Analysis
-
max time kernel
117s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 11:24
Static task
static1
Behavioral task
behavioral1
Sample
0110e2e036071ab2df21724d02fc6afc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0110e2e036071ab2df21724d02fc6afc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0110e2e036071ab2df21724d02fc6afc_JaffaCakes118.html
-
Size
23KB
-
MD5
0110e2e036071ab2df21724d02fc6afc
-
SHA1
1736736b9dfebcff9fb50d97005e3910b341052d
-
SHA256
0c30f46536d49181f2aa32529416344a2d8eb153f08c92392ea11b9d8bddb83b
-
SHA512
9c28567f8814d5ec59a509e6561e20639ed1f34536af5deafb6518638a8bd3cee0ebe28edf6beed6da8ad8c9dc7a51769d07075e83c1e79d812cfe4c66dc2059
-
SSDEEP
384:o0oap+6IYg61yX11POVOKpSUu4JAlfilL+lmERh8U5epzeeemeeegEQe:g6IYvW74JQA2mENepzeeemeeez
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{88DAD561-7F1E-11EF-856C-4E0B11BE40FD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000028e17aee453caa7c925c9dacedd0d31208b2916d5221608aad21552b2143cbd7000000000e800000000200002000000019524f46d25d0e157dfe1f3b8bd1ae5d1b8cca6714d83c196eda7ee51523b588200000002e151bb16c88de4dbff4484bca0ee70423cb047d0b5aec3d67e5bd49481707a140000000584cb8ad7705744b3239efee103d19f1f3fc8e8c936f0c6f5c3b9b83b9ec1834cde91b0fa25ad33131dd951430879cdc8535f9c4efa724886ea249ecae0ad36c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433857326" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f044235f2b13db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2936 iexplore.exe 2936 iexplore.exe 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE 2532 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2532 2936 iexplore.exe 30 PID 2936 wrote to memory of 2532 2936 iexplore.exe 30 PID 2936 wrote to memory of 2532 2936 iexplore.exe 30 PID 2936 wrote to memory of 2532 2936 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0110e2e036071ab2df21724d02fc6afc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2936 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af2efdb2d6f9a9fd3477017152ce0781
SHA1f7c733e3131c1fcde2137b9157253e33e02a8aad
SHA256558699829ebca081294f6d91c82aaa11b57a7fdb3ec7dca11fcedc3adb15fe79
SHA51250efa25054c2850d041eec8ec6bdcfb6d9616b611294d93562f19261415d083d654518d45ae699cee44910fadf298ce39ba4fa1a7d9cc1619c0d69c3ca27dc46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5811d5cb3482644051a905a2e03dccd82
SHA1d8c0d35335f70745653f0a311188a4964676e4ae
SHA25680430ffe4a3bc4e7b94a7cb7a17f411186515e13212abdbec99fca5d11e663ba
SHA512f4a27e149104a0f678d5c2c11b734ab871d3fbca010b2ec8642db667a6f2229e6af727b40e6bc7c8aea5e5c3f4e886f7fd3b8573b5c176810c26bd648572c8e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556216ef5fa2e3c71a01d50622eff3446
SHA109d66cd8d0afde4544dd36c90c52a714d5701bb1
SHA2567c29c1018fad38c5ef61f663d099eaf24faa7e38eaf06461c178b1d06cfa75bf
SHA5123544d040fa8b649ced937b96c541fe02c71d9815dec393f351148b73453546bcb2657eb42dea626bd863859f5c85639e623ec9d66f9de267f872d01fbb89f076
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc21c570f3b243eed8960940197f92e7
SHA153daf678ead004df91f0de10bfad75f4366cfdf1
SHA256c1f8d647d66859fb8b0777413cece5a6ca61b650b65bdafade183a55f44eb6f7
SHA512ece91ed670b8ac52f417457765bc368caabe3056aa6994eb5b68e13717e89dbd4c401199f4f656b61c5963a68db7d26c17a83a938ac7b3009b64066a645cd1dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5665e7083bba8418afdadb85c3ef0fdaf
SHA1cc74e5e70ac848afff1d5269ff139e825d824939
SHA2560c1c508bcefd6e935e07a8b511d81373e6deae8b2c8ec8274622673e5e768a07
SHA5120857c15dfff8b316b6f1539f43abdc56718f9e6b0f8a41738f091576ae99febc1711aa0642a1fc49c821468a76e678bac2b8640ce351c365a5dde0ff52882c04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506734ac0156d7621e315eb81d90324fc
SHA12543750c1878432dd130906ded47cc6e1a6c71fa
SHA2562e37b74bd646989530c7df366dce097d489c2af738542d72863f885bdf10a2cb
SHA512f7009363cb785654a0091c4ae5a55f4a5f777582a7ae22be8a3b7d97ee1fc13508f2d9799c146b37170f38830793886727296173cd2ea2b8be4d802609b90b9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dcd94b7e1c3a929e7e6861179c8d697
SHA1167e64878100d9b79ce8e0b2f8d7f6cd611d1aeb
SHA2560490fe6f84e19a12f75babd04f3860951f83fb6f3b9801183f50497efd63f85b
SHA512c4a5720d0a935e52c241d429e61dc0835202bfb51131180d556c633954e650a5491870c712683261b0ffe111791049ae53ded054ebe5c2569fd72f318f99f0e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8a2846cc70c1f71448faaa4632563a3
SHA127ce8533f4f522c1d23a643ca9d672a6f9ca3ff1
SHA256eaca65adab49652b9147f6337e948c8569f6019611b025809215f1ea70f72945
SHA512ce83d1ecb8f6c8b41a81e43de05a6769297b12bdace5f37fd7ce3ada8f97afbe4b6db818ff1554ca6106e0de9ef888eecac45f5f08f926397d53134dbfd9a491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a20e7729017681063fe9059a167e2ed2
SHA11bad64a287ab6c316c87853e6dd797f2afa7141f
SHA2560fe2d48a9ce7535b25b94cd28d66b76c564d240c51657ff4d14dd24e224933f5
SHA51290eea713cccc56c8feaa6036ce7f96f142e9c52540f48499611dbafb998439bc69498ebc69579611982c3cb20d6bb30711868aab5dff4119b3c5d6698156186d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c5bcb4b48dc6ac36aaca1fcb50923d1
SHA13a06d68be479538d90c359e78d7f0596a75bc4bc
SHA256f4e7476d7bd424d2e19eb4051696682292e64c3446cc7c5a46fb2463c53d03e3
SHA5129383287e2b1041e942a152c5fd33099aae741d8cc17774605cf4035e0f9df2fe826e75783e86f7cfa342d7c3d11d9e387aee3edb82046b552ca61956d80d1073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53edd370e2856073fd6ada4b581feafd2
SHA1d5270b2abb2286b746625bdd296883208029626c
SHA2565eab2ecc0d05c87664f813b6a4c0f24b38bd1d4b0632017f140b01bd6efb70ea
SHA5126cbb4e71ea657e7afabf2d1ab37073c2969a389d1014933b6e2d2cd4287251ca8f3250ab3743a0363bf9ed6844a979f67ed343254004df318c6c6fe2eb650ab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3261a905411c97770f389ac3dde35b1
SHA1dace13727c0226a692a60444f37c7d9094f62840
SHA256a8f9a7f6777cae38b008cb486e62168fb514dc99b2f7ed03a6d774433618a4f8
SHA51204fb13ea6bb6cd630e9edbd1614b39b6857994b47bb78f8ec27266d240fe35a4e4d2bbac59d12b480900ddc122482419f53cf243d44b2308e51a116024630ebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533c9322c10739c515207334e445bba44
SHA1342ce7257b1ac28c4c6467dd9fce83b997990a11
SHA2562a4fd0aceb0875e3595034461192607880d401626818788ce4faaa4e01e22210
SHA5129556e1fab3299891124837d53465a98576d74bd409c735e3e84e6a99461a63a5fa6db1d12e3fd3009e236042bfad9d0f26b4b5b03d9a70695f2db4c44e4b72a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5292cc7d85f085ab0e9b893c6237bf1bf
SHA1ba16ad733914ffedde7a671ecda19e3515b16a24
SHA256fbe79d4613aad7ab30bcd63029315c0dafde52f184c007867e436acd35360eb9
SHA512a573c43f9748b65c5bdbe923f74f7442a96839eaa7499549564b0309152c1d841dc4c9c125af2a99ca0c30cc18ef919d6db30fed5df9b65b6cfa5aeaf4608728
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587a66cce2b5d41037036f54938abfdb4
SHA108578ee01c50e4d735b292f9091e30027089bfd9
SHA256d7fac2023a390775d2f09754b3a112b58f7e84ea5a69656dc748c3c7383a4086
SHA512c345dbd815bcc6eb0a7e1d91858db46df77425990258bce9c490b03200bd262c43bc60bd072a874946b97fc5ae644875dea25d18c81cbe77391dcca7edc5ea46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57306b27df8b64fd0f486deac8d4a6094
SHA103c4e6fa326a7b0db55957af49fa0e1a2dd11222
SHA256488dd50c12663658a4ef728b279b74e2789e4d0c0e79d5daf03bdb87124b369b
SHA512ce1d7d3011b1c3f0a2c357c2f5a4f4938ea9ca5ee6b2917314b5d30a85aa1e26c8f474ff47d50ce4035b6f91ef33547f49294bfb822df8b8167494b7c37763f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5321b5a8496fbf07bd9e21ec9982540b4
SHA1c16ea38f60c632480ec3d6b3daa135775bd0f6dc
SHA256c40023b0802c82efd4e20f366bb58110db3502aebf1afb076d22abb9368f3a8c
SHA51223f67647a9e1f5e1b97231b681423e2b3b9122b64122b282ba9600b8f3ee67f24032f2a67f7eb0851630d4ab2376f36802b41e760fbbce0490b6a6e9667f079d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540340f72021ed15d83f3567ca30e62da
SHA1b77915ef283502808a41c46873fd5888dd583870
SHA25610411d0ad433a6c71ce6411616d8a7371be8110decf4b47776713ba70d823d45
SHA5129ece040932834a6443f02621e37b94fbb6d3a135eac8d62349a65cec59631652380b8dae6433fab483f2af354010f698f0cf6a594577eec47f35064bd5c4e3b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5151b51fde9920851dca889b7414658
SHA1cf61b48e87f16d4b325497973d721325538c1306
SHA25651b0f4dc45b21528f088ecfc2abb0ee108397a32ac2bff02c4ceb9d889f6bf5f
SHA512f8aea0f6e8e05f53f182de0f333029887d014efd2ec5a3dd5beb1579511d011d7cf1988964828280b4328737b7ced85e5b79fb807dc051390d44136277d8af61
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b