Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 08:30
Static task
static1
Behavioral task
behavioral1
Sample
82780283bbdc4177baf366e3d1ede588_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
82780283bbdc4177baf366e3d1ede588_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
82780283bbdc4177baf366e3d1ede588_JaffaCakes118.html
-
Size
14KB
-
MD5
82780283bbdc4177baf366e3d1ede588
-
SHA1
61ccbeda7669e6c766823ede47b4e5516b19912c
-
SHA256
fbe43f99b1857c62356b04fc97254f07c314ddac0f650242f460f5d57960a117
-
SHA512
c2dee4e24e6ba8d872e3242a637ed4a56c5eaee29a08ce3cabbb86e98a9307422b99ef859338fde97a2267fd68e92898a6bfa3f3cb4a18d1e0c20d094171f713
-
SSDEEP
384:S4YNMKV82a9qnfg0MRbyZMxQ/mBgVKKKikDBPEFhtxTFf/yJQ77yu:pBufYtQOBgBkDBPEFhtxTFfqKB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e00c2d62712bdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8C02C411-9764-11EF-B0B8-7A9F8CACAEA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000b608fcca5a8d7947aa67cad8d3378e401bcc6de8af53cb990be84b3f3409a0f2000000000e80000000020000200000005651e95132a184ef8d1c844823dc5485528d1771b36e838ff5e0b8c89f73a0ed200000008fdcd1006f3f9fb85c65c97ade1ea52ef69df49d5f468bef75b66931461280e6400000000e30435db18dffd800f24116820cb629c5a2eb9a80af22b2c7ced13a3368144a96e3f914d0e526f474cef643b2a05990ea8ad996fe166eb760bb3eaa10fd3333 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "436526225" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 3048 2104 iexplore.exe 30 PID 2104 wrote to memory of 3048 2104 iexplore.exe 30 PID 2104 wrote to memory of 3048 2104 iexplore.exe 30 PID 2104 wrote to memory of 3048 2104 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\82780283bbdc4177baf366e3d1ede588_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb8fb2b6ac0d89efe409f9226a393070
SHA1ef476d4f61db005460808f7ce9ac267c7d5ed7cb
SHA256f784c366abb150e1934bdfc3d096412b81b0f41d828a9215af19f4478b13236e
SHA512034584bb033f85bd24f0acba5db96f3df61fa9db5e27a5b21547da5703ae746939334d14458d64fd9ab8b563083a6afa15f41c0f10ecbd19817567b66bd40fa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a2c5068750826a928d70daa4d0a7861
SHA1f067361ffc42b8f5d4948e8045a370e778768902
SHA256c3458b63e2650c8c459bf183ff190e27a27ea0dc2c726713001e742a14e3930f
SHA5129f12fb5d8013c026e94033331a64d0b20bc56549a431b0bf8621cd63abce4113a8a33dae128facd729e16cbb98d47829473920b1d7a941b072ceac23d361a9ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c816fcd522bb7ea9129b6611ba592f5e
SHA183e594408577abc1ba20e1880265702d85dc6dc3
SHA256ce4dda3a48ba6e7e718b5e46aaa16fdd8cc1e4ebdeb04d33d69f0ab19bedad32
SHA51290e247104a82fe3e98a73331f0cabdfa683077dc6d558ebdc1f66c194d5c41d655bd2b047d630d64ca93163c663a8a47e480f1d2b7b565f4f261717a9f229766
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a50287be4bdd42bd68fc0e2d2917349d
SHA137b1a6e290fde00f642c5a01a9393febd94c4df9
SHA256ef9e673ee501701cfa81b9f0f8e740844e0275f9e38decef3215dad73359d420
SHA512b4df5e986332e3a2bd5a1fa452c4de1e3359dfb0a1fa085c0f7a7116a733d6b7f7f877e36fdbad047dfa27ebe4c74fe156a69e789dfe7473c560b9afed1b5e01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a92d71918ec3d6f5d5729bbceea10d0
SHA1627bd021938643d465c7e9f6fd82b89f6f667bc5
SHA256940346533f2fe0fc7527686a3b4a88e1f58fce55534e85f450dbe02e95e5b3e3
SHA5120655cb9c067448d6feb18ed9ac214c902a9fe2369ca26580ffa0bdcacf32c2e64dd831f246e9c5e2c577e3321eb9fb73633bcce00eaa01157a85f0d8146871c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54695bec3b930aa6d5b75b10ed28423f3
SHA135502b52f1118386e13b45d761c5fd07a86b5b66
SHA256c517f1b653874b1fa206c410ab0fe7669e25c1262c2aa5f6933ad530a3108497
SHA5124b0bde3244ac480b48b6348c20d9ae8385ae5ecfba1b5c15a802ee4cf11f4d01ea4f0edb62dd57a4cb7913a8323d23b073fc9d4a8769ab1fa04d67ec7a1c5924
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b110e1c89a5509cb7a63e5e41a66d40a
SHA1df21139943be596d71f76eabc27406e89e65a3f3
SHA25651653ab6db22b92f5e8c613ecc5177a2650e8d5091f3bb1ad596756829a5c4c7
SHA512ef2d22fbc91dd8d172d1e1e97413abd3ec485a08905e2cabc7084e141f38dc67497d5105374a29c0cd2ab43734c944f9495443407e868d62ee7d9c5ebc32799c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d6b65eeca7ba1cd2654b40749691173
SHA156b22dfb429cc4d3f6dd6a2d5f4e778cc076532b
SHA256b9bb4424269d2f7b897e64078a7362c42bab1c10b118ffb8ef0f2d38ac3aa2ef
SHA512e348d63f3137e475e11b6fe66d57154a840b02b7627b890bcb76c8b597ad0341c6fc547f1c1c029b90911e74f3c0c4da4f065e285bb9dada8393830e6b872450
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549e778d339d79553c90efa017b6087ac
SHA1106d6c4c3fc84757fce3c73ea11e1325f45572a3
SHA25619591d6272ad13f4a8782b7643fb6ba637834cdd287ad4b0aaab35866fbb2b42
SHA51298adbe4a4b531c9ba479978a7c71aebc3babfd4716c5dc97cf9c646cc8f6ae8876f35e96824b3640e3af1125c1fdc0fdb114421e48c9b8636827688645cfc2ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d28db2e525f257826c700c0de22fe6f1
SHA1f7860941b899590e3e3c248525f36dea07336ba7
SHA25637b6a198e4fca3993c5e7533a0817f90b8ad3a9c517e8e6b8680459fd6644bfb
SHA512c7e5ec37c7d05b5a4adde1a05feae70bf58e859969882efa1198419090c9f0dc3ad3476096b9ef4b5ef4d6d2fbae50cfc202d46f3f07d6d19bb2900ec8cfc55b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcdc7fdb06a3cc7c3934724cdbbcdd6c
SHA1c2229e1dd93ad729eb2c5b9cab3be968c5dd14c4
SHA256a237ca0d188c40a91ad8d0b8c0e1591ca50bbebdc76b0ad16767be87221c9227
SHA512637963c05a537ca4342102a30c814f66b2ff6f60194e873ca712bdf62fdaeb3d75fe8b9bd120a13875028077cbd9da897853ac10da8e3bebb07bd4a3ed5db2cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558eb1e1f03b0af45149d10af25f93d8a
SHA10578420cad35057e2fbd43dea18cfaa76954e203
SHA256772ef21f8e723130e6140bd3d8978329e5bd09a9f194dfa3ee01331ee3515433
SHA5126f9ebba1bdcd97eaecb61f2905bcccbf76d2fa66929a2b9e3db5223cee162e9863f9d5711d50332d6e9ad701606fc19fe7ae76f70dfd0d71421dd362df841ddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f37e9e13208bf499dc5a0fb4ccc8202e
SHA15cf4f62f25ba3746356d4cdaf91d960f29993933
SHA256d8b94f77f4d4e6cc9429f1cec4e6db809a79b699c86dc61905bd3c7f21aa1153
SHA512dd63cb1ffbf3f7b42de6fe64773c49e6c5cd3290c444e0aa05442922f4cbd49095ca73ce486e911755a5d44ed4d78a4c938671deb3506882e8c0a58224e5b718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d33317da4c4904ef6f07b9b8f9ada9d4
SHA16ad106a92d8b51c1931dcde3fb2398d625f4c620
SHA256b3a97380c2b2878624b3eaa8afb85d0c0826d2e814e7057ce70f2685517eee02
SHA512387164a0d73b469e5f766b58f58b07822ea63ce58ea3385a4ce04fdac01a7e878ec15fc8a3d86ab10eeceeeb1c08f828d05710a6ee6341dc0a1ae8934fd0cb65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5121da7a04b4a20ac599fea19a30e6f36
SHA12ea79df83f980a4d349009fd74bfaab1034314c4
SHA256702096ed8a3701e0120b7db6c5f00f459008eac3a9dbe9deb4721371b543df0f
SHA512513fe5f554e05577dc8b8087dae1a89f49d9c0150cca9e4ed4dfd0990e418847fafb71f212e1ced75ac707eb3f696bca050969c66ff7f53d5aa57c6b008f1bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559998257c54f57929a158480c2330b8e
SHA10420031aa2490e51980d58ade059e71436f9301e
SHA25640e9814cb0ddb275086f333886b057ea56312394682867dedf4a2457ad4dee96
SHA51200ce6db8a1c85aeca4c2de5e53c31a6c6801453a099c3f5dd49307f41991627242a56a61e0f7d6c22b20897946120bc519baba976847b2d7857d442917ccd495
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f958a489d0f9a99226f365b8b7495d1c
SHA1a9b63834877c7ec4aab7cfdcd21bb2878767a290
SHA2567f17c3c2fe498076611103e66bccdc66b6ebb5a9341c572a2e34a14a2912391c
SHA51270e7a4c9b26bbbeb26d24b098903eed64b8169c6b6eae8d9efac45f38236c1f1f610eda921ed794565c1776c24327961b9bad0c4d71bb03d2f82e205d992c5d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5275d6cf60d0353cb0861d3092d28cf1f
SHA10183543b3c7231b7eaf20f3130e596d796f5d2cb
SHA2564ca616ec7303591346490d7a2f08814cc970cd31aa7b744a896cb1a86cd423b0
SHA51229acd6e70f060256e45ad2f407d2ab5700e928610655b6b3dc727a018f2c55b8cf5d4d24fa95036858b9aa6c6f7ede714971992de23f56498511407fb5b9d285
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd741195491b83f7f09d104c12bb228c
SHA1489c3c9b5e22e80e974fd6ed1d00f3cc78b6d836
SHA256ebaec97ce8bffc634ea34c66afd2d51126e43848ef2fe379944528ef21229598
SHA5122e12969c2e0ec56d5848b97521a19acf8ca48deee4a8c12a93c628cab3ddc0b055ec04709ba97a234df71eb7106ba7449fb84513578889c14cfa8d4ddadc2624
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b