Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 23:43
Static task
static1
Behavioral task
behavioral1
Sample
07e718a6d325a43d07d359e4fbc9846a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
07e718a6d325a43d07d359e4fbc9846a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
07e718a6d325a43d07d359e4fbc9846a_JaffaCakes118.html
-
Size
18KB
-
MD5
07e718a6d325a43d07d359e4fbc9846a
-
SHA1
fb64c087fbcbc7411d10db406ddd4f93edd7feeb
-
SHA256
702395efe6d2a15b258315077205cdf2036609b554d2ebb4f2d033b2b329e064
-
SHA512
652a9775579c71a90f3fa5ed82e34c985d989789fc1fd108c7d3abba9b0c102353b60faae5a6e45b7f6a1bbdbd9950ff387fd1b30bf5de39a25402695bb8d61c
-
SSDEEP
384:mCDPPz240MuPtRquJUmX0UNSJCOMusxBdWjVtdBxYkFh17e9RIwaM6Vz2w3x:fPPz240MuP7nExkwG80eWw3x
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FED07731-804E-11EF-BBD1-D686196AC2C0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000008f00f461c72ef21a3db04a4424e4d7fc44513d3d8147d71571878450adf24918000000000e8000000002000020000000bf976b569ef0ce9ff5ddb820a539df4bf553e332e09d7981d9d17c5ec3ff497020000000adf5694c07aadd2c62690c7b21703ea7469070d1788709185e1896839fb57d564000000002d6ebe19677346b6e0dc686e882424d84d0d57ff1fa73417d7d423449b03d12925ce259faf824fb3802659836eb4ae4a93f870f69318fdf7e985126b4f95839 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433988091" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70ad7ed55b14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2524 iexplore.exe 2524 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2332 2524 iexplore.exe 31 PID 2524 wrote to memory of 2332 2524 iexplore.exe 31 PID 2524 wrote to memory of 2332 2524 iexplore.exe 31 PID 2524 wrote to memory of 2332 2524 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\07e718a6d325a43d07d359e4fbc9846a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50da9efad4fbd6c3b238e50907c3c5d4a
SHA166aa219952307e2d05534e031300e60e7c90b233
SHA2567446223c7578585d2ef89633360e219474021285232f8e201fb4b30ad7aeadae
SHA512ad7c20f7cf0977a829eb5db174be41dfab939dc599a7aadce779f7db959c5184b3db46c0c8fd649dbbb0b9dd1079d426aa09fd540d38290508d16c6121176c6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553749aec8629dbc86294457c16e6e52f
SHA1bdbf34b2a7085b0c985c416bee34ecc901b4ecb6
SHA2560a9392275d6110f08f3f1f2663d4e1312fc6a44ea8a5021a37d123a8242eb704
SHA512dab1a597ea707b022485b9b7b66fc96ce99cd24d00583946df00ae1931fe5083abcd30f1c8869d1c0ca801057abb79e579a8987a860ccdae3ae59fd886f14d1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6824d35a67ca5b8e87d61ccb37bd033
SHA1b327501fb5e219bb554c06bff481a2e623188550
SHA2561f35b8e85be380934ab9d7623ee2a6ad71faf335832010c90271985c1008343a
SHA512027ef1a8dc3042fb2c2e4034539a3b70dfbe2f336d2600c9bf4c2b3560abacc3c8d15ac770e9c8f1429a5178fef6693eed7cfbbd612abc556324f11250d86712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52628dfff3f063253419ba488944ea498
SHA1865ec1a98bd2fb818ee64cc1e05694ea77bdec9d
SHA25652801482d5ad95674f47080a606afa80d16e368154838872a02ebc409f7b0aaf
SHA512d8a60c96b79d49436382634b3997498c96ad6005f4fb1ad1fdc9aff1cd307743c213b2506af5c69cd217bc5eff9c2dc8e194bb11bbb2646947c9d61c766e56b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe75b988ff5d713aba0c9fd96308c949
SHA1c01123d05a98af1380f034fe5cd68650aad23079
SHA25676d515cbcb9c555d35c2745cdd284b0d7b63a451b40b6eb9acfc981020c4351f
SHA512a4d8a867aa782f0c8c6fbabefed4cae1de57c40d4fb12786044f490729b95cee1c3831a2dd6393f07c5fee9d596356b1c58b5dd4f5e3797a80b75b13d4ac9a60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5382086b1ed3b4307267808e75fe1fe7e
SHA1caee2e0adb9b7c31c4f8e3d02d8c4ea5a6ea5e27
SHA25649aabe2a1f654e860cb2918dc6f94177b26dfbf92dcee6fbe54acb5ad34cfae4
SHA5128c25c315196cc41ac5d36757e6594937eb1b191fb3f0e4104c2eec2df7db8a4044e7b73b9ff86c03ef4765531516768667b7653b6eb7f94bda589c259fffb643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544cf74caf8c112ae338369ec09d5a0d3
SHA18fc0f90833b994a20427f97da81dafd92a02b1c7
SHA256b79f84395bbe65e1846e0758fe724af0053396d777c949fa87dcc48331c99c84
SHA512304a8b5eb658c581b6ca108db7b42a3e1e79882399f0ea112feb4c8198edff5113a477e3092102a2efa70f22e604e369647c9158c18b9597073cdbe86948f4aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505ac344183ca8bab280f1a8182f38b82
SHA1f2c81d3fc046800a97524d27863107202ce9d523
SHA25601a291717ea3066106863ffa6691304501ddf41955cb044e4d77bc5e8ba7fa54
SHA512522105e0dd747ff728ae672328affc4d215cc869bf9ff5609356894fe6fee62c82f50380b7c1a9c5ff78447d5489da248ed8ebdaae226ceeeb0ff04dc3399aea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4bfc0695eebe11b7d923c0e1d480f56
SHA1dbe31b29f751e1c6e79e101199d68bd03d34b620
SHA256b220e481ccb36ac1b5fbf65ff1ee357df06672e5d6e50203f742ea4fcf339d68
SHA51201e0adc06a3de9841decd1604acdad64593c8cec071cab8a4df42771efb7bd241fa832a10211602ff7028113606478977d1a152ce9badff9a7e56fcb1c04edfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a8d332a37b797f34f39729bd09e8a2d
SHA1ae2c1d24f2756724043c00e61babd6d714cf1c66
SHA256e78ff934847333e81bddc102d9a85c29c4d424513399323defba6a6918432365
SHA512c897d7273d707132072f84166ce4f4aa83257f509914df3bd77ed9ee49907d4ee978ab8429b7132046170ab5e325d70a2ad37ddc7196d335aac2856a11dabc66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52090035e8be36a65adc9eac9a27ab94e
SHA1c6dd021f4040a7fe9652b996f79e4e260985d82b
SHA25662b5088b7ada0d637d599d364b8a707d2e8aebe814c46e8ffe68a6566d6e0c9f
SHA512cff1a4c1fc98ab10aad1e07a6be980a18168ee379848d1e32c8235e94362f6827c2c115afd071f5d98a1502b247b464d8677c9c37222d273fd5a07a0e54279a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7ebeb90a621320a73ee0bb827779778
SHA11888be8ef35ca54784071fc306145d221932210a
SHA2560eda5cc2620912efd37e7d7b858634493df7a403409ed3c0a6c90df72791fad2
SHA51277eab62cc692787c8d23c611d1040a57129da629b94066c526d332a90d4a2a50007e9c9f707e9f53e03f49cca04f280d253e0e5ead4fa865cbfd48a553ef87e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef52485e66b577ada7152758be0377b8
SHA17095aae1262ea617430223cdd904702be78eb433
SHA25669a423b1e42718748189551aae15c994e3af7a5c3d212841da7101b66e830313
SHA5126d293533acb741d088713ab1e6ca0d2c6944b3d19dce2e42229591d5f5f7976db78c2ff7c1d0c7d5d54114c4ac7ce90044825b0929da6e8e2db4ff46f63fb6f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539bd98f29b6d5ba888cbd989cca17b91
SHA140c09129e6adf0bb65d3dea63a5f924cda7b5410
SHA25680be135de9746427a7d49ee5a02c0837daeffee31b837e10be79de3704941bf2
SHA512fc1836e0b9aa0c375b651e0536f3babde4760a515e8c79af6b799e3555081a02c0f737e69e483dbb830643559f41fbf3ab7533d0981f13c7edfbd491c8ebd8fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572e7e103920d7d2fb767b757ffc4386f
SHA19cf2d5b933e0e007b438862fa30268412e2c6b06
SHA256acfb3ffd98e761d379c4f9b2700553cbb39b069dc4f124240afa42f293a103d9
SHA5124f742e2b0a92269b5adb95a1bba775dee6287ae82e5d3abc8d09ab58a352be6cafc0a7a9cdadac74c937e21ec93b2e02ed3e252c94027d0238594df306bbcbb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a3fb8efb167a0ddce795efe6cdad275
SHA10bd48b98da6078f1931a392841305a0b1390a35a
SHA256cdeba935db9e4aceadfe3941fb9077507e22dd67e9f6a8464fa1276874fc320b
SHA51213ae4ae3b6268fb7d13202812e7bfb72168902451a91aefbd3eeb1efd3534c4ba2247bcc9a64a3d1dcf1cd7c70ac950bc0de04a57e50d98534d8c1f080402d94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c3511f93356cad08f20385702c80f6c
SHA101c8d4c8b13e7f7b13aaeab7cf5ad972bf40f8a3
SHA25673c43c72e4b9581e9d47764c41e648dc47ae137d574f9b0c8265671f179aab0f
SHA5121088d498ec411d3818b4228a4ba99018a42bc2a9d5a7dd561fadc2da9e6479f412b439211b72c441ba8f5e9be5e469797c298cf1ccde84238624473b3959d5f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ad326184641e4770c4fc660e31f2447
SHA12287e376739ca190d694cf3295806e44506e3476
SHA2563b8318728b35ef934d70563aacf33158b49d2908d468f84900e73960c1099e93
SHA51245045ba79f7b271f6964e8375e36893e9276e802e55ddc821458248173c1e862f2c7cebee02e4a38bd5caefbf000be86e845ffb47f9bdfee38efc473151e6b49
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b