Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 10:34
Static task
static1
Behavioral task
behavioral1
Sample
00e166080d5dfbd85ac12ac99eec62f2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
00e166080d5dfbd85ac12ac99eec62f2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
00e166080d5dfbd85ac12ac99eec62f2_JaffaCakes118.html
-
Size
6KB
-
MD5
00e166080d5dfbd85ac12ac99eec62f2
-
SHA1
f7dbcc202a82c890923671708be6bef429b3eb3d
-
SHA256
fa6fd9c56f882922ded1042538421374550e19e4da237b11b4f1073d0425ab8a
-
SHA512
d9fbec106c421dd8972b5bb83360ea4dd340dd801ab4fa4055547819c61f27d4dcad75e0a35025b15eea8e0df3c1eb5e24c97c320a58b337df286ce994328d98
-
SSDEEP
192:UtiVWngDY0xZluyBVshYBg5wQzWjA3zoVWKQuQpdQ3teZtEEOS6TzSceKQA47fDh:sIGN5jOozOSLWt9mOxN95Y
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000232396e873e757b88c492be6f2e598a1ed48ae754c05b402b54bdde2fd58cecd000000000e8000000002000020000000f5a18facc77ed36c091f874443bc1921eaa453089368f1d75ba259b2340b170620000000444f4fbaa5aec4fad2da560ca927feea256b6bc2e25195d83e8479cf99c54d234000000064d6e708612ecd964fd84329efd764355b99c8b8643aab33845c7dab5dd20375110f6883bbf548a7e11ed9519d761e098cf81748432121897e0f778f847312ba iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{903C3941-7F17-11EF-809B-F2DF7204BD4F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0f92c682413db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433854333" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2116 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2116 iexplore.exe 2116 iexplore.exe 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2420 2116 iexplore.exe 30 PID 2116 wrote to memory of 2420 2116 iexplore.exe 30 PID 2116 wrote to memory of 2420 2116 iexplore.exe 30 PID 2116 wrote to memory of 2420 2116 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\00e166080d5dfbd85ac12ac99eec62f2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593d68a3249d620304acc7566360554b6
SHA1e106348979fbe79878e92de5a1e3c8b038eb0603
SHA25666fc3e2830a73455f41e44a1ad07acc084e51b3e72583ea3a69c470f38a55d00
SHA512e3c8e27bc4d1b3b66ce5c08c8e761e460b18470054fefae6949943b72487988810d83541bf0ceec6ab6f24542dc206caf7e525e2e71ea6e3350b1758204f0cd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e337e0c18efc2812135fe47c021b888
SHA1ac5cc125f08ea589a226d76463a734bd45d52a3b
SHA256090e426afadd5acc5c68fb82dbd9e282327755595074f84b12816b31a346e11e
SHA51238ca3e276984c7f2e4737c0608edd154beef075b6262b1a32cad238a82398cd07c2266934ccab81d9fd34d88b404ad53728ce4b06afbd36949025f010cd0e23d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f5f6118cfdda7e5f655b5bf18671083
SHA1180f7bac8cce0a0b650a8d6c9828276c1fc25e72
SHA25639a3bee3fb8ab38db2d3c93ba9bb5c7bab1f85fcb3f25a05d1a64117026e7244
SHA512ffd670064065694b171204225f327249742fa0780f6f7c814d58a4e9901f823a88f9f2ce542ba3427c2db15f1c4cf68b6a382c56f7fb0493cd2d50a444c29bdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0082fb27ac7862de80c1861dc884678
SHA184ef559675074410b579f5ebe89dc8be04822985
SHA2569272bab1b1a7027bdda19b3b41101c5a8dee9f6149c0af0d0a624c9c6ca53145
SHA512e7954227c5a88646d6d15e763ac9825c0055822a45c6387cdadf01c495c98316621d1dc5d9e9145e6fdde834a328ea3392bd047a29fa407148527e2eb331706d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ed163d8a71c832928cd20fa6048102b
SHA1eb13aacaae02243878b8e9a73694e07910d4cce1
SHA25688d1bb4e779a694f4d6c1442f9e06782513ee5054984ac5b2d6168ca487f83d3
SHA512d1e0e3c903c6e9d390fb4e449c7f5705ae3d1c86cacd0b53dcfdd4af796ac80309bfb1015b812c1ab43619973ec454fd0f43a5b31ed8c9af23eae780138321aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee0f32043f0d7c2a2826306811f1bd82
SHA1b555a0b967566251ff3307a4944c04c35c313b5d
SHA2561ac37934afb10f3178e3af12d51bee4886d8c3221034b04f69bf8d0f0e2ef048
SHA512db6005647096f55a8915e0867006f1f167c0b9c2805a10f5cf6bdac312e3bfc85f6076b5a53a278acc5c1f10a942599f9061d9710c0cdde2315ab38bb833a76c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5253afee71a9a7065addba595f784f2bc
SHA15f50ffbbbdbad2a8c939c514c46fdc234ce609d6
SHA2564f9f6e44da31a9c1cd9c5a1303616342461bc2adb33fb894a7927a2fa5c8bf71
SHA512b3f5c89b0b88910fea2e6c7a6e01808a82eced00fb099a4adb9a49d3dfd3b97d0165bc47515797f30cae922e3bfae5ad59de2b771fa3e4a01c0c10ba62555c3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559b66595152f4be0e368a580cc42a887
SHA15866e9b12688e3e42418a08e74bffb6582073682
SHA256aa9531b38809ffec66d99bae265b8e0356a04a654bd054e98f9448079379559e
SHA5129ec0fd03693be482ffb3506c68abbd8a983172847a851cb5374128c413cdef02de15f8bf4f5cbae55fe927ddaf0b5738c6df07427588554f836f3504fcbb9049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f697c83fd9a9f630ae43fd63ad3bebc
SHA1679b1dd9a2efc63d9cf24c5d6715694c75f2fdaf
SHA256f9dca057c75e5a537c1462095719298b9d594ea5e787d08b39b355fd8f974af9
SHA51292ed77bd1cd33f4665ffc1a1ae954d023bbd34fd1a19df2cfa997f414f529b010711577f57f378fe16dcdb6fa668b678f880ccb00c9d5fe68c55bf8aba4a4c61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f797d8697be8369810174c4bcc9865f7
SHA16e50a759db9fb757e8737de193936a1888c1484b
SHA2565aade915194c3e655201cf3db6df93ea592b19fa98955bc97a27bb40c35fe8d9
SHA5126ece7a6b037827abc565bfb6b34e37c7f3c3f0a1cf2caaf50c6328a67f1ea20afe46a9eb30b50d65c8b18929b735e645fb60cdb3d4886982b96614f2c138542d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530d57a64971dc65e1e2d9b03ec31efa6
SHA1c266f7e574dc2716f7037a4c0e3eab54a32069ae
SHA256a6c8d2ef944f9909a4d9ded899826e9a8c674ee937b8f77789e3f0e57acf212c
SHA5126d7885ee2b1628254f0d648c53b21dc097d28fd2771dc753fa1b2d47c43763f1ed8cf3fc6c7304f5169956e70aa649009cad889b48ee6915c629ef884561130c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59912283ece9097e11d5b4c7b671c1b0e
SHA137e74219ca007d66a93dd35840b1013c65a4e785
SHA256869a78ef73e9f1f4f5d5a87b6d3bbfb976e102f23adddaae156651daaa90e628
SHA5126932479537bc010a8737f662cfae46aa97e39ad2aced15f66babc0c6f38cbfeb5b390decd01eff8a7991455b3f1d690bf94954523911c687361dc5689a6a4f5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abf72b41db65b982ebbb18b34300c1bf
SHA1f0490f100f6382ef3b8fb7badc2b3353cd49e700
SHA256a8b4227fc0c31afb5348327122dc024865dd4515330e7d66dd640e4d2986d7e5
SHA512427ad7fcd5cc42ee8e6eef7e2e21bc9c3dc72b67abd55e5eff22933611b7c39045afe45da9355cf818f2380c43552a2b2e9e401a383abb2543ee67ab798a1ed3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f7472a7e7e48737f7ed06f79444ec7c
SHA188cda72582cc5b0bb066950bf9f001967a4d78d9
SHA256bf0ce7683eed6d54774811324db1869aa6096f0fe52c7d5ee56d76d13bd0920e
SHA5127da046d6ce6cdabc2efa550d09ae1039d02dabf6d6e83591e87b533ea66d48963ce0be717e89385717e6c48c2c5cf81d57e873be416c49a48b972947bdb4e898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5189e30915e2560b0ec5182dbb8ff10c3
SHA1b84b6341574136772092d35dea832b7860e75b87
SHA25667506d5a81b88c7331be01b9b0c3cba7b2c530a9cbe77ccae8a94c4b2714da6b
SHA51285e346ecd7dff0eefa6131da4f7a31dfbd4f963e924e677f260c4757fb1f2d99f988e8997155f4351b9ece28d82b0630b4969e146bc1151565785ed19508b3e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fdd538e2085866cb36a1ef9c5cb4d5f
SHA166ec3abbb8bb30ee43e7bca1503463432e9e4aa6
SHA256804c6565099a52bc96503b858460c81315d691cd7157eb7c3e84d7bdc2beba38
SHA512ebc159e405935e68cf1352c2102d999e24f929c077d05bc40e0b1e473490ea4aaf611609cfdbd583e208ec01422dc5861120bfab70bfbf36309a87b957909a2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537f145efe710fdc8d6f4c3f1183a6101
SHA19bdfc450cbd712f8481f313f6b72b5527f580286
SHA256e673faa618f1ba74a14c60d58b8922177886ee6b8ab44714deca9f6c9c96c005
SHA512f1226db43cb3a2cb39ff8bdb0844c839cadb603a6841af45fd75658c0811be1c0356b7c16fcd200a1707b833d27790b48f8a3e5ec6cce051c3ce1f73a4caaec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5627f46165b8bd2fc3c74288bd7e7e5f3
SHA181f777b0bc03efc27d154fb39a7937fc01defd8d
SHA2562564ed99ff04c5172703b8166ae161e791a9f066d9e0938f1d64b714b61bb675
SHA512f81e88da3ad0756df2f9cc7e9a2b5ec478968346359c65e8770b8fd6992e1b0b88c86964059848e5f866ad09ce1d1c6278845b010df4826feadfbb104677cc6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a58a41c616047d5db5ff84a0742665c
SHA14fa36b1d59a9591491f9a7d8d20d5a054ab68cda
SHA2569abc8b41e1a29a8d9f13078bb50042148a19b7a0f752dca8503f38789872043a
SHA51203ab5386cd0a7da2bbb11ddfbaa9eb7b741a612ee0a0e6126c36e6ddc7e46558907d9083d132d47330b828036440474afd671ae46ce9a3558e31e4a2a265eb8e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b