Analysis
-
max time kernel
65s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
31/10/2024, 08:28
Static task
static1
Behavioral task
behavioral1
Sample
8275dbdc91eb1ff8786022c129ea6aba_JaffaCakes118.html
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
8275dbdc91eb1ff8786022c129ea6aba_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
8275dbdc91eb1ff8786022c129ea6aba_JaffaCakes118.html
-
Size
55KB
-
MD5
8275dbdc91eb1ff8786022c129ea6aba
-
SHA1
2cb4add8baf924414596986fe49ac18fdb1c4019
-
SHA256
aad176cc68566d564246d0de73adeb57028c1e464505f72064e597bc0fdc1219
-
SHA512
8ff294bb32c70dda58d79cebccfb7cee6ac72018644046dbb9a676a83665bc6d0ea88a3642d989987f8dc8e9e951ee8a7b4b7906a6faf9b6c087adc3cca52eb3
-
SSDEEP
1536:c3012oq5ZEHrbjy+cbFCwpqrATFjDZaMkvww26rfEb:c30a8ne+MF7FJD02EM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{21531ED1-9764-11EF-B731-7AB1E9B3C7DC} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a907cc1344750743988d8bab481dbfbf000000000200000000001066000000010000200000000b897ea37e9c16469928671bb95b63feb2cc608434e5caf7eb5188c1fbc08c21000000000e8000000002000020000000a5f74c85bf6337d16e54ccb0050d84b6c6dfe304f169d0f6ac6e917e811fbbe62000000024532b9251aa7bb7eb00a88fce417e7feb866dadcf4020d21ffedfe3084385f640000000cd382af8a6d3588ae8393a5ef2622ddbac2eb4f6009ec19cd392892e8ec25492cb1750a439642d8419c96b704058e8125cfbce7238c5d66862d28b6e17c6ae9d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a907cc1344750743988d8bab481dbfbf000000000200000000001066000000010000200000004d1d2ed9d8bb01b73bc761abcee8eb78a2a56b7754e10602b0e9acffb423ca64000000000e8000000002000020000000376aec2f7a9bfa22a789ffef7fd14a970bd4ae910449dbad98c7220937ad7230900000002377e340d69779311a1894871b91b47944eadc2b525bed0fc7859ad83a8429bbc881ef6f83abb351483fdeb1edb45971679953b08fb8e7bb530d8e42f0604030a7b11cdda29db5bd1e7c1a4037740d7a46d5cfa8d808e6973e2893a228f5fd5afaaf4c319c6267a13edd8b10b6ec002a801e8428d1d90b2fb45048111805809aa1a4c7d82b9cf9ffd8f8c8fa9760f3ca40000000dcf07a8e51945c3b7600a48bb303e215a876488b973e368f705278aa97890e78f660e04770c3f4048ff19f027bd40daf8a16240fb2384a4bd9fc72a51965c056 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c01e1cfa702bdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 iexplore.exe 2156 iexplore.exe 1008 IEXPLORE.EXE 1008 IEXPLORE.EXE 1008 IEXPLORE.EXE 1008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 1008 2156 iexplore.exe 30 PID 2156 wrote to memory of 1008 2156 iexplore.exe 30 PID 2156 wrote to memory of 1008 2156 iexplore.exe 30 PID 2156 wrote to memory of 1008 2156 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8275dbdc91eb1ff8786022c129ea6aba_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c64b1912e9637274bdbf21994782a59
SHA1e5d774c5f2475193cd56440043e9164d82819a30
SHA256f212aae65b781323e0ff1b1ea2c4050e677aae5ee9447d8bd6dcdeb64dfac4b3
SHA512686d3d3a899f9f1028bce9c956675fe814ed06f740e6173683ac774e4437207bd5e989e874b0a517591f794fd023f5be81aebc6c4717429b2b101690469e1e0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bbaf140f9dc8421b66c7ab94fb2fb2c
SHA1f529a912fcbf413636d7acbcc7ae14fc0812605f
SHA2566de62855cfa5e14c2756d3df612327f07948e36a8ef47e4eee118e0a654ca63f
SHA512a1cd27c4f697747339dcdeeb7e3afbbf03bc62449cc44cd1aa2ab3d4debe5780a5753c01fbf70a4c5b7703eb597bdf17c3028216e39f9cfeb3df7af4d84dcf3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e1c7fd500e951834d4b45425a770668
SHA188071c9e2c669c034d61a002ec53c8cc6dc1d344
SHA256363e8049a19697bfabb69d4f40143ced3a33965e0f242ced5a9544076ae83e6a
SHA512e744f814b46fa01e8c3ad572bfcef8c6953a17345d4095066f11353f2519f87ad0f38dc9f8eba96f578eb139db035630796315163ba3bd7b495d7810c3e1ea8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5f6267bd6387600e24db5eef16f986a
SHA16226627a4eb0d5c4a93bfda56c30e23e01b08c0b
SHA25683ba56ca818f4a45935b622427a5878ff4dafe476ee02a01ca91bdc05a3ae43a
SHA5123d433473f663ff98dafcdbb97b898c469249ba2d380b3fa0fcb5287fdd6a486b2ceee9a7c8fc7a2658e4adec48e32e19bf6d040718b5ae3e0d8208ff8b3fbece
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59442122f2d2451cb02a1bf3fed872c05
SHA1d5c559c5de9ed244948d797cb649c2df58cb3739
SHA256d6ff73341730db275f89fa673de05bfe966395a9728eb17f1d2c8c17c568c7aa
SHA512504ea37c01e7b677ceda398ea72ca7afa76c68df855756b736378dae9b8382c21e1482023c989b63df6360595857ad611e185361c62d1739ae47425ce289e100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0f88c159fd4e67cf63ccfb4f9555b2d
SHA13fe9b01283d039f7373dd87818ef54ca94d1b1bf
SHA256ee77cbc57404378d50cef9e425bb365a1319d134a9b337ea3c139d1b24855c0c
SHA512e866b8e8b849b9898ef1b7f7a3613f7639cb0540440758113ef487f5cb0b5edd8e9e303001b7fe0ce28027c5b6a37b56068186aad7ff1add2739bb4f33f4636d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b02ba14e619975ca8d554a4963e73016
SHA1a01600f69ad147d9799aca6f883fbfa8b9cab652
SHA256cb66a8e836d52237b24284c140096df260021b62b207b6aa148e6f10b13767c2
SHA51298b3618467c3cb572ac4e3395df475cec5a56b371f4e39dbb3a9d8f032f9cbddb3e89b0a58a38b00621eafa67723b840aac0605ba3076a7b6bac583fcad849de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac68a6eb9f9c016ef357b613d16ca7ae
SHA1d6a16d86bd12ffadbbecc9225cb55458ff1049d4
SHA256b026d166e9e510381beb6634efca24f08260fb3809871d9c662d6079e59dc2af
SHA512396a3cfc369cfe71fceeb8a388def0da25e75aa6363463e64a083f17837bd6fa72cb47b850d88d5134108a0a47bf1e70d8f13443841cd8c52055b49640be623d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e969792cac84efc7d2e457b4f1f0e24
SHA1d74dcedf98be0ebcf1bc655e091f27c16f3b3c14
SHA256c7a4478516ebd71fa4ff1920f7597d29a3365f2878e71e6250301ec26a3abf25
SHA512c7b34dc050800a636807c7af5bc46176b0a1d394ddb94cd1ed904a7f2bfe056df541237dc24a122460552f08c7a3cc74023f58b4976ea2f2fbd042520cf17653
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d1bd59ce39a72e02725e01c151662b0
SHA134ad934da7efac54ad066c8e8e7ba159c120183c
SHA256005ef45e6419d5cf4ad0f7692a668fce61d210d8919ee592615acb29bbfbcd27
SHA5123a0d1452ab8d80d698ec971c93563001c8d6cdfeef0e7b87ff66186fd9056b8f68191f72d4dfea956acc9c9234fb10f7d236dd3d5416944082c60b95c1094f6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c2e2d079e0a4ca58038cef841c1fd7a
SHA194a2af260a59ca7572dc0e00eab07298b4238866
SHA256c3696f7e55269562497d8e20e21657981e0e687b956f243f8561199a89b53138
SHA512007f0d154d7d6a423af38f1833f053dc21a9406261ccf30230742ee1fc7d0fbe954f7fcd772b211213fca582cef5dc18c7310007c331b4b7a2cb76db83b81f8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcff629a9a96ce8314c46392f67bc0f8
SHA1fb1928d0322c7eda31252c722273d8e9a79ead53
SHA256393ed1d716162e913d3da5110c1c6a4724e786c8770dde05fd84091ab93902e8
SHA512d570d1943627b79ab5546482cda9ede9f925bb87a5f66854e35309638a7f687aed0c9c48c201472cc42101bc0052ab846e28235167d73dc619d05848bb9e71df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fabf724188b8c222b1bd5629853b7363
SHA1fe13a81577c0d055b58416fa692c91a3b4e22c5c
SHA256c70d5b808304f9e81ab042176e324eee6406be05162a04005bb4441f778ac88d
SHA5123e72697bc9932d7c43e4eeceead6cf866d2a1bbd5ac184bfb88face21c8df94228115338c29da7f8b533703d80426f20dfe003029047b94e434982ae9a787873
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce644fbb67537c89e643050f68523748
SHA1842ceca5e4130c4d94afdc01e9a2750616ab447d
SHA256dd8db6079afa09216d75f1b4391b5c1cf10a14fb8de46105e655c05446db1fcd
SHA512d550e16d5984e637e18f723f14cb3b1e971f9d7f7349c234e4c59b986ccf2c36b10310717274c779199af12a6cc132ca5b0990dd0fd01bcdd9e85aefdffd25c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a9fdbba68e4b5d599bfa1d2d540044b
SHA1774cf19c570179a7457d856b5119715b6a132eaf
SHA2565be6eb04fb3e9310b6b8d6a61b92a0a56236b100edf823f6694e71eb0006ce7e
SHA5123a50e594b7e2e4cc7bba2e991ad8304f8be03fa4ba8b40ae6cf5d0a0fd36177db65e5afec6b8d5713fc0ac9662c77201691c111d79b7bdcaeeefd46058c90522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5913b7d66d91547bba5063204ec1489f9
SHA11d51c83e8880f73e07d3bba49819a86d4423bd87
SHA2560f53d24a43ea0c96f00a281622a9433ef5df733776c884406abdfcff19288ca2
SHA512807f73f220758dafbbb33121cbbb9d1683836ffe6cab9fe3e3421c806e1e5526cdf99cde40210ded70e96f70482370ba3267224dceafde5c4bd83dd98aa833c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a50fdaaa1104ca4557b591b8fdddb348
SHA129484aac5142f15c2a8aa5843ade59e58e9e0a2c
SHA2565f4328fee8bc2a5a33e1454bc5a817d2c69cb29dcfc3da63ee2e6ca64c0ea969
SHA5121c27f7786da9fc8a2ab5d27088538663a1d7c3309a938659b53343cc71cc0940de95a56e57146e8310bf0cecf0feb7a17685516a5947c804b252ccae45a88c0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538c6276fb0baa0950b911dd3ab586e1d
SHA107b17259ec870b082da449e1e74657965f466fa5
SHA256afe56a921f5140bc8385b60f1f45e12dc166af4112aac6a6bd60c47786daa034
SHA512791cdadb10492a50d130064a43df15f57d7c15841de6822826b2283f1be3bae01f31065e8dbaac8178ecd6a0b6c8246bdb49e2485d67872444db30ff95e07d5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb0457f1f40448570ce4efd0a13611bf
SHA11492c83fb392a686defe28223a1e364b90fdf286
SHA256f9f936e041e796c083128c686f6133eb4dbf661a994f29f5a2018cf167d2de0c
SHA512883182a3d0501e442b3ee8f592ce0e3f333dcae22f80956ac1a5038de8b6e20e75ff08e5e266c99270aeddc736b35345345ceceed639263d869f6df5b95f57f7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b