Analysis
-
max time kernel
133s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 00:00
Static task
static1
Behavioral task
behavioral1
Sample
03b1069a7102d73f40f7dc6987e5bb08_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
03b1069a7102d73f40f7dc6987e5bb08_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
03b1069a7102d73f40f7dc6987e5bb08_JaffaCakes118.html
-
Size
6KB
-
MD5
03b1069a7102d73f40f7dc6987e5bb08
-
SHA1
a479a90ec08fed45b367ad57c48f5be5e958dd59
-
SHA256
ada378cd1ef0bbaa6c7bebc21a6b42baf44c3bf9d0d8fbe9cda66f8bc8e9c41b
-
SHA512
d302f647c372c202b1ac1982e676513414c31c4cd0917d7b010eecb187661a8b9d1edcbe5b3a4eb30cceebe47eef957fb9cfd3eef1b56e079e497d231598b406
-
SSDEEP
96:uzVs+ux7ErLLY1k9o84d12ef7CSTUaTcY/6/NcEZ7ru7f:csz7ErAYS/HD4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433902732" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{40F17321-7F88-11EF-9F7F-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0aaa42e9513db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000d7a4cf1ab425dd235ce9b48efa7313a899a4b18e3ded05991c1f404eff7a2ae2000000000e80000000020000200000006e0189b58ee82f53881c72d28a63aefabca00cf6e31725f66c04349b2afa93712000000038373be5c1a9e374118ebbea4bd44d31c0e035a0b0d82ec26699577ce08699db40000000c27eb13d04a2796a7c857b8c68c9767c83df1b77bee124d970a549b3e4262e9fa9e6b919647859622bdb864868a205b6b954d6116492e931602f7260ba789161 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2656 iexplore.exe 2656 iexplore.exe 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2836 2656 iexplore.exe 30 PID 2656 wrote to memory of 2836 2656 iexplore.exe 30 PID 2656 wrote to memory of 2836 2656 iexplore.exe 30 PID 2656 wrote to memory of 2836 2656 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\03b1069a7102d73f40f7dc6987e5bb08_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2656 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597e435f23fac1d187e5361d04811df8b
SHA15a5c73ea2f7a0e7a1fd18b8705666aece5c60812
SHA2566f79cb9ebf6ca7cb521a18a8421b2aa19ce7d40a6ebe7c72a6f45b89b6976358
SHA512dbdfacb920749d828ec249d36db2ced99949cfd41ef3421d3971e14dff108fc852fb70f52265e63d62f3bf1b1ec448c8111ec361e7ca69164636344efca3d80a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5269ab5bc25c3c3ae6b2c844faf8f47ac
SHA1bdd36f4c2835dc21bf0b8a67c68ea632c8d99aea
SHA25621aa0dfeace7bf9f26fb7526009311c04d621ce30b037c04c430efe274aa14af
SHA5128210838cba6c30b9c01594c6323e364a231e9ecc47a3448b4e7dcb6e7ce6c9c13f57dbc3dba6b28eb5a9a6dc9aa44cfc6552fe1b96974a44baf5d5d936420992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f341fe7904f624702e2a234912f9878
SHA1c4b1aa19a02a8ab78d0b81d6a45a163e973d885a
SHA2563e230c553d2d0462cd756c287fd7547a5ffbe22b74ee6788e407f28e97fd3e56
SHA512212e423d8540eec6842af877aed1d989449707bfea32aba026d541d8525068ad83065134273f8729a54321dd79dec0a46607eb9ab02f30ff612ddefa7ee27f27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deac5d356e90ae8c23c4f4beccda9ae5
SHA1eddd301815d37f751143a6cd8d8609b04b93454e
SHA2564716e328b09d1a0f64b21a97baf972a9b482a19b8d21b5e6141e8b174e16c0ab
SHA5123bcce33088bb354d6a03a03eed00a2f4eec6e1a24d1e1cfa243e6487f36c859bcb734b2cf7181ceeb928bbd50d7869ab3bdbad11ce3cceac9dff9baec893f49b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c5d3bbf7926684cb3ffb518cd626202
SHA1f7a09469e593f18d9487c562c78ecad1ba70e539
SHA2564c217d13d71c16a8b67a87ccbbd468aa17dce9e56e8e087a3cf9ad7910db9c48
SHA51271a2eab154ecd0ff5892ecf45078a284181238a739d4693e16d16b6d16d6c84edbe81762a6f0c17f50e1bc7ad8dbe9601912c82f5f24218510659bee73484fb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5062fe8749e90078b33010b0913ea8c1a
SHA193d3daf60b04498907abddf0f2c54330f55e9486
SHA2563bc89192129b548944f66868d7fbb470de73a3ed6b4037435eb7270377ec79b2
SHA512ef3aa7dfb6c8300daf91cba3c48709446e1f18404d168e26ba31e5134e47a91fe1aa333466487d730a0d124abd5e8e6c1f60cbb73c39a0c92e3e28e7850b7fbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c60ad6a272b3c6a9e9301a71ef8a3f07
SHA1f9480ffec0e4b16bd1fedb844934bf958732e390
SHA256d76081c7093b8ccf912a96be95fc8b55357a1079bea19d4adb04fd7cfd04b2e5
SHA512a463088fda66d7930a70ec9045354d2ab6b4f31cf60eac009f170da8c41df043c56596730ce1b56bec696ba08a7c9f032fa9bfa3c8564e3f12143bfe05e8b400
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52580ff7e0e1f2959b9705d44bbc49423
SHA1005e261ef472ff8b0c8cc952332537ffe0bb4913
SHA256bface934f5148330c219fb7cf456634d08197c1054173cf2ccc071e8b62a1a4d
SHA51223bb4ff091c1ec7ebc84a564e2db3b655d5c1d81397991c30801cb4e5cdc767d55a5473d0380547d4e76d36770100b87d1da3dde02e61f46062d88d1b2e06503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5560cdf8012c0bccc13fb4d61adbac932
SHA1ec98198f2c1dafa5cbc24c01509a6d6fb07155f5
SHA256d561affd0eb72d49c19904f27cb8f40f1dcfaae455f3cb9a929658f2f302b5a1
SHA51228eedb165c0a2ee356d06bf3f72d3bf16c8ec39dca487eb8fe732296d7c45daa20e1b7c1c83c0fcfe1f7da7fe4920d63e6218f33f4521b57a0b8269a5000e6e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568639f6b79a62984eec8791dd208256d
SHA1dffe10e2172f7e07a575f60446ad28dbef0a630b
SHA2560ae1ac333cecc1d8a9adc46590d4716cbde06935f471404a2a7131fa1d899c10
SHA5127cc1f23d96c32d25b2bafa0443581ba3f4f7550509fcf6d2a361d8d173075ee25bf777bd95edfe8ee7b83e1db78c99c3407694cc3334e5175dbbe0ebe03e196e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2d00c7cfecb9a3abe2665edf0660998
SHA13ed0951840ba0c3c5f51e45a8fa149d9251f7f33
SHA256abeec29a36f87b0953781d220000f5a086c92242a76a54750b282a1b1cc6b2b7
SHA512b15261943bcd564d71a7b6cb9cc481236c93eaed53751189eae7e8b7551173ff89732f756d78d3d693ed5301db880f2f0562b7e830f2bf9f03a77617cfb5fd60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb3f1aa6f4aae8f54ac3b52511cea8df
SHA122d909c70129b877a97a6b1412522fe441950343
SHA256d1236c53c9124c5404fbabe3817749d746e51b863714746f464450cf1a2cadf3
SHA5120fb32fdafecee2249497f93b3baa2a05ba6a2416aaca085ecc18d6938cee7a017ff90543f0feb511d75adc403d45bab89c57a813db0e07ff452faca8701fc4cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d90974e586c5b2d3b46bb58222609cf
SHA1f7805079da0ff2b6af72fe0bac2817fe943f9192
SHA25634ece99bf1db6cdb7f1ac3cb7ad1f14935bbb93f0c36d3aa7278d9f1514d242b
SHA512411f96407b4808d6bcfbe28c9fa6320995ec7d698b7aa41aec537278565a0220580232809176adcea16489593fcbb8b537652b5821eac6a30b828d5d127f8a84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbe2a1a1edc4952caa182c9cfd8aa6af
SHA1b3c7fb77bc940376bc5d59b3d616331340c8bcc2
SHA256d72c69c76963046a00adaafcee1fd80ae10ec2ebf771b3d6f6dfad44cc277193
SHA512a6982a89ec6fe4a40db3c17a7d8f346b98eca8c0347b660bcbdabf32d3033b5860dad48324e629b67037d712b8758f4ae1e4b1ef8ea0223e4186e17cf7e5eb9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f9a39afa4db207a401f36048be4b078
SHA1f04d3ad39b65c11a6bdd5d69e73c6f1836cc080b
SHA256a029435e42a5085fc5139f7cdb3acf953e12d6f16153447a635dc30ef64c722f
SHA512bdd36c961814a497960bed9c4f668d9bc005a71ccd30be6fcaabb7e5ea036af295abbd6eaae9d9ff2bd652be9c5e03942a33061eb1b10378d4a250ac07911fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5828dfcc0cf7de019a856e1da7052628b
SHA1994eeb57c09be1925478492f2e2a704fbc9c54f5
SHA2568e25b05c37b0dada097295fff0dda20d27e374ced3742bb431c8c52066209fd0
SHA512cacc93173b7b2e9427e514a70a6008c9994b8edf1c87729025cfe463a9d441c49bcd4fe770a22d05449d896e1e8e479cf4446f4a7177628c85846cad6b416123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6732fe28b0302c23477b668e8f6b8bd
SHA12069a266fb9c2b65a9342d5f5cf90c3f281ac8e1
SHA256ef34f21d95b25aaa4d07695b1f21ea9fda484fa93c17958ca1038626a813f001
SHA5123e8538e99917aca43ec966bdff00fc575f73e17e52f4be39408732730476631b0164d31f5c8c746e5dd11add86e0bc53265e1f96e371b78884e63cb4b00ac060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e54fcd8b0f54f48f75f8a05bbe3f7129
SHA11375f5a2ec40be838a70e0fd81786477e7800cc8
SHA2567850485e242340603a99768889499060732dae0afe8cfab050809ff832d1325f
SHA5126ceccd486440e68d292a3a49a6652241efebf4a9721b284e35c43d1c5a2e096c7165d7c3691625d6743d2515dda3e205b01e6362d52c607e762d5411aa38e660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb697e0b5cc34b2ab4df18c9486a27ec
SHA1c3021e8095177fbc9265d4343e129d9afbd17896
SHA2565d44584c8b4e70a3325adb6470e5c2f3bdcab9b5f37ca73113ac2630a124d42d
SHA5129de41263e899aa7121cb8e019dc28c162a7762cf8646824ac26be2af672997952c92d2554b08ca45927da24ffbf410314981c671a12d131e5cf077468347efcf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b