b7a2c64083baed3a4eb350c8827a36ee
SHA512dbd53631d570e33bddcc7a593f51d2e2bb98af5381af150bf330ceab5c1749cf25c739da248c4783394f992e03f9f05c8ba4fea8736efbd57e7788b8e94ebb87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c447c867a5320da42d950c44be28be4
SHA1a9b6b0bb5a36e104d9e9fb7a4685c89a2edef90b
SHA25618b937912336b402f833ebd9b7df1a5ea1868ef737a1404b5d3c4ba210d385c0
SHA5120617b2a2ca37a2e16e0930e571f152391eaa92a66d076e5f2f55f36d6f7af958192b36cebbfd5ee5d1d78921bf46a1935acb301fe39405798e651412dd3f413d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54029d2d58bdec5d29818f31356e73b14
SHA14d18bd3d5961e94a9c22bd818f442684c7d10c05
SHA2567120a13fef7d937629fbc186b18ae09cf2dc17ff0af7abce915cbd6abf5a5cd1
SHA512013bba7352d5f4327057fdeb461cb4c3ff761c560de943fcdfccb1551a14b313519c0483efdc00a79baf914a01b0dd26a198699b2b60ca3cfe9f09b788fad572
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ca104ae9b4f45ce04b6718995f0eb5c
SHA1b514f475ee009f4179413a1a15045b6337533ee0
SHA25652fa98bfb6ded806cc4224c9e8cb19d8b8b2ea137af72e0f3772a6bb7b4bfffc
SHA51221ee9f7bf87bc84c4504253eb74a484f92252b6719138f027a5c178d4cfaff419ea49d111461b651acf9a0ce79eb61a532aa39dde0967ae3fcb4e50b6cd3b42d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5488fb301d06ddddfbc05605b4ec28191
SHA1c28f70214c269930db63df2b219d33b0e1ad74ac
SHA256110971bafb8984f31453d4691820ebaccf1a0695d9e9193346d176d702a9dc57
SHA512058a14a27cda69b3eb8c3b20b19f9d0438f00e189c1fdf7ba133da081e040f49b1a4d77723d05578dfc3ca8c93739180a6d1b5c1583d44e3e65b6675cec8968f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502264936ad33daf576529f169d55a2dd
SHA1ec3cdda79846c02834291367616875490f0a342b
SHA256d8782f17ca63aa1097263c9b0aa3a458af475751c91e9d8d4ae06dfc4f557a59
SHA51267a37da7c75daa6a7273a515005bd14e420905c81f9519cf6a87b57b541add53d5db6d8f57a56d131bd2d10c265b915d0c7b68cc10b59cdf0dd1e901838fe04d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5402c9c263a44ffde313614fbed9878c2
SHA1e486ef835c2d8b33ef39a6390fd9a93f98ff195c
SHA25630afa681c52bfcb517b22d53a6badaef2e891a62fa343552ea3a0123ba2bd2ce
SHA51270abe3c18ee3f1f66ff2f3070632b3250581123ac1f204d11f8d6c23c527657b3ac6dec910877c8e963c7e15aadeab3f20f9808ce36f1e80ea016ab02695f073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c36d655acf7f294c7244ae687c3973f
SHA11a723601793dd1b804c56efffc3aa206a96e783c
SHA256a34f92e8f795cfaa7f1e4eb915f8719831eca120b203975358352f52e1945885
SHA512dcff3deae2e5e28b7de31e4cb7343f9464d42e5c73d012743b94b3639cdaead6c54d7d5f46400d0619e0ee2ab52b348414cd404f8af4ecdd76c48d36e5c7a232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517ef4d697f66db77df422900a0729bb4
SHA10bd18c6b3a6d2baa74dae6102d788b2d265847c7
SHA2561ccc23f5987696fd9a5e46b1683f503ad25a8df86c472e2d26b78d5d8213e62f
SHA512fb2e728459492448a4374c91b1f3c491fdb2e0ae37bd908befb707bc53869380abc9d8fb5de5845def889e3b3666cbe1449f972f7f0b4e4f0205805251e6f451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d91c2731b6a8b08637ccee1f38ae6608
SHA1c28b7fc14ff3f58ded9715aedb7abc50c4aa9862
SHA2567b56cea7dcec6a34a9a9746f9a2d6735e5839d664cc845070f5e169a8ed4fd1c
SHA51271d75aa2494fa8518009fac2b5280df578b6494af2c4c9cdc6d02125eb6dd409d637de3ff140289ecd3f91489ec9ce39ca904782e7d16ac59c4643f83406437d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7e64ad92c3f0e5244877eded560a5d5
SHA18669c157d92cb71672a5b44565f12409cf58ff3e
SHA2564426304b1ac0ecf5c2970b14d37634d03166108369c7d37ccd44637311eb1286
SHA512f55eec16f6d42de068e12ce23a3b4242ccf26b6109797152b90906a1ed1dd4d261582ad206932868113ef14c866cb889b26e85ebb45e9e00d0a00fb975664862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f21a25f747292af48d56aaa5a8091640
SHA174414e48a6b3af8920c1da3a312bb0cb0890dda5
SHA2565cec53b17a179415bd2830f7fefeee84d2074fb7b800493ca373d6273f73c89c
SHA512022b1157aae15a85f70adb4133bf935355cc62e33ff54ffb6a9724b1681c7f654d9c14b1b887547bad874b204a9dff72e942e4f8a32d50d1171955a136c43a3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55300ffa9a4f76c48ad2a2c55bab39959
SHA1ab63601930ca877ee9bd63b0d4a659c046aece77
SHA256a2f9f6737baf4181c6d142872b4a32298db461bbc87f7b1b0f3bb8778e7f932c
SHA5127c841550c6aa7c3de22226d0b6761c2c84c03bf1362c14b7e4b5980ca2456e60fdc009358e3bd7134644ae0e16555410460eced9623409f53209dede667f0faa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9b723ddda6daeecc3aa00c3adc5c73d
SHA197bc07b3225c47e73fced68b3fb4b15fa05ab8ae
SHA2568d5927bb08bf81bdb540f0546db088ed8c5e9d4925a49c118e70f830f23dd15d
SHA512cc276eacb09b6ec4701d1f83a6cd64273c6a917b7b5bb705abfda8e7b019ecd4c2c0835b781ffa015fbe9a295d8cc717d605d9b845bf05d2288650c2906ce13c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52095abf4ca8b3784b1307fb8786761b4
SHA18b095a3e027ffdc08ccbb6918f0a9a290cee5318
SHA256770c5d3c50611dcc86c1102675ae601f01cc6b2b92b1f4a812f2417739cecfea
SHA5127a14eb6ccf387bb05dbdffbf7a55834616cac3e4c395a57032b5430c3c9e323a4bc2c89f19cd300270a17005e7e2e20676fc5dad5cee52bb6885bc17642bd6e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6e5c64618d503240c7155f048969b24
SHA15a6cd11a104d9dc399a08dccc3aec004bbf13024
SHA2568520f591592b516f05323d0e2c135398cc3f84269fc6b5db2dbcc2a73f0bf819
SHA512a4899d126f104403aba678be42d5f78a5e40b65f5b5a0321b61101317a2ddaf7c347e9b1a336f60cd4db1aac4698436d6212473aa21eb9d81059750fefaa0608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fb6158548b4f857892aa1766fbd2442
SHA17f46d5d3cf2ca862f49d156fcc9d8a973f1f6339
SHA256434f899cabf244c10d487d84495db3334f5da7d938995becddf490ecd4a72466
SHA5121357152b0c646783b3d814dfb087c2bf839f0dd86777fd855c9497a50a68a6d187531dd7ece2607204d58dbe3a602b2928ed501ce60992661dbecad9dab7a105
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b