Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 08:54
Static task
static1
Behavioral task
behavioral1
Sample
0522ecd169e1a035743d1c8c90b73838_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0522ecd169e1a035743d1c8c90b73838_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0522ecd169e1a035743d1c8c90b73838_JaffaCakes118.html
-
Size
9KB
-
MD5
0522ecd169e1a035743d1c8c90b73838
-
SHA1
eecd766dad378560217013523e54d9b843b6971c
-
SHA256
b0f91c96f31ffa0d9a23d0267a0f47cac71ebf1dc9b1cf581ccae1487359f6a1
-
SHA512
7e712085b59dae0e7feda4cf54a5bc16186a94bc75e0a3c271ebaa50ea0bd99a6c816c2bfaeffea3a55f4cdddef67c81266438edf1c03c373c51b5a60e797cac
-
SSDEEP
96:uzVs+ux7EcLLY1k9o84d12ef7CSTUkGT/kwjjhpxlVHcEZ7ru7f:csz7EcAYS/BSxPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 609dafa0df13db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433934746" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CA201A81-7FD2-11EF-B961-D22B03723C32} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000195f84d776b812e1f736d6878c2c0e959adee65e3c0d20565dfea00c18422f21000000000e8000000002000020000000c6282899d56ac0e2c42dca74bb8175b306e6a356c81bd7b7a6c593b0ee5dc6532000000027ca0efdd88eafb7fe5556271714e4ea857e912e86f4df94671665de9f277f9740000000c3ce72c3c22cc0ecb0c0f8a763acd67ab542eadf170ab625ec6c7edf2c68b96c53f8d3de035f19fa43601393370404d038983cfa38dfe6df2aa8b634a73f47ef iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 784 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 784 iexplore.exe 784 iexplore.exe 1588 IEXPLORE.EXE 1588 IEXPLORE.EXE 1588 IEXPLORE.EXE 1588 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 784 wrote to memory of 1588 784 iexplore.exe 31 PID 784 wrote to memory of 1588 784 iexplore.exe 31 PID 784 wrote to memory of 1588 784 iexplore.exe 31 PID 784 wrote to memory of 1588 784 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0522ecd169e1a035743d1c8c90b73838_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:784 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1f64e2af5259e01e08e07bca319bae0
SHA1623e6fe28e8ee69fd429c4e182d76a16b5af4ecd
SHA25666749b5c771a4b878866bd750a2c76e7490f23d24f01632a11e552047f7b99d9
SHA51240f3bedcbcece835577ad878713a5e107a0a7f671f8ec53769121b4e2ae80d959ac8b615bcaab318235ab77976b2ecf940ff83603c056c62600103c9b51feddc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f450d82aa814e357075cf3479fe3b27
SHA15fa3e189a1a6afac7261d45e91307f7881c4b44f
SHA256ed31f3fd0ffd41b18917efd9c49f39d7df2f0c89976d43b1bb4fd84bdbcf4165
SHA5125af0c5374ce85e91653a65c090b5dbf4761a1ad4f0c81bec9aec259e632b5cefb752cba1e1e2f3cf23afac057cca331b92e8118af7a0320eb1fbeebe10b2122f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5503822422eed928887fdf84663e48c85
SHA1a79404845364365e20fe0698d3a0732dd6b2647c
SHA256d5439e32107246d7edd57fe9ea47f3c055c9c9f868be3ebaed34f20abef3bba8
SHA51265ea7becbe19ce7eae9b394b0ba95fef734f309ce88454f0557174b9979eb69cd704bb650b1c19959d5ebb24ff697ca5ae0adf8ed702ab9fc54089e537a318bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55533c26134ca37225920bff55d15f3d2
SHA1f32cb8fc5bc93103ae5c1e20cb10099dbdf0b1b3
SHA25612d90649bfc980e9ef09db4b803000d5a2971a59e44d447c074c39b0cf7c8b9f
SHA512d8ccf72576b0d1ab3a8ae38aa4fa476182fb42c69dc92c0f661933fc4d0b947588f185861f48936b8d5044a4a56f1d67edaaab6243ace4deb7d7d42170520e36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571e7d185b4f6d4ba0414510874ad8abd
SHA15325e73d339a91d9fa99455fdf6e4bb47c1b7d4b
SHA2568503d7cc01eec1363451646f1d164ed10c37cddbe1571f82f35bea46733e114f
SHA5129e9182e30a4a0500f45c0a48f3f375752ec860ff5ae013e3d21bf3a734e21cd9cff688066389e061a7ab585c42e27309e86b52de662fdfb7c48749a3a91e7b28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588ae757d2fb66576498dbe35042f170f
SHA11d9f120c271ac11d8580f1e78cd23010f51ce229
SHA256982da8bbf639a74603b429860a0390a01a63762d42f38cfa0dffe159ac30c88a
SHA512436f79da467fff75c861c6ac9735ad482fc0cb81cb6980c200a374c730abae3ff347643a894bf1c03ad7fedeafcca101ad948605186cd46c3f16e5fd666596f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574361c1eb9319142263b0cd375f09d0d
SHA1c3c75ebbda530cf55bbff204b2fd2ed12482fe9b
SHA2560e4914ddafa97ec61d1eaadbc579ab6f133eedcd323fee17fb46ceef9a949ea7
SHA51214130dddc7c58a1b18801ee972feb7b1c28f7db83b60d459807df0e3060000646533abe4c08894e6777afa4307452e36d09d1e84a1a937056dba19b37a06815c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53317c171e5242467cb98fb730a3eeb73
SHA17189760bc9ff9b082ded1cba90c516aa580b9043
SHA256a58fd2236db8cb4c9184b1f35aaa008476e196a5e417efb3a0e0a05256c75a4f
SHA5121000b340b7abc51705d75b6654bd16808696ff73629f5266d5abddf0145e17ea919db3887a7f924acd2e2ab21f27c4065e05418c382c8f96f9f1efd2fc91dfb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c8090f0b70538d3ec15c8f80dc37c54
SHA1602afc3ac8b41e5d72488eea586392ebcc954d11
SHA25639957eda806fc409e9baec05b978060f057ca9684910504868d69f12e867739f
SHA512fc62d2f2140f3cba1158ff4fdcd5e3fb9a4f75028c83de0db7cad8f59713929502ad9f45b6b02311ade00b17f586ec52133171bc8a58e71eab9f6320676a7fa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5476dc45247351919b178ace07f365fd6
SHA1006437e6f0a366bd96ef29c4b187d5e403be7572
SHA256538c6449560846598e1e22ef2cfe5db94895672b7cefd273ab16989f20fca628
SHA5123dbbb7514c28c21049a45edbcab81ab25b4afa21cd2f826b36f5434ed00790d125a9c786787576420da963892e96cd1268b7b8640b2b5cda838fb20298976269
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cbbd83ad220dde8754ac375a8b4f4df
SHA1ae320d5f4a9aefa123b0c3ebf90fd7cffc4da1c6
SHA2568869f0fd740aca808d79da256be57852bcc51d73eae4e00ba24a9914c58c7c16
SHA51245f949c2a580e9f247c31c65a707276c2fcabe753b78d812d713372af05f40208131911e41214214092b975e8b06714803ee56e47bfe2bad022ba5d045ab731d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56387b121c74c1f63e89413f6ed6e9bdd
SHA19ad4baa8239041da967f61d13f654b156cfd6879
SHA25667ae4ec1f348b8f63397c599e109e3ac1424f92e0661f6bd82afd2f7608f062c
SHA5129dfbe5de07886fe493b9c85fdd62c4b11ab05ddf48330f08d6f98d34a790483de96da7f005d71b6c7023b3049d96b14fdbcb9c3ee80a5f42189e0e28bd9fa679
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6e3260a93585d494ea812ab9d2a2c60
SHA1af844a76eced61b2b890b90a12311f451187cb24
SHA25696452e2d5357b9bb303b4cac38de061692ee651db9b62e130a41b15e31097f20
SHA51286ebee87f552b544076e585cc284cd790347f63ff9ce2c447e4cb53c5e22111f138904b67dbe609a403d09b02cb214eedb64cc6d6d0bba2aa37ee2fb1491d432
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a1a8e4a2a5f7e5d3f78200d884163da
SHA1cf45d93309adaafede4f4f86792480a56225c889
SHA25661a3dc6c618e4903c24151f69c340d00bfad668592b6b0a41e8d9a7926202f9b
SHA5129055f162ca64f07e39b7e024a785181bbff0d8786721dcb1f7063e3a884a07e6fc1a67cd860d2349cebbc67175a98bb0219292054b85b405b8a44733d0b03e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564f98c379fa90cc4f6cdf6bc2ee7494d
SHA113cc611490e5fed1c847ce610c10f6e74fc05fa5
SHA25680b45fccb68bd31fcdd7e233c68fa7a58058b9916531054d60a5c3c7dabca763
SHA512f626966eab9a953b643f26c82e09389184de1efe67c8fd9a8bd548653dcc8d8d50b6bf40050ffa9bbb6c7dc6ba10817a71cac3b6dbe49dfc1d13dd92ec8b39cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583f84f59673d2a93168a0df7227bdd63
SHA1d076f86e24472f3e9908d7f826e3414a8a6e5664
SHA256c32ccb3610948a056b23f3ca063a583a9620649c9f3ffb2d3c9db3fb95f12bff
SHA51200070f7193dbe56570487cea8ffa5022bef9894231cc10889bbf2e1b7dd78ca5c5a18e245b9c4275a1da7f502636d9bbf9edfb4b33f2fa9a4ddbf5312e3a593f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0e1f2421293fd01926068846fc25ec0
SHA193e0fa8909b7f4694694beff86f981f683fffe5b
SHA2564fe6ef723a89fb776afc2c43f214587c269b0c622842bd08765589ff917d0723
SHA51284c0cb086599f6fb03aad26ba824a8a2357867fabaceb4f5742eb2bc511f3251439f96192fe8eb6aea37b4b703f8127b48bfcd524bc799ee379cc40e2721d5e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e07ebcb51d36ed70ae5e1c694e7f55dc
SHA15895096c43eeb80f0ff7f79898e6019c2b6e3962
SHA256c12ac9a033e9b03fce2f70a60b0313322facc945267856192d731f276f824f52
SHA51240152dcf7c3f84a68807355a1985957fb4b5a50e53e99763548e89b922de3b1fc0ba8b93889d8baf447fd2b35246fec66b00dad89bd26de91d77557934c27427
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b