Analysis
-
max time kernel
137s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 00:03
Static task
static1
Behavioral task
behavioral1
Sample
03b30650533f6490176175f49bd4f004_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
03b30650533f6490176175f49bd4f004_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
03b30650533f6490176175f49bd4f004_JaffaCakes118.html
-
Size
21KB
-
MD5
03b30650533f6490176175f49bd4f004
-
SHA1
b91b37e6f0e73699d49abcba6718a8628f1b021d
-
SHA256
acda5e507a50a381a1628e6faf9fdcb15812735d770eaaab3b358240b0076ecd
-
SHA512
8056fc0bddb2bd1c511fe20062d9a3272e276794b66a98457665fb1df668abf5a8218199986d6a5be94a121e759c11c84137fb9c6d1f96f32418ca03bd7c3182
-
SSDEEP
384:4+QfPFd9QZBC7mOdMQU+KfpC5IgSnbmFe7Achk6MX8E1jYVPd:Zcd9QZBC7mOdMQipC5I9nC4C6VPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000037d5d167b93c88da42d6b1fdb8b67f9d3a8db3b2e3ab8a583553a9e694824f6c000000000e8000000002000020000000345f5885f868213e259b23edb57172e0e5831657be9f2897249282bbd26e8b96200000000b71d9c9c1016f8fd961365370c6b47fe91f261fd380623d82d35f47d79378e44000000016aa45cb7d16147720f34f4fd1d1cae3f31a9dc663a8367db7f9612da3ffba07614923b4b0d8494b01a8a16b66829e55363a5b49b2cf175cdc78d771298aafd5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8AD76351-7F88-11EF-A1FD-CAD9DE6C860B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00a1db619513db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433902857" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2096 iexplore.exe 2096 iexplore.exe 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2452 2096 iexplore.exe 31 PID 2096 wrote to memory of 2452 2096 iexplore.exe 31 PID 2096 wrote to memory of 2452 2096 iexplore.exe 31 PID 2096 wrote to memory of 2452 2096 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\03b30650533f6490176175f49bd4f004_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5736c41a03ac667b17cbec19d7010cab5
SHA1e58d1e2626d6159cb38c6fa1b9cfb71d9f7c0606
SHA25661c12987087f84d1411ffdf4646be850ea1ef2bf40692dbbf60f42410b8bc18e
SHA512791d617238b527926f69043f5c95e7ed632f9394ebc8d0e0dee1d69170bbae4e624417c23bcc00979364fab288901d718f00df6af03e91dfe52ce8d6d02f0c92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54477b738be5fe282ff4f03edd836c181
SHA118421f3548ce5967da1a69be5e89c97921376abb
SHA256584eb4f4f1ac29278a4f602a9d92cde4e565fd371cfee82c6ce10bba6efa6ee8
SHA5122ad264850ae0bed6544430d584a089af16652f607c610dc2315c2611c60e5e3df4b8ff0340bc0c30c4340ab8e2f3bfa3267af9e986790c4961ab285152e5e2de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0605e9db1efb519302981ebd68094ff
SHA1de5aa933c619ea37fe74cc635c590d796582aeb5
SHA2566b1c003c4314492654f3d03eff5a2ede5cfe03be5b28d200a77e6d51f7b0181d
SHA512a6c08be00f0e4748bc035efd0ba5c6511b38aad8e8e2d54b8419fdd648703a140c0905865094e22ae398bc4de7cc590e8555d6990c8ef7037de9199f72f112ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5933570b2b793b40aca715497b96c5ab4
SHA1a7e65416e870e95dc3179dc53113ede15b167dd8
SHA256990a951db748c5daf33195dd5232f95ba408faae8cf7ec620d2da1fecd5aea5b
SHA5122b6553e260ac2a3199ec23e12357c7dc9567f6171d4e39b0255893dd62f4b87ee881011c2eb2828eb61cbfeecaaac5be0e520ce4bc45408afb052f88e24aab37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d63705d7b3b7e55eb2ab2007f85bb72
SHA191f6cf541ff17c90f540a23035b18be7665d18fa
SHA256ddc74401abcb350465da82910ecc4894d59323355005073308f3dc5456918c94
SHA5123ea4245c847479d6fefe781da5315a3d3847d095de5f75deca00b648af6deef55c81e53f9ad8dd74e6f1806742eeab61eba8d2e64c73d6778f968a78fbee2e40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7bfa6062ae38a2c5ef5fb59dbe95471
SHA11664a3a36ac9592ec454f84d95872a8b67d6143c
SHA256a463aa9528fe1e3c5a7f8410ec8870ea57eb135d3bdda02c43271a8a34dbcbb0
SHA512635f4aad5f11e0383431888284fc88d4f64783d3d7906bea4bcf8f0c922469872d7264a742643e20006c350e4f7fd21e2160306790cdd27062674f7db45c941e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520e3d4a20cc9f99165af55de51b31878
SHA14d0091f23b458e5a257b1e24c725bc2a7aa98722
SHA2565a06339cb1753ab0a99ada3bb39dac7e0bf97a405b56776b848aaeb6b9ff0c26
SHA51256f545cccc2014c7fb7a204ec97befacdd1cf8e1fd5b0740e50cb74e81c95fe07ffbdcde44d056894e96d88c9744b89f2362aa882923c078e803a0b49d4caf55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbb1bd3a9786cc1f6f037057c0790770
SHA10ace690e81df0fdb0741ea780f605d705a6bff1f
SHA2561ede86eccaf869c8b66ef34adc4d3aa6f604195b2b509555bffb6ff8fb1aa923
SHA5124acf5650b5348967050fb336001a83d1f48221873dc8084edbedecd8a9bd17ff89aead7b6667af8b6fbf8fda96fac4808d6200eda0bc447d589e3e93f9104feb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d7a7a38401b1f9948b907934d24048c
SHA1769b636c7f4ef06a53cfcf1ed23f9a2ad44a9d86
SHA25645c7bc8bd1b38e274469a0a2bf42f0d66d3bd4909b1012b9b4fe645024b92cc6
SHA512ed0b2d6f907d321033788af41e5028a5469f0f3e46c287d8c8e07f4a5128ab4cec6f5a9ee09df978a89c02ed84dca62a50510fa784d7d8a183a76e1dc1e88ee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543cae5f506310e148f0a3a80f97fd4cf
SHA1a3d377e6085c80ae3d176eca11af90574aa15091
SHA256427ebe16ffd884ad60ac0cf452676320f39db2d5f7adf86b68caa1dc99884c5d
SHA5126d157adeabe9c4dde10b508a02037efcb677db82f100261d8057d2a1a7ad921137680ba4cb95e26ac6d5a94dac16db645a259e181d846ae305267c391b1c514a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb54ac790d0057cb219189909d63c2f5
SHA17f2a26032e188d8efc108a4742544277b2e471e6
SHA2561a1faabd1d205cc2a9d6593fe60f5c022d09a9b400cb89e76983888563ce85da
SHA5127c1815a551944860ea9812963446cbf26aa71d4280422205ea1e944c5263be8393af4f7fcf602849923121b14ed2472bac78436149905a1b07c59c661d477bd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e67f788f3dadfe3608aa44a087a1380f
SHA1449d9a2aefab1cefea23a29a9d06f9fd201b63af
SHA256be6a480d2cd3f6e74862502e9a889991f2e4114437689a6792ef001adfb7267b
SHA512a243c96742af504f36a521e26cba38ec018e9a2d09ab2166f3b605bfd133c6e76a9ef0af80211856c8cd76830ca0b166b0298790e84f56d7b37abba09dfd42f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536d5ead49007d011ecff9f4eb825a399
SHA1fd4613f45702d7da28b8e626d37e9fef0de05f3a
SHA256d967deab89233c7bfbb52506141ac18df83d6f4a5d26ec17af7a9dee5c32010b
SHA512b83708a98894a53595bd5d529c8c91ca92bf7c52738b4bd9d8916e3dc25be0b9877eab7582a22fb6cc310dcc2896b0198af22f05d5c62ac80f7036a2d25549ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c22b8872782732d76e2147a7720c513
SHA19bb9303f0476eee08bad4a30ece7dbd98290c14f
SHA25686b3d3112f4f7459d23ac850e9e2b52340973d137f2810705a2acdca4f038231
SHA512f620809e4c35b799e4998ce896986c3f23d01145d35000c8502a50ab2df36924448d2739034e14672e802ea0a63f44fe9d544a746d246d7e09d89ffcf57f782f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537cc8250771b30ea4b0fd7fc0aa7ab4e
SHA16a6c0f445a56636405008f160c9395ba10814123
SHA25678efd8dfc088ac68eee6611aeef74cb27570e2a3a2da1933c03dbf6eb2aa0e8c
SHA512e7f5475202d5edbdd6fad47e3b578ac38fe3cbafd8b1769dcde7945bca46f4eae60af9a400e2f8aa9632e601deec855b3c17b5dd807b053c996d9d3758de4087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52427215b7251b0d5de21e5f63d4a1a77
SHA116773da91531d7dec72235be1a76884f58f3601a
SHA25692685c42b7eaca0afd3ce8ad6d0d8a4b488cdd04747c6be96f1eb786851891fe
SHA5124bb4df88c15982a806bc5fd855888680bda33d11c6739715ee5eb1d13dc404837aecb7b3b8cd15a95a2bca1c33996ad30839ddb417276015364f5e5b7a7eea65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c8011ce7fda5d7325836d5d2740cee5
SHA1c471431c7116a51372323508709b38db46b460e1
SHA25678a29ecf2526e120785ec5fbe07aa9a09ee348c53a0d215d06a4812d3041735c
SHA512bdfdbb1c37514f50282ecfc17ce9bcdb822b4259ce3981426c05e54be7478bddadaf1dd41ec7a94c84a83b19d304fac3acfc910c60b86a41e7bc16b5630f0c85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525c53b50c3207662e3eaea9d2da473a7
SHA13878c89d046bc011f6213ec06b65b54766c53271
SHA256f1317e04bea9fd42ab6c53e5e74af0a59ab229ce360d3839df1c6787a503d4ab
SHA5121e68429e454a2e677ebc35d71492c2f7575cfcd2b5cc09e19d76ae3ecf68f76b1cd21be28f85c7bd01b6ad26df917654a2c4ce6671eed430cf38af97f609fc6a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b