Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 19:55
Static task
static1
Behavioral task
behavioral1
Sample
03097583bf37b865a28c5dbb573e5ff9_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
03097583bf37b865a28c5dbb573e5ff9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
03097583bf37b865a28c5dbb573e5ff9_JaffaCakes118.html
-
Size
20KB
-
MD5
03097583bf37b865a28c5dbb573e5ff9
-
SHA1
bc4ded90ed1673e8e2f3d27e8c566e27a5a18f1e
-
SHA256
f60b9397b0d8dcc226315211032187f3e9c8bcacbf701bebaf7f0617304e0424
-
SHA512
45e231f56023ad3e4414d1151897aed39b4f9b48188c60e4a1ef2768b67fb6d050d4b3b1d16ecc3967128c9135e27286517dc9e8ba6e2471488d3aac79923088
-
SSDEEP
384:adtlkDi0VuZZuDXRU3Lxa+3fn7IfEBAK+5Y1UEClpo79MoBVOjwv8mq9X0og92Rz:In02Am9aAiehLCjStqsd0Eo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000cdb022a9d22f2648667fe6d00aa6c48eb26b39af94f8e60e6607652271e10265000000000e8000000002000020000000df1945357b31fcc0db7c24ca18bec109916f8808179530e96b0c3c3a3008f80520000000d66fac1deef2b0a9dac4fbada2173ab86ddb8514c36be5fd537710130328f76940000000dbd7bda15390d077f6b0724ffbe69c97b68cc2c6beefee9c486e8e8fa5803aa4ea405d522300fe92d696cf96033192876c16c2f3a8c48ede4d29a421e4daedc2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F3F634B1-7F65-11EF-B5D6-4625F4E6DDF6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 900eb6ca7213db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433888001" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2296 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2296 iexplore.exe 2296 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2392 2296 iexplore.exe 28 PID 2296 wrote to memory of 2392 2296 iexplore.exe 28 PID 2296 wrote to memory of 2392 2296 iexplore.exe 28 PID 2296 wrote to memory of 2392 2296 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\03097583bf37b865a28c5dbb573e5ff9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565999d2069edb82b0a543e372d338656
SHA197d63b5ba00d291150246fa69c54c5d5be6d13ef
SHA2564205667b66c02a7c6d2c3f8a1752e6589be2dae3f801cfb9893e22a03c1af003
SHA512291123c6cdfa1173433f3a5ad1e4efc4f1ba407796853cdced42640c9ede9140e222977b7ce161295f49d200c19c2191b4a27202f90c9b91da04539263c5678e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528a2b0d92ca0b14b5894433378e423b8
SHA17e8c2e1c9b9170371201d4b1123c5bae927a5423
SHA256fcb0ebdebb222a35ab48e3005c95a179f3b91fd38623dcf022d8c4c0c129824b
SHA5124e4e6569bd16bc7e36ed665a8dfdbd8757dfcee867105d43dbd21e7e3b180a4d8824ce55343720babdc81643370ece48c6bdcfec806c0003195e1b9b209597af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54784cb9610b9e0f0ff013832149a1754
SHA16a509114953a400971de1af532ee79f2c2275b54
SHA25681b3c0d7abf6bbd49313e30c6eeaf36c2fb88fbec373f36acea85def857105f3
SHA512d46fc51660c5a661ca097ed6e2530470415e2cc473f096605510a2429d16558cf3e44364d381ea5037e8c8a2d60ff7d4ff6192d96a9b074d5b7c40c86fac2cfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5723f2f20d45e8563763fc46a18e39615
SHA14913fac1c3d4d092c3758cf1721ac200d28a2c4c
SHA25647aa24ba233e9b944cf8e340810b954546c8f94adce07c202c1eb1cc2567f287
SHA51225fdfa87321a04342abe64fe1c7b1caef96097ec0ecb744927ded4a9b1320521bd98ec9380710640b70967b0512e03830f21968bea50c52649839b190dad2add
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5425350570be6a600de73a93818fc68
SHA18afdf768fc8b3e3997049465e362beefef252e57
SHA256be1f6b95b59c9fedd83a49cf410441140738e323fa94a8554bfce45a94f69016
SHA512f4696cc73a2ce43c9933705053cb1aee3d301df6feabe8724c16287c478e5005c81a4b4d6c1484e8192bb1f86ba7bb09f9b0563d14e68ab50e18fed114551979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514a6765a895bdc6b6886195ace1b5505
SHA14e89332abadad33c0a97d6b38fb6668631c648f8
SHA256a27b2328ab37e91d2877a758a989af1094df6435dfe4287f512ec57281063d51
SHA512de884a0c51da42fa9ebf5e389dffcd1309785bb6c73f5f918bb76358832980e9d827f699b008f730ea30d5e9f3a617f913754d9158972caee91d7a58cc5d2a4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dea583600d396983d7bafb176668999f
SHA14107a66187c88a20bcd4fe7b195ae482a69b442d
SHA256cf31492b04ac4870645c828e8d26e735840409b2ee6e3bcb8df597bfb5ea5461
SHA512cadf1ac926d492bb7b5c0c0c5e0ae32f2b82c63650bb844916360e6664ed69be406cd730371d89a3a058262b080ef4bf2b63af36d3da3288f3bd14f7c65b8eed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c9099ee1d17cd819839ea5ae50e8b8a
SHA131e6d162e5edcb176551ca2527eb8b02fb3408b3
SHA2560fe71e65f39d7aa088f43a9cdf99b480e16851747780a5d7145ab23daac148be
SHA512ac182031c265b473796090d1749b45cd79b8e0c9c4509d1f690c72167e31abddf82596f6b685d51ea99aa51d0a7fb74408400406ee46e19b26e0007aba7fa42e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ad266ef7e37543ab5750973d5ea7ad7
SHA119aebaf5d8fd6304e261b0299f2491e65c4b1cc6
SHA2564db1cc9fba321eb1caa12c53aa546ab06e1a2ef060bbfbafd67aa12c439aaa36
SHA5120d8800e6dc8bba2fe6732eb85e89654b6877e27e52adfd354ed9e904c9fc8f03fbaa01c3e08f6c36d3a5ce0d06a06ad352ba063d7415745ceb64fedb012a2cc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596fd7cfc3a5b5ab026f69f5e089e2ca5
SHA1fbb61fbb335f56101762e4b7a14d5e1be21e13a7
SHA256edc481ef18e130b08a00e35b627e33be219df41843476a04ef6163681ccef85b
SHA512826efe99b9cb2d87b53071d2df7750031092004943ce873e07a431338e429a9830e6278d1a6966d8221b85cb8f7d174ee6b1adc8abeec7eaf6eb7400f14048af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5730f332c573f6c64eb83d1b4c605c7d2
SHA1cf00df0023daa3574d057bec5b6f4ab282157a7a
SHA256f79d2cdb72dc31d03bcd0fca8cc559eea5f4edbd354bf55576c5f806dacae3d4
SHA5129c487c12a02ff1a8e9daf26839e043d13c585a2c575beddade04142f0e9108ff82116e22a47510f78492c726920869cd014d422dacd2c2d98c96c256b9bbf29c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54555c1d8aa20007786d2d7e878788bdb
SHA1581804fb79ea14122029b664e7f011eedbb8bff3
SHA256627a212d4ab0a1be859c7dcab2a35ba0a2d6adcda2ebb78cd302b05e239e2b5d
SHA5128b6d574ab9693caa019c3b30d908a74061c4a30b0329d1adc8ad9621902a21b1cc19bf178dca7ae81f6789b47fdfbff29069d5e00cac2a23a675da8d69ef3277
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516577c376eb846de3c7cbee5e61cc430
SHA1bcc48bc42aaf00d51348d4ac00b73c67d877daba
SHA256d2eee04b7a514557de37aeb97b4d29f3aab39472b59d8a3a10e22c40fd47b7e5
SHA512d8e34048aed1527109abcd787390f39e379d1ca2d35f0f804bf4acd7fa1617e828af79f75de88852928fe2cfaf94755b82f44b7854a90a25c64e44fd6efed37c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5502fb75e7aa213ed97a8a4f027e94f3e
SHA1207fed51a3ae98241e5afa2b3c28b4ef1199d50b
SHA256a7292cfe49e7e4cb16e16ad6d7f3f5635533d1221b1551d062c4a0888bf71777
SHA512c5fb15cb61419bad833c4ae03f4bf1db4d7ba7d02445f495b6c320a7ab54f74627bb1e5a495a0268dfde93be7c7319f4a86af8a81807bcaff2b4c693a541d1f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f15c5c6da2e680ec21b13b437e78adc5
SHA150fe3634463e644b1057fdff2b1ec4bf3614eb53
SHA256edb1b9d9d40dfca76f08386cb17a245611d2edc81589cfd17c6be4cb815d75bc
SHA5122591f2258a570d7aaa027d08ae85f0bef0b6143b258c54a65c9a2382f58852d543825e836bdca2b74002fb3444aa2e8be9b30bfe2b9023fb84aeea1032b7f35e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b15070f01a767c61f1400a1f2beff070
SHA12d57634dda3e34330cc3ea7cbd4129b6c45ccd0a
SHA25657f1ec6e5a22040f249f831e84436cb10f48a33757d19ccd83a67c703ef79c1c
SHA5122b8d5d1a964acd774b27058cff772ddcf4dfe4e550e57ad7abcb9d5a6c2bb858db863c21cc5813e10c9de817f2c3aaea63ea9e20d0dd9861f74563402074d134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1229aefacf087a7252ffa8bef677c53
SHA148bb47947207e14f474dc218593160f8f971c94e
SHA2568c07f8e6c79c16569626711a760b327904bceac6547d2815cb009b3a5f1bb6bf
SHA512aa28b28049d0fb6060b46ef4a6f8967ba67726ce04a1933f2045d9da8b7b31e5c66617ea6c3e55396480ac2c9719b1f2b63bb25a4790270753ed6bcc622c5506
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59180978922021263cb2f7126701daf65
SHA183e759f2ee0a32ffe5d384d855464428eb4c9e24
SHA25681ca5f6439a00b3f5f69573a82e9f68db928597814c0dfe4a82d00b58fab221a
SHA512eb16c2f64f1ee3f4e43a1c1f38015c234d98e3cece94818be5ac176b196e026f1d1a5a17c35aacc15df8970e7df2bc9f502bd9b6c0460f7a19be733cb1f31fbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580034e2866729223ccb3125943f311ae
SHA11bc91de466097e8a161ea64df849842677d22758
SHA2563110eea1fbca34053d497d47e93651672068465235b1e1656b4e0b9642acbff3
SHA5128606cb97c9b8ba4d9f0d4f5f689f831e2d19ba850401151995b4b50b49d301fbd3766de507fa40f18e2713ba2c0555abbfd746062bbc9a54ca8f02d76e6ffc69
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b