Analysis
-
max time kernel
70s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 07:45
Static task
static1
Behavioral task
behavioral1
Sample
04e825bf8edc6319f328538fdaa1860e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
04e825bf8edc6319f328538fdaa1860e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
04e825bf8edc6319f328538fdaa1860e_JaffaCakes118.html
-
Size
7KB
-
MD5
04e825bf8edc6319f328538fdaa1860e
-
SHA1
23414c864044107d60317045800d13be8aef9f21
-
SHA256
9e9ee894fb4bfe9dfa5e20608f0cf0b0da392725737e8f8b3b899771118f8701
-
SHA512
4704e40ce597480579240d642598b01cf0744e57013c3c8b0c8ad94837cf2cd487bf2a49417f88acfb89b75cb733b9b91af8b74a28c4f4a049a13e2a5c4db50f
-
SSDEEP
96:uzVs+ux7srYtLLY1k9o84d12ef7CSTUzzfCwdxCDdCCpdACcdScEZ7ru7f:csz7oYtAYS/bOQZ/jZaSb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0ef4e05d613db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433930601" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2315F3D1-7FC9-11EF-80EF-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000000a38c51a7d538e6d9fee938e96c0d916a4138c188277adc12cbe3c8083470894000000000e8000000002000020000000c72650d3e4438a6e24eb55eae101d82cd952651ee2ed90e1f017b2dbe36482162000000055edf2824a223d3af3913e9cd95c23c7209b710670c22ee1f1b8e623909304b0400000005873ab0ac3f5127f7e72acf5bee57c72a20a96428697c5ff18283326a2eb794b13126867b46599f5aefeb92a565ec23389d54a6d1b7db2b91721e214c45471c1 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2424 iexplore.exe 2424 iexplore.exe 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2064 2424 iexplore.exe 30 PID 2424 wrote to memory of 2064 2424 iexplore.exe 30 PID 2424 wrote to memory of 2064 2424 iexplore.exe 30 PID 2424 wrote to memory of 2064 2424 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\04e825bf8edc6319f328538fdaa1860e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2424 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da723f80c3ba7a909d08a36c5cd080f6
SHA1fe5f6ad744ef17a0ff25363dc62087a4e6837a96
SHA256173466d9c0eefe0608738b803a031186d058c07a1acbeeecd5cd7743750d1414
SHA5126d1ce0ac4c57a5bdd1607e96513f32e75816b017c2d5b9f9db1d7b9ba10b1b04aa8d43972f007753154bd2642293ec10a6cd806bb329bf4ff134671a0e2105a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff49840165589e90e1626410628627bb
SHA13427e3bf50156136b4cab95b03ec8cc5e6168383
SHA25624624fcdfb1d373861b5adef254c17b5d2763c9d377240caf6fdc2ca5d4a207a
SHA5129ca5b35b352e8ae841cf1401ebd56d68481fba30da7ba7d77e215d401f66f80919b91bbdf7740b5c9f31f68a7c2c30bbacd294764289cadc88e1cc71742d501b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4107babb9687da9876ad0dfae053edf
SHA1e871855b618b87105bd119955c7bcc8a7b52a62c
SHA2561561c3a17489a5602e8b582585741d849d7a6efa8c51c7f1c1a34aa28835e99a
SHA512f4814fe2fac8c821f6d37efbf6f0925b3751d50560ee60ac7cea30f253df8e59d12b64cd214e9920f8c549904deecbbf84ffd5f1ec6479a2fe7b3ce5f5b443f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfdf9e0ff7d678405ef16d349ac14aa2
SHA1463a2754a1a26742b4221b1c10878cfa0bfc6d82
SHA256f6a9861e64c984f3fe63d55917e4c8b15aa42e65eb3472ddd3cd65687ac1c925
SHA512d4c6a093b9f81a9a4ba71cfc2482db08c879d3201f4b0ffccab07e91bc7fda9e4bf33bdf2e9abae2e31cf07cd12a2c47c20c94b947b01a5a1459569aef294010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51864c96e6a4c1f8211697e1be6751a22
SHA104aeed30308d59a8cc58b57db3c3e10bece04797
SHA2568786250a3191fc350f0262c8df5f06cc34005d08053f73f5256880c4c86a0a40
SHA5125d7f6f085818faf364c49d7ef08578e260c5093d4be0a589ba569930b95383d1f4a48d363372ec528f4b85aab5751abe568f82234cfabaa6d66e88ac43d81fbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8aa17b9f13405cf3379f6f74cd3ad6b
SHA1a8f22f1a6b6b424a6f2d306bdd38eba41edd3f56
SHA256ca1638686a9b67225aebaa8b7ab0ec7df7f9e5424c927ba9013b219d16e82844
SHA5123de76bdf620eeb4db1ac6406ecb31edbb858aba8b9932417538e2fe28f63db3db7dc924ac51ca1cd5f585cb16a7b7a7902fc140aa7407bbec7336bca0e558cf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5242b11cdf0ac2f2d2cf7cfe8742a3684
SHA161a182c7beb3d056e0869327ca2930e4fb0f81ee
SHA256f510ad7d4c8cf1b76e364887454fedd03b67319e77db6e4a202c5798d052b996
SHA5125dc4ca0bf3b9abbe499a291a2bcc32f938d9dc87061c952e54abfa8c1b8ea01b9056e1bcacb187b416b118f8756ca64144de5e96e85b43d58754d6e21c8c2f2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500129a5baec1607075f48a612004a315
SHA15b845d86e92009aaa3597f460717159a81040eb9
SHA2568189470cb489c372af4c44a2f826a2dc4447af044d58d4ce53c1f4f7932fd503
SHA5123a9a580c5c7deec62378d95889007e8bae26ae2a91cc577c3b7ddca9609781a06be238639335709a088b2ed779a6c3ebb596088c845a7b5d6f6242df932a2993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad2a47d10b04ab4fa0c43fad738d9723
SHA19e489c9c84ef4aad4361244e9e58c130940af464
SHA25658b9f80e58bcd99627c1e4252723596b4cb58e8a2f2cd4cf16f7f5601f4f9ba8
SHA5122fb624a44bebaef434c0d095f77b12db43faee111f35ecce8096ae291c66c4f7407e2b0c00b7adce676b933b78e153f36394f8edbd477315b9e241f887f8e6e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501085258c3ad1906fa6b60eebba5a53f
SHA15c6def0983ec23c4527bb4e7f018e393f2f80df5
SHA2569af35e2562364aa6ba30c42dafa757099c2c48e670ff2ac45079630b92240945
SHA512f3c19e8071252279509d846ea82800effeae465194e2cc882ee75e8687151a107e0d2f962d2bd3adf48b263b8bc4442738e05f0b0071e1846dcf2ab146d3bb1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5461cda3abb4894eba2f4640528ce56ce
SHA11a4b1ea2a5cc1a92f8bee987d89b8048acec8309
SHA2563d2b12eb153faf834f6107d4d0f1c85aa6309f9fd2e22a910c5bf6fc32318735
SHA512789acb9696b66f46055d6c0571b3e38931ec19fb122642563df4a6d4172474395be8f4cd7ad76838dbb3c718240696783367beb527c7cab449029779afb42d72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c6f39d03f4d4f09ebbeaa03c6f76c20
SHA1ba23f7e15b044214101fd6fbec1c283360bc768d
SHA2562453524690c705aa6c309339d92baeffeedbb3cb7c4c69c309c6afa7aa783818
SHA512b900800089cf6c936b733c68f5af07bd347b84d2273f8becf8555ebf4eae89117a7b27a1163694d5b5edc66d3f29420cab8324f87180ae3084efdae421de7176
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c366f59dd630db79e2faf6fcfe8df82d
SHA1502757742278860e2beddfd0db546889f84c3a0d
SHA2568edbb751f5f414e0e283155209e04663c6b9938f45c8d49862537f184134fe62
SHA512d2d1d0473f1540012c63715d429109b1e2736225752e2068a18e56b93dfbfa4a9e3ee2e6a8ea2d0934f10badbd79c58700f9cfc77fd0f4fc2f4baec2981d6a09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cc6cdcf59e4df7236d5441fae216506
SHA12a6fcd51999891a8a803114281c8475f803f77b7
SHA2561692f3bfb0f60e31ca416d92e95d25e641d96ac990f80df7b75d1aa64602ecb1
SHA512fc4aaa76a8e2e1389d8e793778252a4027f82090689de992c22fae35789e77e93ba0ab6e430399abcf19f52430e967d19cda3f3772c2810c0e47eee2e187bd44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb38797251376624c1938fd2c01fee44
SHA1fbe806aa2b43df9762054e5fda66eb790336ea96
SHA2567066584d8a6b7d8c26928f46da40045e327d9222c7d38aeb2d7a7b3c0ab48d1a
SHA5122ec6de0641922d4b0c53c4d2af566f481006b7f44d3399555d63bb55dcef5484d282a9f8ed1ede4dcc274ddee00a086e00f6ae5d65344a217d99102b24448b4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548eb5a7ce5b8ce5a59930df53159c6bf
SHA1fe5969518c938ad925184fbc7cc606d33ea73be4
SHA256eb8353b46e52a38cb1d34ce4f4e158adde566f2f281f16eda77762c23efa5c83
SHA5127d11048685718dfe54f954ad3ba0c14ac376ef3631ffbe7cca11995265b1a4455b7af27e849cabbc0d60c0a38e4accd2aca6ab1a1c6b104a1fa2a863b4dcb7e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d669d9a57d7ae6f500116289daebfc2
SHA1de936a4c6339a39d359e5723e90acdc5f13e4782
SHA2561034e0b2083814af48e5b67a83e5eddb75da5e51480f64e83b8224265dd3d5c1
SHA512e9b555b98c90a8c22ea7d8f0d82edddd817287bdfaadc9251c9ce59718d1848921e58d1161742392ddc1e7230b499d236b590c44faff0b36e9eee44301ac8cc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee6830216ccbd309fd0c6d6ee5b4a544
SHA1fd797f758a428337c14216f7d25cef5a4ae0327e
SHA2562b032843caf946f3c8ab4cf1358503c572bbfa789b887f25adea0c8bed02faf3
SHA5120cead0cd08274095678e5f72acf9c10e54421d6cafb6f5c9a984d087dba8541f82d5ecd742ebfbfeae00465a07035d03475e2629f1c92277d04139e1d2605a57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531fee248296a76b79e854e2cc96befb3
SHA16e7cd3ae0b7068608a996f29825aae3272df155b
SHA256679386e9be99a0c3e21a55338d6bbb1bc71aa627e6d7917fcc5b1eacce186d5b
SHA512cdd4058b0a4e24620dbca93b3d0f3fead9faf771b456457998bca7be8a686781f1298bd998ba51fad523e6b7b72a73395cca8b940c2b4c2470ee722745e1aa96
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b