Analysis
-
max time kernel
139s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 03:18
Static task
static1
Behavioral task
behavioral1
Sample
042e57e0154ac56486cc0ef21d4dc6ec_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
042e57e0154ac56486cc0ef21d4dc6ec_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
042e57e0154ac56486cc0ef21d4dc6ec_JaffaCakes118.html
-
Size
23KB
-
MD5
042e57e0154ac56486cc0ef21d4dc6ec
-
SHA1
ccdaaa6be1149229fc2c3e88792d1f932700047f
-
SHA256
7265a989d9fa73d7e7782f65a383f1bb5e95fca9b6bcb4b76fc87fcbf298f03f
-
SHA512
458147dc99204cdee9b7db93b1b215f30471aca5ff8fc1ebed78ac80f34c15bf6893303487087c499c83fe005dcf33a101c265478fd4cdf46320f14db1c7de6c
-
SSDEEP
192:ItZKXQrDMnQIMnA9/mGakmMnCmuSmMnSRmMnmmM6eHEp1MyJyccY5l+EM+YSlt6+:qZU/5BIBSkwCylIYtmtmtq/Utb8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000001cfaec22602d620a65cd9125c57983354426ee0e4bef2a2ece4fb28006bdde42000000000e8000000002000020000000d6e07d2dd75648e844b5ddf84fabd0694972debf96f5d111e821ecedbe197b7e20000000fdbcf6ba2c77beb7399c1ba247b9225d9b996e38c899235b91b66bc16624a5b840000000f8e91ced3186b1e56f3eaca6727e1b9cf899073600ba5f32d83494959b01e56ba74aa7275329bf9cb1cfafbd8ac496639aa4b08ef495d647fd70128d0c2dab54 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433914598" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E19B87F1-7FA3-11EF-9081-4A174794FC88} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 608afdb7b013db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2688 iexplore.exe 2688 iexplore.exe 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2088 2688 iexplore.exe 30 PID 2688 wrote to memory of 2088 2688 iexplore.exe 30 PID 2688 wrote to memory of 2088 2688 iexplore.exe 30 PID 2688 wrote to memory of 2088 2688 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\042e57e0154ac56486cc0ef21d4dc6ec_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bedc231e5ee37a9287b10535b8e88c3a
SHA1a6fcc41aef033f5cea4d5fafdbe96f6bbe1706ff
SHA25645c23c608d669d5da697d7cb784230844251fc253781ca2fb9cd89fd41c9d135
SHA512cff02a9603f07e1d6b764f8b6ca042b2881935167f64da2ae4fa86237e29ec1e8204ca169c1fd547d3486e308289f5c65e985a9f5cc57e2983911c3daa47b105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0435d673a31bc07260f4ee51c878e40
SHA13b11f8678e5980012f67cb00f64fd274a9c19eee
SHA25601593ba5fb47936d518df1995c874e108420642bdd4f578e1b6d34c74a2d0006
SHA5124f385bea18fb8e7bb95655c3ac0f59e096e534c8bf6a692fd84f87a97acf6cb1342d623e07e846a8ee76b26d1faddd16b5f2dd03b9d3c8dc1db820946a1aad66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b215152d6e2539019850536e032aef7
SHA1c09bf9a80230b4815ee6b73e1a45d76b0d1f55a5
SHA256b12a55ac2c6d416fdd0e7209f01c4df54d579b28bc34270e0d205e8a4e29761c
SHA5129d853f02a5b668e8945aa0210d2de8725c19714002e6b2bc0175aa6c53ddead5ba171a4f84f35d6865fee9beb21f879963e74bfdd31fb1ca34fd757ab6574310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5374330d481123b7dcd64d82c3d89bcd5
SHA15a625d784942ee72e55fd15e3c64960625df6652
SHA256b2348245194d2c34671c70eda3430c7265716a09963ea5b6a4bce1443421362d
SHA5129c3e7eab470a3afe9d77585f7a02f18e6a4a581ebcb4d6e7cded8f2fd4392ab97b045ae784c27361a44d9c5b3533e49816b3ed9a79d41c5e6be15b723dbb272c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545f6fa88a6b8d7287f6bc048ab9c487c
SHA1810a75ca8a97af00eb4c03215ebe69112f1e70be
SHA256f6913893344b6c173a74ab55027d99b9844a151b53b7f4e4b0deae3148c51c79
SHA5122672d4aeecde0c007cdaba2b394962a27b4c2543c9f333e602a5d8d8dd56c0eb214f1e2c65f807e9bc42a8acd289556ee0004aa523511eef66796b34d9b4d7d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dfd6995db3586e5baa8dcf8c105c5fe
SHA19055474e0f81020a32592acb3f585df9533ca7ee
SHA2564f2c5fc8e0f387cc2d090c97249f36e8adc39d1907011d840f2837f255deb53c
SHA512f405f8ee84d48efb4628a4d4a4d1024a7b1fc9dc50b5cd5b09fb2a332839ebcf1ccfa21523af6aa23b7f0870c6bda3a06c596043806866906519aaf98372319c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5273022ea6adf795c541045f944a1c588
SHA16915bd66acd47aea4b45d284738b294abc1c8c49
SHA256d511ddbb50a2581b52c69840a6a92778a13ef3b3bad324aac10c2101496c2bc2
SHA512085497152f91aac5754825f87c74cc54a7da7ab0307d485f1bdc3e5b764639d6003f615b57f1ecaa2d0336f684134486b580685c461317f7633a00a7c0eb82ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6a481404c9e4c34bca728fe8d4e79f9
SHA151554839c27a2c6fe33bd99c189302c9653caf4e
SHA2563e9135d20e671068fbe12777ae083808ca6b32c86dafe7af644f037ebe2ffff9
SHA512b4e9615d8368caf2441642ef15541a1ae1092c0402030c316b375c34d2cc7578d240c8e4de68d0a82621979fa515b1dfaa3c8c718f862c385c62202761212b3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db9ea4ffc4c80a227653617cc46d597d
SHA1d56109e58ffec522ffcd1101d0d69a5f1b1af8c8
SHA256e648c52abe4132b8712fe25afe3f8c2ba30986ecbe7b530fb6b8e36a5b3915b3
SHA5127022e66aa440be140755ef9f8f3a5d5b4519144f5c0ed8caeeb81bbfde7d0d29d3193e8a25f7696094515dd8975535c5ffee2860e2df5e339754546847f78523
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c69e92d5a32515585e0593a05b21407
SHA1822d2db8f7e27569cf4dae6ae6cca3fcbc4d4162
SHA256389624543eb614c0e302ee87a9430cde1d3ecb738036eb41f3ff30f7d6f5db0f
SHA5129602955adb7f2f3ab2968e9f29094414d665e988e77f8e6387c199a751d6ea2b523aafb5fff81d2424ba3545c69dd2df7304cbaff3d53b42b9d6c9c43366d742
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b1092f9fd41920c445ca628ccf20a52
SHA1ddd4e1de22f577d4f62dcd77276c97dfc6e5f769
SHA25603a5f729b567c39cb51e3ee131f6e4f983dc0fb75b722a6a1613dddc4eee6904
SHA512be4aab893a77c23edb64b2aede97f14e2aa1b9aabeaac190d2fe18c9da6ccd9169dceeb4054519cde6467be88f687d6bc4b7871f471ec292b22ab005debc244d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53db9bcd49375fa984b60287446d10e5a
SHA11ae6502500579ec7f699faa8e211cb7c89e07351
SHA256ccb38c8ebdf3d80fcb9fef75d5ec099939ee74464f1e70651867845363418d19
SHA512911c3c8ddd74582e198e6b1d045dafd510992d27735ccbecda81424290d5de7b7c3fc075faf68f716a9befb583f2f57851a3b0b624f825b948f697693093af28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd92c292266a6968b1197ab0880db7c0
SHA1116c3a383832984e24667d7e2814235d561e6451
SHA256e0a505cd2f19ed66da768222762cd457e80b0d1479b1903d91440449e7fdbb25
SHA512b327996a3fe0c03e4e23a396814d3ef6c39d4568be7ddc849ed5e308c5edc4187399a3e5599790f01d6f2531a1cd528eec08d15490796a8f052e2c75ada5d9a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e249368458906cc877f021c6dadef1fd
SHA14a6c04c0081f39cce65bcfd2891bdf3a1274a442
SHA256cb28d3a00d25d8971f09abdd9fe9a247730c0d4843e5733ca613c700cfa7d38e
SHA5126fd732086e0502f0410a7111bca7777b8a2901af3df681522d952052799f0b4189e051e4b724aa9336c41033fa124191d6e8928dc04bd269f19cb323b31a3a8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558e94ceef7141fbb5157f0dbf63ea7b8
SHA1496da823efe3036751abe9dbb3a87dada6c8c227
SHA2568d75e898ee97437474f3ea86549661941c2ca26e856c7448eae51f3edb91a172
SHA512cd4c998b39abd72d6f01a2ecf3f0e1bc6ce848604f50a32fe54ed88dfe51a78bfdde62d70489c7e8178401a07b2800158d24d10962f4847a4369e956fd49e63f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c9d382b57506034e3d0f0741d8eda9d
SHA1fe8f4b236a387bf7dd8d4c36809a81db77eddd96
SHA25616f2231aab57182f80417dd6cb0ca6b3e965f1e59db6ba7303624a36844181ec
SHA51283ad68ff9a0a97ff6790ff495bbcca1dba9b2b151e94ff699e61a577bf6aa8f423d433c041f5ab4a52f03020317a368f3de7b64d249dc1217a03b4a500dfc6cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523f78a761268cc7413275b0b4b46ee0e
SHA1b48be0113d8beb126319e24a48d9f7aa59822fbf
SHA256c35b5aa668cff162047ba6d5abced85fc9c0e48567178291d01f09caceee3f3a
SHA512646ec2c348080603379463d7b254b0ce3b863cba5c107aaf8f25d1f85ff82c001bb62ab8481330be44d8bf075fa8b46a05037f0a88b60cd41baa62700b787e3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e7a2dfbd4de5f8966072f2ffae2dd21
SHA17bb8d0a7bd09fa4063fad1ac32e1396264e9c200
SHA2567203fcbaed3272e938af2c05449c5a7ef9b41a939bb554e7fc9f872bdf6964a1
SHA512d96e28155454d055fb71b3c920f5020441f007fa353d7f5efc47e623a76d7a07f32db0efcd2c43826683eb5d8dcbd26ca29fe1d2578ae012b627c78a686e9d22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f6fcbfc69f2503388b3f0fe6945efea
SHA1026098040f85661e26068f901d335a62f1d6cd9f
SHA25664af57631db337c043e0a79348311a88c3e8347d5d6f21323362616d7188c877
SHA512bf1fdd9cd67672c5c29f02346659bb01a8ee60727ef44ce5a85fa697c2963572e7418804d28a625a7197e6cf6c4cf8af21669cabca522d48b5e47b5a7edb0930
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b