Analysis
-
max time kernel
137s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 03:21
Static task
static1
Behavioral task
behavioral1
Sample
042f95a6a259cd8c4d58f38ecac8ff93_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
042f95a6a259cd8c4d58f38ecac8ff93_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
042f95a6a259cd8c4d58f38ecac8ff93_JaffaCakes118.html
-
Size
26KB
-
MD5
042f95a6a259cd8c4d58f38ecac8ff93
-
SHA1
c3d1b787be709f9e9d2773e3da2180672db7247c
-
SHA256
66c96cd853391b302879c1cb03198bef927d87b0eb7dfafa993370812944704e
-
SHA512
701affcbc7ece8b899e4ffd915755da015337bd2ee7858222485e6dd239d8063491881e0520aeb0e8594c259ae07ca6a0d8293e74cf5acb59bd8c29a1adf3f25
-
SSDEEP
384:4+QfPFd9QZBC7mOdMIqBKfpC5IgSnbmFe7Acen61qkJvAgo0ivAkPd:Zcd9QZBC7mOdMI3pC5I9nC4TIP0ivXPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4C4D9E31-7FA4-11EF-838C-C20DC8CB8E9E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433914778" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000875a5d1c5ee8ee7c7deab6606ac007fcf75f5379d8a9659229cfa361b4ab6897000000000e80000000020000200000000d496c0e3524a19e48dbffdcb1bf3bdeb1ba3a675eed35ff4499a38b712b9e172000000052f81aca039a4ccb8731c99f3efd15d249c9792d4374ddc38394ad564047b24a40000000b023d813ab2125af4cd434c8f4f8f24afed5ff01ff6baaeb0c42b941287a94a2c76a662ced9383dd2fd8541975df1bcfb9730f4f6a087b8cb011a35fdbfb4b1d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20665523b113db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2536 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2536 iexplore.exe 2536 iexplore.exe 2008 IEXPLORE.EXE 2008 IEXPLORE.EXE 2008 IEXPLORE.EXE 2008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2008 2536 iexplore.exe 30 PID 2536 wrote to memory of 2008 2536 iexplore.exe 30 PID 2536 wrote to memory of 2008 2536 iexplore.exe 30 PID 2536 wrote to memory of 2008 2536 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\042f95a6a259cd8c4d58f38ecac8ff93_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2536 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f52f8fb323d8b8bb12036392a91189f3
SHA1a29026958d1ffbc3f4367e7c89c69164216514e8
SHA256af4eca656f12d11d6ded5b8eaaf6b11ca61091e51a49f3e91c45818996a57ac4
SHA512866c05b4b930eecd538d928081b748ee85abc3be029f7d58601b75e5dc913db9d072957410c1312a2d6c9dd7cddcba08436316037d2ed2e939ae05d13c1fe338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d4a802ee89befb6e72c283b0486ed38
SHA160e055c6d1e7fd1606fb01542394ac4acdf21342
SHA256a20eab00ef63a5355a4fd7c93ba81377541bedb9a3124e8b054b6a86d825d762
SHA5126cf1042827e3ff830265300111920d1f6b96c4943e760642d41f226a972c1c0b612a9745e5920a071c2465622b9751bade31b16d9e266e42d4ce7f52705d3117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be3f7ca21c18cacdaa476330c6921768
SHA1543314fee74d90c90290acaf9b36df3ee5d90a22
SHA256fa6fd3784498ed2b56e82446f8a1106f29b7e5c27464260fe52ae871ecc35f63
SHA512a14fca5e7b62aa6896091805b0fd0ae6c7e34d6765c974306453d61518d00ed0189a90a674cbab3998d9c1dabc60a164ef2ed7ae1585ee40e4c7ffd607e3f5d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ae95ba9c02bf1740cde903565f2d47b
SHA1c47d107aed8e6cef9b8889ed3a29122f236e5846
SHA256a70f5669fccff45c95b85dbba886cc0ff015b1f64f7d4ccc865ba26a44ed960e
SHA512262c1d182c7856d9826734d0ebf5216b2bb2268ecf36835385b232f4aa1b2cff875c08c9d9ab87d50039bff8e749e0bdc8744a3ce10b6d55d6f326878c778303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52da1449c66900f0b385c56fe36f3b070
SHA1ad3632e77f5dd5526f9175290c7ed9a457b9b7dc
SHA2565216c99d5ce8d5691c37df38249c7bac8ff58db532259b3522d7c72641bbd1fe
SHA5129642f7bbf055d583155f57d402f36b9ba65804df6ab60d7a67cb0a2b0fc0bfa4474edbe5147e1b9f95807b231f9787359b4c116a6cdf7f68bab2a8d8b775d288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5372d40d174deebd435fca94679915446
SHA114efd72d2d70189e55008daed37c928bf17b6b1f
SHA256f171ce61a5aaf6d73f853a65677876df5993488a8b998575b5bfdbead4a66a45
SHA5127ca64d539ae7f55333d76cd122ef486a46538f1555e7e11738a61403cdc439feb65f51878cdf225244ab47f29811fd4dd3ef3b349a75151e7c1952e9535f9ea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc8e4c89876ee204164001a60ef18470
SHA192e9687a4090f3ede03f1795079dc94ca88996d7
SHA2565fd42757579f7e1686bdc2c17a844c0e4e081dbd7866306c46ffd34a4748f7e4
SHA512a60d5cc93cfdc5b0450e9e8ba56cc63ec4b484427d81e7b623baa3d243338a5bb526005308e9b36d7a47c5495318f33b21d35378e5af9f568426c98f240072f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba7ae1936de5e3b3b0187ee7a4214d51
SHA1e3ac47315938927712f0fedbe491180349dfa787
SHA2565e62cd71000149de9e084b93855a65b5da1ccd13fa10c7cb61d43e999175e449
SHA5122bd373a242ba761d847a4d6ff886a620e50d7f33a8e59c1dd7ec27ade12df13fa73aa52835f3b19f1f67dcd3d8ea4e20e6331e67d39e4c7a4293f352f389f6a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee7137bb7e3fcc85de17ebded13c39dd
SHA1b0b9948013fe51f5f85ac0acaf0110ad43d94b39
SHA256ed036bf76c8d60f682e64d1e616ff72f4bc1eb6c614435194a83b767478ec61a
SHA5125dc3962845535598fe84207e236ff63b7b0a6869c250275ef2fe0656c8d5c055e176b361e95a563d3b8af156a5bc1add9f29d87191543ebe555d01bc1a4c69a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58eb4610ce054fc48c36d768f00ca1b7e
SHA16bdd25325ce0fbbac02e63533d9a76a2f56f51f0
SHA2564a7c12a09f566a18a5736b13b8ecb18aeae20993c331c4d33edd038de4a30429
SHA512227387b0018eb7678314387ac013f12f0d667a0406800b3997607238be00e503f7646c18a1459a796528ab7df5f0a6fce6633ca4bf6a2c086f3bbef6866a09a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee7da4e5d14b5af636c600380f9a73da
SHA14a0300b6c4c8100e38e66463caef956815346d66
SHA256e96ceee7990672d7717accc23f6d624b3dfb70b3aa219f8d648526bb876ad9e8
SHA512baf7afc39874df902e0a19f63de6f37cb4a9f9d33c80bfa71f86e164dadfb786fb8b0e7ec5206cd5bb9694bf912742c740b999d12594b5b0fc0fca9256e7935a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f69761bc22d04ae38cb60c85bc48e824
SHA1a01bd223f59cd3bdd0d02025ec1fc725bd945055
SHA256d01f08a039a978c280dfa18f8007bb5f10f466e98975bb232550736cfe3eedc6
SHA512b01e553067a79f5973645ad43685d46fcbb9262c2ca8499d4b4b28b58a332a6518b82d0ba36f6e5b43110c3e0c9acbc4c52f9afd3eb2640c247fc37be182d4be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9daf0a32c15805435efb9d0f2e6c459
SHA1365c9334ce0eb01a7a9d3553dd295010a8ba7887
SHA256f8f3e9f6f77649f44a91b065e07e46af6aea2953b40f32d0f47a0df8e8cbb9c0
SHA512b496eb6d7c10cee07da6f18870fe44a3cc8e279f039a6b28a6f2aaa75e1ffa2bfeed009e9081cf4215d4b4336cd9437421310298c5ddd5aca4835fda468efe5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f66b2e11135986d52818600ad0deb6e
SHA14f92077cb715a84594d83ddeb4ad6c11a0e9fbfc
SHA2566b76cb65b2051713e89305ca57b21694d6a28bcaca9d9b5771707366a6204672
SHA5125e16a84c25f1afe8c829cdb8a7ef65139ec779faec23cc2ea0277fbb769563094a283052bd08fa2ad83e86ca6bcb597fb0d272c7d1b5114fdf80da60bba78bdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5304f7f291cd4ce139b1640292a49f58f
SHA1f57bdc54147444e71a4b032b2a196647c46edac4
SHA2560402f0101b74a615d73023f8d7f99978ad382d7b397245d4dc600a1faf8b032f
SHA51253f327331043870ef6102b5ce8e08288a4d5886f74cfaa2e4fcb68f16e9907772d85e9553b9797fc02b0a53ca65574548a4dda89f8c629ae73dc5414cd715bc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d75ba90cbb49ec6be08a8f074e2743f
SHA1751c2567d3a3b978f6e07d198b6742829fc53dd3
SHA256a01bbcd360bb56141c9d02508caabb96c0448b3e3f2bfb709b18e17ad42f81aa
SHA5127421c05d2c7027a527a634d3275343da83200dc1b3b6c441bf3c36ac31912bf6498f8799fa8f9b1ebf0c43414f3f73f7a216c0ca128942c715ae73187f34becd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5a1c125073f1dffd5c178fcec84565c
SHA1bd64f30c47f51d27e281b22c5784c2d3ec9c58a5
SHA256b2e45eef6725592cb3b7799542507315c5a6dc2b6990eb6e1e66dc31c2533862
SHA5122fcbc150fa2773a0c5364b50451bfb3f3d62e7a8173e872ec656eefaec364e7d645d35dfd697b24109a401d2ad0a5c70726b5a13a9d13f86ba801877be1fad48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c85818e0388125ff40aaa6f0b6c72485
SHA1f5f9174929afed21227394ba9ce873a509c568d9
SHA256ba44dab0827f44f5597fa32ebeab44246af5a64bfcea1489f4ed9e607140a499
SHA512b8eeb846f2cc9b2628bd0aba641e9c49da117ff58e28b1d3cdeedbe5ff47580d78e4be960f552a0d7879b612c1d705da25c423e8f833aadf3ab3e4fa3f07357c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc6600183c952cdf7642842f4342195d
SHA18daed8cc87ef24b600a4bbdb587824b8759bec92
SHA25694ddb580bddec3f9a50832ea15516e7ad11c8227fd5fcea0cc19d8d340fea016
SHA51213a1d05b21a0a6d9a492094bd334fe65048ef104f8f01e5d7aec8ec59d9911ac73410f714969b6e1a7d00850d4a2ef56ce7d6a73b2bf071a4e46115a07a7cace
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b