Analysis
-
max time kernel
81s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 11:26
Static task
static1
Behavioral task
behavioral1
Sample
05a236db77ae8246ea808c1874edca0a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
05a236db77ae8246ea808c1874edca0a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
05a236db77ae8246ea808c1874edca0a_JaffaCakes118.html
-
Size
213KB
-
MD5
05a236db77ae8246ea808c1874edca0a
-
SHA1
e3fb2a65ebe4371192633f213fc42ee93c7152a0
-
SHA256
968314abe2069c433150db03126be12fa45fb0f916c7c062e7937f35ea5be8db
-
SHA512
64e6e123e347f40a40f50c2e028639bf07ad567cdf813bce1855c4e470a0767b819bbdb6b1e0a021abab1141d44c65ace95c0c71cd267dbf2a189cb85e0d2c10
-
SSDEEP
3072:frhB9CyHxX7Be7iAvtLPbAwuBNKifXTJz:zz9VxLY7iAVLTBQJlz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433943868" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{05E79CE1-7FE8-11EF-B6CD-7E918DD97D05} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30a717dbf413db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000008ee69b9c110a41dc11fecb4c69b21648a0a6059e47a60723c8bdb1968202a03000000000e8000000002000020000000be948951eb6594e45300967c62e4a9f3cef26e4e1ddb91b3ab8c87c6c958a25e2000000051eee65963fcd920ba3d620e7ff241f8671136216db1b535376fe89e03c9b0804000000067cb484e2ee06f1ffdb13aeb6bc7423535e9a0e3607c29e956e3cbf319f34d15f122988d9c55f1dbf7c249e7f2635a62303dbcf2141c6b4011688fc5bd105fb1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2140 iexplore.exe 2140 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2732 2140 iexplore.exe 30 PID 2140 wrote to memory of 2732 2140 iexplore.exe 30 PID 2140 wrote to memory of 2732 2140 iexplore.exe 30 PID 2140 wrote to memory of 2732 2140 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\05a236db77ae8246ea808c1874edca0a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b851b441d3845dd396db0a3b64bf819
SHA1889cae02e5653ac6ca9d1e94858a6f53ec07e404
SHA256b4ee0741a9f365a728b6549b44540bc3315d70d4e838f62396f65d81653c767d
SHA512144dd956452b964bcb8a4e5b307ba1975b86803743270ea00e162afbac479f232a78350f410b6b5d7cd1bb0024d318a5fb359ff5cc0f37d6af6919cf414e38c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1d1523073b507697e54db944e986ee8
SHA1925ce2d14460fa56e945561393d61d7c381e51d1
SHA256505b4fb00438e6b50c7af0addb4f4c2bbbba2df6675a8753c5506ed774017392
SHA51236c30dd124e6c1f14179d673783959c1276e7f02fc39f488097c1c07c3100f91bf90979bdb0061fcd108a954b72c3c9f1b2cc909034d55d12df73345219c86cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5755cb26828161c575a85747417f93526
SHA163a83b4befed22c78fabb449ce8609ffbaf8491f
SHA256d3c577794a6705eb0e346c3a9d6e7eae456bf74c08f6501b74d47eca2554f437
SHA5125976cf4c044909d093ca453b8fa9a525119f20f4c0d5e8c6e750dfcc1377a95c4aa96909eb5a76ca13dcfb798352750e825f129cbb75b99be98f965bede576d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c6dc993705df5c7bda9a5e2c6218b52
SHA12f78cef9efa8248fde9c01d58cf94b158b223c94
SHA256a3bad45c3252e7aae807b59dd289e484b9a23a2c7fe4248c0dea4a53629cb065
SHA512ce4ffce7ca536181fd33b9b390ddc55338f6359ab9bbe9dc5c53cc6fe741c1656312084653e14b707dbc65ca2ada33437419519ed64a097c505e473753c73fd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2405a7962987f2d33f53bd30a1f8c94
SHA1eadf0f96cc99252dfa381e99ce0725eb95b5c20b
SHA2568836a033cb9eb9a6b9d2d3fe2c56105bf0ad2289db44405595d692100c2650f8
SHA512b72df213f36e45a6da4a251180bf444a375f56f2f49d456f455a71c9e0db7c66394d08a573f51497fd6fd1b210c5582dd87812b35b8b2dbb09185d3672909db0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fddc70db3a19311ecca56a567755b6a
SHA1a1fe4594485b09df7bfef130482e3de1962965d8
SHA256b40e7c989812d8704f332c656c8752df1241bc7ec2928c86f3b37bffef139f3d
SHA5126574bd2a1ff6ff30e59ab835856007574803ab0686c12f46a1887c29906663ed49c53020e90dafa92d8be29ce105370074dc187fad4ee426a5a58fe5c80035fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d53c52c67fe52f99d8419527f9ec76e
SHA16786d7e09c3d62b6a1ecf028e939c495fd8186d5
SHA256d4856ccf78a06620efb672fba0ce5b51b1021857a7ed8513866d99ab69b6417a
SHA512561cb0ccea00c4bf78ef442f8bf49540b3564576be51fdfb547c4055bed65ce870d02f06cf1c46770bedc556bf4cd4811629bbd4ce5111a8ee0a056f0c015ff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566ed7f4ff864d3716a31d47ed7a39d57
SHA1c94bc711f63f80668f8fa91e6852b0cd168fbc67
SHA2565c7c433c70017cc30dcc9e0a78f187bfed6eb844f36c8fff68a4bf7f3ec45169
SHA512f5b5d1bf13805dc8e079aaf90c090a12e29c65517f48e828a268c442dcb336d03b3484a3aa8aa1c05f0a904833a5f282fc593cde984e13f9a01efc104c6a324b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fad7b8f38631c633d7be68f1cbe35e7
SHA164a5aba7082d65260554bc7584bc5467e7eee685
SHA256422531f6e712b74cadc64f2a384184e155c26a82b1512f2e7953b9ef192edd8b
SHA51206a711c2b135fc459e04fd248a237e6636a21cff4eaa0ec6fc3a7e8dbb912421be74f184399bd158010d70f399813e74173a9b4a0c734529c2c744968b8ed593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc6e0ff2fe87256ca9845a716f87a645
SHA1b13b13d449c8f9bc5c085c0a592daca2c37594f5
SHA256726d537f3777ea0eb7ce30d2a4e9d7720a05268058cc544a653bd52cd65713ef
SHA51258cf7ae1b4a8ce1407858e341eace5d8be678fde399ad41fcc11006f1b5309eb7c244105d46f8bab35dc11e2e0e550c33a7c08b1b6070383a30f32fcc184b572
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598d30b72295853db61be49f7f53082be
SHA181d2583e072b0c828cfb7808114a709052a8da36
SHA2567c22d4696340aea4b730ce00519b996c9c6a08e928dcde6d5f2541cb59bb8729
SHA512ff859f780c0be0515a38f360f4f1aec944326a55d528781128f8ed1245f40dabc33b1d9f189f21edd4de684e66cbf9b3167755d2d7663cd6de6862f5a0f5d588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5223f51116c10650eb9a92814084712ef
SHA14a9da417c4a28df8f47cfe97ed2a881ca72aaa48
SHA256580b2f487ffcf0274af4d454313e1849dcf94a57a68c93c7a0f31015e22a59cd
SHA512db17a2888d3eb77696668ab11c5dcec5e2169406c4ae6a2e75500147bfe5b8a7e8067a2063ba0a70d3d14147ea126e611d7337f2f994b5e9f45eecb4f9f49790
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0ccfdb8d6fef2b4bcc4259472e30cf2
SHA1bcd864bb2fb5d50a0a7f8f2800383af5fe524224
SHA256b34319a00c2b0f3421083a1303286e9189d7aa2f0378cb9fe46fbb21625745bf
SHA5121873882e7797dadbd315c95d5a6ec55aa0ed07def9e2c791aa8b5fe623ccffbf34197eb1eea1562e66633997675e012755da8742c736ab67d9b0ca20352d83d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571229e378e43b51d3518a6a140f139ca
SHA1a0b65e4eab6d289aef9f15edd394db7b43f13d78
SHA256d9b92b5a643a9c8f38afa4282deba98bd15b9c223c59597fffa9edafca16be22
SHA512ceb5336b62dd1d6b573708a63e5a536ee8afd542cbf5d96f941961de2da0ce02972d2ea282930510d9aaa0d20bcace107ee38e5fef7a168528d604695b0a5800
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb7b06b90780535ecc485439e1b62787
SHA133fc8313bbd56c12f3e9799079d2fb6755f7e2b5
SHA2563704618de6d7b27c7fb1efa43140aaf9eb8ab97ed747eab40b719e412bb35af0
SHA5126d6469aeb58536d2ae4bd9494533dd8a37aba50a14e79238d1c294f4740f16fa51923d830a09569994068f92c28ac18097f3c805450f6a21e8affef41ff65230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c752879dfb45fb9d72f19276bca791f1
SHA172d1c18f4c7f066de3ab7a18d4f1c0b88169f48d
SHA256b0f7714be41d60125289784c64952860ba0284d29c13a996995b86db492d8d47
SHA5126d0e7b84a01beb780b06958ac8c822908932fc2cff0a056736cb3f9ab80e4c945d6aa48edb230e9027ab86f9d721deed08f09f140753d93d553234250346e624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3a4736b361f9a0b4988ace5f3148d1f
SHA10c0178ad05bd2cad4b575bbb41980215bf34de7f
SHA2569131be4fa093a9b94ec5a1b4d9c97941262383989b42c8d6d1ae2fee7b08f8c7
SHA51228d275e63619dcb96c9ba33a1734cdfd53c7f5d34642562646575ab316426347c664617a9b3ddf9d6afa5749ba6e4ebc36cb4d17ebbee86e324c6d578c758e09
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b