Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 08:30
Static task
static1
Behavioral task
behavioral1
Sample
8277ecd79dfc1032163126e9337d8fe2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8277ecd79dfc1032163126e9337d8fe2_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
8277ecd79dfc1032163126e9337d8fe2_JaffaCakes118.html
-
Size
22KB
-
MD5
8277ecd79dfc1032163126e9337d8fe2
-
SHA1
aff6998245e8154ac3e92c06268ebe0b0d86e6e9
-
SHA256
4365f773737794c47b034b4d21bad54f6344848df349b13d067186363d6b4bd9
-
SHA512
992e65b3fec51f7791cb5d99e56c63952ea64c79fa711b4a81068b3b982072556f59e4d4ae20d4e341364cf48490930d9ace355660d1965460e02a7196a7f430
-
SSDEEP
192:g83GVwYzel5iYzel5+eWnLzyw+U6lt9Xrn4babDgdvJfHVp0Td4/zJnZOGXpsEBh:GDiN59CfDgdvJdtNZOmpTvuZYaNR4/n3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000008355eb71fc6f7097333d626bd8da371239a9ad1009244349f559f495b0d002e8000000000e8000000002000020000000f01b663818ed841af98866c920c489bfe28edf7b761ffacdbfef4a36e7ae6119200000001bd53131fb740e16891bafd4947f830ee7d9cddeff69bccea3c9f56c1e494a3640000000a57155187416b27f1f6436b891939c9af9d6192a431a8239f3b3c105d887c5986acff72e94407b8fb3ddfaa89a8434489c9a0ffe165261fddaa8627987a08a71 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c033f35d712bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{87D3D7D1-9764-11EF-AD2E-6E295C7D81A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "436526218" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1356 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1356 iexplore.exe 1356 iexplore.exe 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1356 wrote to memory of 2084 1356 iexplore.exe 30 PID 1356 wrote to memory of 2084 1356 iexplore.exe 30 PID 1356 wrote to memory of 2084 1356 iexplore.exe 30 PID 1356 wrote to memory of 2084 1356 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8277ecd79dfc1032163126e9337d8fe2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1356 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527dd94eeec9d027d143ea25fc7ed4f5f
SHA1a82183264a68ac3b5d12cea2a9c4466ad55f2fdb
SHA256823cd9b057b6012b44dcb5292385e843f037641e1ec83839b49ad787f5ed978d
SHA512ee10bf72f90987528c3c072d02b8a04aedc2915c69782fafde14c457888a7b858d826981bbd24431cd3cb2643a69d2cdc0362e5c65b6cc7be5db36c2a0f91e4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd781ae6e56ab89aac80c6fead2a4261
SHA12a8f4313b5c5bca12c48c702899683466091a209
SHA25698ad08b4bb02476f59f33b0c02437e43ba24a3aa9645ae21d5faff2989dc3c8d
SHA512f1a0039470d2741b838c79ea5972e810156768d292f5fdcddcccc34877441412e90289b82458e223f8155adb784e95a5e2f5007192a0369396410843767dfa77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5952a3e3e61ebf6b807c0a860879778de
SHA1511fa3a5288459de06682674ed4285f91210f7cd
SHA256232a5e30b7fef97d0ed19d2a7a089f7dfa743332f4b2900074daf92eb37c7fec
SHA5122fb0f110f9016a64966a6d76532cd4c9cc3c17f8b6e2fbfdb3005f2e6755b90142f81a788663584200fb8c29172312b257157cab1496ac349ff2bcca54409a93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bb2386ea7d0db671c3b1f3ad68aa2b3
SHA1d49754abc278e974630989c9e83c9dac8dc02afd
SHA25698f87e5dd1d1ec87a18e52b6cecfca1d3947f5725d81e5dd2d39a215f7db3599
SHA51244c5b29e23d6b67f15a9cfaf5a1270f27768b314e63de80b3537eda1094e81fd34a90abad185cf374f7b4de3352e2e6a46431c771f48e15a0823e1721ec42147
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e43569ca24d41689e8613c8a1e6b049f
SHA150d5bd5548111173ffbbfbae254d93354367b816
SHA25625e8946b43b00b7f8ef805ae9b85393d6e3da11205eaaa765d4e115efb9f9d9a
SHA512d69ae478d4af7f55e48e72012349171117c2df56bf065aeb1401a7ca8ff251d60945c3da2dec46d9350aaed9b0ad8d6045e5fc7c85d6db2f753bdeb83b8a40aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5366a1c33fa539e544a23997bcdff8884
SHA1d17eb145c1b970db44d8419b075786833e41b6e2
SHA256700baa3309b5821f0c0838731e6f363d4f51cea2fe2f5ce5556b53a359e68ece
SHA51235f045a2ee9c923df4a79b7b640a03cff3b01b072931e76d77b98829fab87b08a6b69ea551c517f76f917c1560e33e9aa40d2975a86f44e3c1e4fbe0249ec6b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584c4380da6776d5e28bcd47e5756d39f
SHA1f3c5aee3fc83730546a31a8a9d7fe41a05827856
SHA256168d79026cf420404b5255a624c38cb8a91fa228226c3b45ae6db934e8f0e8f6
SHA51274f95702a857a58bafbb4f7cb1d032b68f6b4da1e0ab92d44463c88d3460f156327e987ef2fe21d6eb11a7cc76a302d0002f0e532549fe5fafd44f19d72cd3dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5accfb4b5fd03513c101c7dc9d8809f9e
SHA1149c933d6da3efcb28fa3b6cb5bbaa839e5a0c1e
SHA25654c3933b9fdfb1ad348a8a19ac67f15f35c7cd646889b3b1d1a68a7adb74ea80
SHA512892b883c9296d7a3341a1506d1ef3b7ab7f505d1e256df2a38d8e33211bcbd30a3069162dd15236854887e7fa60001664c05e398984a4a7daa85b2f0e72b8348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a23d65bd5ccfb7c2b57e42a9e1269e1
SHA1baa862ce11c6c937bc35b669e05f8512e0bc5775
SHA256c6475303364f188d54cb9472b10ce99a04eceaa2cf38adef0c62a44ab1db966a
SHA512aecd3c029613d7a6f6ad4affa4b69b68fc3e964b74ef0652bed9a4590378be75fecf76b05ec09e32f70ff41f0ee3eb57f6caa4e4b33d8806546dea6faa1e1bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5218320ab34d36bbaf46c8585891f3f8e
SHA1d37fb713c4a251695ff97e0d673968a95b5d5845
SHA256dfeac7b1c2d9e44d6781e673590f3db4e4aa432d8ad8b65277e434aa6ecfe910
SHA5121156c6039caf1b671bf66cc05d293f6cf42461d2a55e4efc0e931979adfc2f40bd7262fbb4a35813e35e72bffa64cab2a0e7148ca0f818588c78b9ea1a44253c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c3b5541747f856be37b5ca68b7a1d1d
SHA1ebd55685bfb156948970f4868ea1930c31d9ed73
SHA256c912753e1dc0f941d3c56d02bce97b577b113ac32bb6245205ae949b892a19ab
SHA512742580f6b662c903019b2e655b2c15ae8db1bae9e6b19025e29261ebd33e46764cb36cfb591963647d57dbc05bc23f80eb2f420f59f566241d8db008a8e66769
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565687031d74fd6441107a275af5a0303
SHA19e80dfa6ad06017cc087fbc84796e24cdd1f627d
SHA256bf1bfca98333154179ce3e8b2aef4175df0f58622d25192cc43f50bdb55939f7
SHA5127e7f920594fec36d674c3a1ab78aee5a21331f7d98e103f7fdf1c38c3030bc4fc1d81e309e01cb56982691427de9e68276c2bdcc818deaab3f4531f82eed7226
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5628b2c364fc230fd622b9aaadd609405
SHA1ac8f36bd0eab928cd20b2b9ba71e4561185abcc4
SHA2567e4d30822a5369a1f3117f02ddbb95148d8ec44b65862a43b609831ab4e35d05
SHA512ec251e6c3f8f9ae65af60d729a7ed32ced591b803d5887f4dc27c518a8d5c46627d0befd6efe207e562f15215e4333df690bdfafad90abdd4e16f0923c8388b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57228c838569fbd57e558ca9354bbeba0
SHA1b17bc9206c9bccfec21962a76a1e58363606cacb
SHA256f7f77e18563d163e84c042d919ca219119494d3a5149d6c2ae20986b0ec92ddf
SHA512eee239b312fac6191522a999ca5d56c27dcb02069ed8a12f1566b4b056bb3ce3eaa6c2c220062891268edad5cef6133b51e0563b9503736610af9bc006592bef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5440e87ef5ef086b06e854aabaa92e58c
SHA1b2175521da62d6ff87b7a1f5c11bb28fccd51f6f
SHA2561312e9eefd17550fbff08c037df049f1eeb150a56b90459fb6fe4faf735c027f
SHA512bad7b27b1b4c9cbecd689de5c2cff2e041b5d69402e7e3365f34505c93dcbfbd8b0adbf83f0a6d832f34885edfcc74d15a0d39f5b73c367dc80fc6b728782b08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbeefda3ce4b226e000aada96d190082
SHA1a875321f448c93f35018d7e910f6e1014bf34532
SHA2561c7b370e161f471cc436baa2fe9e3c212a4845450361dcd635e3ebf32dd036fa
SHA512576137c162defa16d1a90ee25ce8e0dada94bfc97cadc3133b334a7192073e1fce67c91bcccd2eb3d76dc274323d2bb0cc1dfdcff19d8c85265950022fd557db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2fb5db8745e399454ae811c69470923
SHA193045532260f38d520f912364951dbfefd592d90
SHA256ee79e4500244012abf45f6414ee64fdf1ea6bbd41e4aaf344617370635ac1c17
SHA5128609c41fda13852e765197fc6b18a29a9f3dd291f55f6a3d0ecfb8e1665d98c2404a85809af10c66d6e78bf036200dea5b38f9c7e85577997414188351eadb17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0b6ad176d99b987838a65340fc9f3d2
SHA17edc4b3b6dc8fb238ec0c72163a859cb0dea82e1
SHA2565b2de2329aa551158ba641d1c04f6d8e845d2c93d751dbed6f6915c47c566d9f
SHA5122305df6d990440a53359d95a4e8f06bbcd5fb7b4ce922d1f82688dfc8df1df64e98ffacfcf7f085bd6d1ab33e62c446650ed6881d9fc50ada648285578bdfb5c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b