Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 09:22
Static task
static1
Behavioral task
behavioral1
Sample
0095ec5084d64800181e1e5b56093a13_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0095ec5084d64800181e1e5b56093a13_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0095ec5084d64800181e1e5b56093a13_JaffaCakes118.html
-
Size
23KB
-
MD5
0095ec5084d64800181e1e5b56093a13
-
SHA1
8461b66cc260c3415b9cdb28d42829553fa24edb
-
SHA256
ba3bdf5330ad5d34a6f08c7e5e89989fb9d2b7f1357dfbf67c1db64c164d73e2
-
SHA512
11fea8e4633d1591d0ec68c298c73e94d94d20c1dd64aec504caeff22535ba8c5a7edf496eb875e7347b1dfd3bf73a7f30b378af5ac9671f360193156fac77b7
-
SSDEEP
192:csz7g0AYS//RKtHu80AGXoT1HeXXdSUi1HPUHb76f:c70AY8/RQHcAGXoT1I0lHP6S
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433850008" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000002f9c31a8c3503da43b904e0a332e771fb26c202327f8f0e449d50f869d34c262000000000e80000000020000200000003b1fec3701fc7796fd7b1b31f84b68360ba778e708589b873e278bc88e43eca720000000ff60234a74dde0e7e5f132358aa346ffe00e01df581080d314a91a6e5dff3d404000000045762d5502ca69d83d7d79ca4b6ab3918ebf18e7ea7a8af43dd612f77d64c854027297d45d1008ff31bc69add291f173d6015aad718e2bef145e48be3b3962c4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0d0ba571a13db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7EFDB001-7F0D-11EF-B9F2-E62D5E492327} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 860 iexplore.exe 860 iexplore.exe 1152 IEXPLORE.EXE 1152 IEXPLORE.EXE 1152 IEXPLORE.EXE 1152 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 860 wrote to memory of 1152 860 iexplore.exe 30 PID 860 wrote to memory of 1152 860 iexplore.exe 30 PID 860 wrote to memory of 1152 860 iexplore.exe 30 PID 860 wrote to memory of 1152 860 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0095ec5084d64800181e1e5b56093a13_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:860 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505fb2867addee666929a51babdb3eda6
SHA1da7b96584a88c4a6d5cf3d10137cf8ff3b554aab
SHA2560c4b65537e4759ac33568b94caf7a3f14e1a42c6bc8abb4cbe526ab6f3291c1b
SHA5127856203a35097a5585bddbef4c6e19901d3f3655e5af42100b440c91eba9905f8e39f42dde61bcb361e5e6daa82f7c45babcf2d9798349de91b64829fd13f948
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50801940ac6a0f7a89a5290e07f6e78a7
SHA1c4e1383c2668c566695722db676fc3e7c61682b3
SHA256b459d60b420bb2c15ad7d3ce916c4ad0fd31f67687cfb4a5acef454adb8a88b4
SHA51219364074cfe30930074ddafc4bd5e20e82fff9905e0eb5f4178cdd2b74795dfa287a5bb08217dbba33cac5fa545875631dc4e2b1a16236e916bee652f8cacfc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e191150036936796e5f30c621d0732f9
SHA16bb533b178dda345ed4e34dd455ac67f72e91e82
SHA256260a4c80bfe4c1a5f1f5c4de04fcea73934776f79b8c461cf6ed2451c8a0b279
SHA5128fe66177daf5b3630719067a43dab59f603e51fbd22efce16464dc822e5edd8ae7974b39466a81c32ee9fbb47481e0d32f97252082709a8e5eac2ceca8fd7a64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ca543e0a4a94a0a5af7dedc7bd6ac9e
SHA164bf1d4f5a7b410b8b6d0d1a00f4891ee87b233f
SHA256bf046d1513c5ddf0a45890c0f16a25062351d1bfd9638a7fe2b30d40ee1a4319
SHA5124cdabd71473c01fc767335b47c7d3e0782d231035901933e619d03b871cbb3d994a9a09d66749cb68323d7dbf92f2add88b3ed54a88c06481fe536ca71b11737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a947672a55c64993850a24e94fc20a1e
SHA16b5958eb3f59c583bacc1cf439cb3db72cbb75d7
SHA256994de94a7d886ba2f85b9e6c3fea26a194083fc9f42303bc2dc5ac74d73b28d3
SHA5125c603bf264be14b91024f330ee013d1b9271463cb2f7745ab78bd894066aba39d2a6228d8459ec01de573000e6ad31791555f4184339c8b8083de5f856c731fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be6194ad11b9307519e9cbb70d81e243
SHA14b5590a679349db03dea091d8218e1d85b1b3659
SHA2560e54147ff00c77d70edbac66a8b17e9eb8f6072f41b65744454451037830d152
SHA512fc08ae6dc69f11a759838e4a7e016570e0f0cae0fc17a988d4e0c2ba78a3a95210db14fe60baa920e5aae080eb505dd7ef18c61acd1854e10d9463d40eaeb84c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557bb43f0164bef1eeae21ce1eb36f775
SHA1c2d1e20f96c81f71ae680e1745b61c044cfb0988
SHA25616cc52757fd4216fb4dcb9556a04cd9b92159efa22a7dd38f2b1a730e57a9858
SHA512fee982ea8b8efed3f72e65077eff1731e59969d6e77bc0c8911cfa06dc0240efb0d7362adce0dce6543310e369bbfba136c2ffd5bb7614478aab03d237ef584a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589b82a6dad37f5928a3b7504d05eba29
SHA11eeebfb0bf6bac7dfa49c025d4ef1d73c9342770
SHA2560ae9c5c16dee98e3ab4415a31d0f662fc6292d70439a277f2c1fe2360e04bef5
SHA5122058e9a9e865b3d2f910b52689963cc3251e240074c84887d8473ae3ed9335cd651e9dc52c66783c718d0123b7a070093eb6b2745204230866626c766b023128
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fb9b885dcab48033b7960ebf1efaaa4
SHA14a64a658c0f3b1d19585e82de2b13b86b77d84d1
SHA25675b5f7b7d1c583d63b4752a69f73b8c5a8714c6cbd49e070dd2a989297449a1f
SHA512bb990484fe59c089507a011116e3e7eb54cb4b015d920f063f9881b901df27b034b787416ee17c4af5966a13d8209bbb03972772898674367f58462fde8b066a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d76aaf9f9c87766cf7972120931aefe1
SHA1d86b50dbea176f9e813cb27e6fb25e6540cf1ed9
SHA2562d36e5b1fc515e68a3fe7070dec6cc9f64a5c74b33a7aed2058b9517995aa058
SHA5121cadbba3a3e74f910f90673e9bcd408fa13e1227eb318fe53253076f370eb4a19bbf596ad5e12364fa3f6a403194421f08cd4a81bfa496f7b2d6d04d4fec7fdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509b9933324fdea6c1741a9bb8d93ec75
SHA1b645762b085289220924fde37168e27271706860
SHA2561565682c64db037e7e67fd719defcf140be3eb71c2c1be99cd64cfd207108eda
SHA512e486efc028ba2babac6eb8e70affee563b093b4b495815d73384be10427acdbd80d1787e42158bd45fd98f16c467aa9962ed156f94b9806666b167175a940a54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54558e50f389058c63cefb79bebe87898
SHA1a3fb30418772ece05a448a94ef1d4e048f405f63
SHA256e4349e52d9065bd3098fa60f15f2059d7305d293131c953a1dd8ef8164309c4e
SHA512cf94257b209f1d19174cf14129d607a0261a430d300c17a5b03f9fd0ebd0009c6e46298e5e8bcd045d75513dd7e5cd439c917f7d9b46c97ea8fe53125bcf5308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d871f6e9f4167fc64b3a633936db9af
SHA10f6b67c47d75d9e575b33ca17a9adbc480262e8d
SHA2567945fcbc99fbca1a07f95ba0c796be41855afa13658d257cd4e5a2b393d68f40
SHA512c3855f2d8602f4cd0dcbae4bd685b07ca1f99023f25e7549026e13b6574bb6163aa97158698f146beb0bc56d1229e944ec972ed8284a133af5020f0ccb30f1b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54746de030bbb6f3a0a2b5c966d16bc86
SHA19c59e74925fb98a010129d56f925ca279274986c
SHA25620e6cf57c539605d7e845f2e1dc916d36d80da84186ec7e6ab1379c908a52e75
SHA512782470145369c9114a1d2f6202dea79369b4e7fd5375f9e8abb932980c6f16ca3636d32209d2021d85b8c25a522592fcbd60a6dd0464abd9e017c4385e52e280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57de5f050f58e8cf08758c82c16eefc67
SHA149a6d8ce57987c4aaa06f899d9cc607954478318
SHA25639f1fd19d3a7e1e877c5efc9385eaedf4faa3ca32ca106d3f51f15d12946bf04
SHA51216c2a7afeca33716adb444025752ee75988a532f8698909e443e19afefdcc4c97bf6d6dff4d5a30617028ef219851e34ae4dc06fddb7f7a76c6c8bb820c994e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5332d8858047ef613fe1f664c72fcb317
SHA18a7fe2e93e9ab7ed08cb0e580102c5a17c6f1914
SHA2564d8cc52076450a66b940f72f7c49dbe51ab4cf198490e86b899b756768f9ab28
SHA51271ee42b40d70e3f8b2167839e525d4708203d7c3c1fd81e42a74afe022fbce28b3426ad155a9af17ac35226c1d5ed43ecfac1fb9f110be693467a268cfdace5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d205bb3a4c390e066c3bd6ad72469e6
SHA19d3750fe24024bfd81178baeecd25ced7665ec05
SHA25661557f791bf7ed6f843442dff038452a1678e2a2db45b58a855edac1eb4ac450
SHA512b6ddb17bd7a9c7805d39a80ed7b223b285ae9863ef3973502bf876de61fa9f3a015f25080e1e56b8078d541891b3cd6a048108cf71fc78d5b7d85bf74d2a306a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c5807e467f9bf21280b99ca45b87199
SHA18dd9202d5c9db8b88a087fe3a71043016fd20b77
SHA256a609e76430772e054c5568be230fdd6a9a7e8040cef63a88f32feec181848014
SHA512967d8116ce873db1208239ff5fff224202ff06c0334c5ad0d77f4c998883657161c16ad11e88bb5d3c43d7dcc47dd6bad3c29a69097d30a0c4980aeb9f949f8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bed52381cc13a56b6ba59420cff56c3
SHA192faeb67d733de0359bbfe9cf9556ae2b778d11c
SHA25657ae81593fae0f226dd246a1328a035d543520cca6052a075edf5ff920f50d0f
SHA5121de52fc14cca1025e4ae9910f32e2f0542b9d933a254acfdf05e7e369ae2a4917b04d7751fa5a0f5c4109484b4f6c54c660bf17cb9fbc5f35d87c3828503ffe3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b