Analysis
-
max time kernel
139s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 13:34
Static task
static1
Behavioral task
behavioral1
Sample
0603186106372e480d1b2372ba3b42a6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0603186106372e480d1b2372ba3b42a6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0603186106372e480d1b2372ba3b42a6_JaffaCakes118.html
-
Size
26KB
-
MD5
0603186106372e480d1b2372ba3b42a6
-
SHA1
61fa3203a2ab5022d199afe0933d5d97dd3f85a9
-
SHA256
aa4d3bf8d84a04d871748ac95051077f18a515424500aa257a6c7a179c77f919
-
SHA512
44df24325a1b62418c05f40c08c1bee63bbbf361b9d38f81bf230865c40b6373d7f74564ef5216d6e9eda5088cc1117dcd2403601b74f2d3cf56d566b41a1528
-
SSDEEP
384:4+QfPFd9QZBC7mOdMEmBKfpC5IgSnbmFe7AcAp6fykJvAgo0iJAiPd:Zcd9QZBC7mOdMEjpC5I9nC45IP0iJtPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4068a2ae0614db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D79B8AB1-7FF9-11EF-8B05-6E295C7D81A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433951519" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000cb6f25454c3a1af6384ceaa4646c9e9edbcef896169de845fa8ec398b0e5be69000000000e80000000020000200000009b6ada213d192cbf6878131e16db8d5fc3441e6c4ffc5f65e99b8e0266b286352000000083c890f7a8ab9bda77338f57226824973581f3459cd9146254bac6bbbeb93ca240000000897b2448d988815866482a1d0cc798589a633464d6c50253b01a280357fc55383b1f0419b6952ded18a35dfad3c09ce6839d03fc58d984c766b4ce99b25c4bed iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2828 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2828 iexplore.exe 2828 iexplore.exe 288 IEXPLORE.EXE 288 IEXPLORE.EXE 288 IEXPLORE.EXE 288 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2828 wrote to memory of 288 2828 iexplore.exe 28 PID 2828 wrote to memory of 288 2828 iexplore.exe 28 PID 2828 wrote to memory of 288 2828 iexplore.exe 28 PID 2828 wrote to memory of 288 2828 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0603186106372e480d1b2372ba3b42a6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2828 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548cb0694165e030840de44c1852a801e
SHA1ee57def1f5bbd049f9d0d1a5f4407f722dbff229
SHA256b12cc5cf0900acacb3bb2c28075c39ba9212655d33a33ee2bdc5a16d96e3ccf6
SHA5123e8c0fb3a81deb315a2abc0f593e2618eb74b05b597548bcc1233aade09bc9255fff5b3dccc82257b533ee24e15f64b575f10605adcaaea2e2615ebc3d395108
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503d1504a30eaca69bf125c5ebeb1a9c0
SHA1836d4be6321d46d52cce72c972ed37db73a6c61c
SHA2563698646630591bbeb727162497e2c9f8ac2f26125af76988f0eaaa2855365fe0
SHA51255ff49a565bfead88239e64d1315101082902753786a466d97d707bbc514fb40cb7b403dd39a45e7e35c3663300fd819a3a45aeae706fbf33afa213cb8a2f308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5254c2463f164eabf758de25ab6b2e426
SHA166c7a20462595fbf41d3ab5e0e9d2b8b1cf2ba28
SHA256b15554cf19d500103cb7bb768611aa6c4c0e2834cd02bba4f219b88239d7c3d3
SHA51238ad5a3898a66065e6672a954a4d7b6252a93f0e76d3ef594e691fb7ecf8cc751ef0163bdeb3877406457a16b094521976c1a0fe106689711b2450c14faa17fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e93b519d3a18cda4543c5943541aac3
SHA16d9d5ff3261f7e7bc905d659dea5e57838c43a66
SHA25649aecc6d3ebd3fc37e3074c8d819847a8bfeea0cb54e86d8f6fc9fd6a02b9789
SHA512fb52538dd4cf689b67eceaff60c899aacec550c6ebc9672852c972e85ec8028382d97d3c11fb13f26e00680ccf5c6849709ad62a232f4de7db7bd1677f30224c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54de0cdd2bb6e145c4477dcc540d1703a
SHA17deb4d0c766cda06bb7678dd8acc6b4148c034ee
SHA2564a2a3f66b037351bde6d2eb2a78e09ac215939001feb299f11542f30bc445a9c
SHA512ba7c33678e5350041f2b2309a199c06742fadf0f0c628b7c8ca1bb5d8b171c1693ae7241daca5182a2d7667c1742c74c2d06b0f16595609b8b371727f26588d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597f4ca7a9d251f5c12c9f3cd2c226fe5
SHA131b0d37df6bdc6dbb46bcde4e8df1ff13a8ba0ac
SHA25689f09dc08ceffac3f0c3c1ff22bfa29fbacd3b23831b8afe2c6e4192f41f9b1d
SHA51254ff486c7350ec75958e25d9cba1cc80dbb8887c5faee2205d91c37e44332eb489320ca89fc855dca6886ac845cb22c29250442ef48f9a4d6d3015e25c293b9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dd00e464436a814796efb2472f58bbc
SHA148c73a0ea82d5fefd35e1f707253d1007102cfa4
SHA256dd9b952012a948953dcfe9b2312d71adab01e493d47ac7077aeb0cca8c38d008
SHA5128c7080fc6961bcd640503d94788bae9a3da120e070c63d6396cd69adeecab023cad191bf2f327fe8d1d02600fab8ea3c7d128996c8f62ad77624a2ef570490cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f3e5e089064d68aef9d419713c81560
SHA15b28b5cab04edd8e70ea19e55a632c6ce6cced2e
SHA25658455f6de4fb66a4aadc3e0e9285558443e4f0f2e9287405cf37b1d36daecff4
SHA512ea0259e1d20e60b218618df7fbc9c767fa73f0d9e4e43c0353665d0d0e559d9c3c9513767bf9ab6704ce19986a7adec3b282fdcfa30d1498941fdd794395202f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5039cdc8bc47bf6de772b9925a9209667
SHA126f0ff77ea0b6c440ffdad54fc84a7ac7fc0bf65
SHA256473c08c5e8acccaad81419db60ae3cc8ab1d596c286b585ac37df32966e9e688
SHA512345289b607d06bb4f68df5e17364b1bbcbc09df569510fc1d3e3006ba132d3ec4117734ab0ccfeaac657aa3ae077ceb882b2c439ed00c596393fd2fcac50eb7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bfbda41ff908531d56b84acc221bb8c
SHA150fa646765ea90a6d63a4fcc86843452055b666f
SHA256b858bb65df4108d80b6f0157af7a40652d3b1863fa03472f97d8abd33ab7499c
SHA51241a51e60c3449c4b622388ac0bc35b9eedc3094d6b312f3f21c0edfcc0ef44682a64cc9b5886394ecd86fd33f07883426e34edb61daf4fa954ad085930eedeb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50517aabe9d8644afb774a79900e42780
SHA19fee21e584a4cd76339a0329b08aa2961d1f8914
SHA2566c64e5f0fa1f15994bf9a6e01188cef6b72fc5ce77131029ce1febdeea64e7e2
SHA51231856a94c0aeb964572cea81e39671d052f0d4c02da8c63db158c94c9b61f7f9f4b5326f74273e58c7667c39feaa4c8e4588cb30de1ac4858615acd1bf41a305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57747747a75bd2693786ae3387027f6f8
SHA1ce286810f8522039df53344c9fb4be19eb561700
SHA256269697f735770edd366541016556bf43fa556dd7e635f11ae8a6476be58b4648
SHA5129b6d4be18448768ee4f58ac2a7612fa8c12f29738dd560404d108ed59d4a6e478add1d4775eccb207a88cc2fa99dc0f87725cfa4d600eab115b044c4f8d8e21d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b2b5b3c80fe9ef0c4c7fb66b006b60e
SHA12ec9a8925ff2fc789c2939c4fb4987399f964af5
SHA256347126502b42a3d745f442a6e96451a2bdbb3d6c4523b3b00ffd37af4444c53b
SHA5129da0236a2f269e3d1719d6ea1544a3abb0fa681777fbd6c0057549229181d519f237470791f46cc330a0934d5e9f7e7a0ade43ecfb5d28fbc28b161be684e159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5214321e8e98af7a4a7fe409b87a17aa6
SHA16902f9d1e0dd5babcfa638b071a65cf1ef7cedf2
SHA256967f627f393be2f2375748277e54aae33e9e6d83018f7108abcdfa677db37b4a
SHA5123b8fca92943f7d70e842dc60c048c8245a89cdadd210cd0b3c551b3d6424a58d42bc33623e60b319adce16c6ce831fb9baa26e2ad7b8cc0e9c0aab7e2992773e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5850e4d5dc5a1d39260ddefb359a665cd
SHA14d5ce8a578865955e4f0c62acde23e0b929a08f9
SHA256df3898c353109243c989df4e6e5e6fd9b00aadc4f85f42f83029623a110a5cc3
SHA512c9d5e96252a129fe4f8bb7c61679410ab644e25b481210ed3694497e3041c65e40be72cd7810b7d9004ae0d8bfcb00efbd1093994fa269966e78bef5fb149b62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d81d6eef568ef1980673db86db8b9bdb
SHA151a57d8befa678f211f6017ee9fdd4fec27700fc
SHA256b41057acc51c11c6c7bdfa63bfcd5f551cd9b318b721d1bf93553244cd17ebf8
SHA512c7d78ae0f9bac363a7ac740d350e71cb5bae4ccdfdaaf9f0037040caccdbd5bfe51ffcb3585ccbc707e1188885fb656564e2ca09b1f62319d5426d82f1b829de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b13604175203e4cd357f3ab30a4cab5
SHA1575cb1b4d4c65b094db4f7a6450304b296034dc8
SHA256b923eccaca613635c7b0e6b5b46ac2eb1ebe96e31a2bc314858a7cef552e6c4e
SHA5123eeb2e3f29acda9bfdb3ae0787f126159f0d4a26dc870599079393bf3a297676703244c382127e33c658de2fa4fae1680239480208c40dabb2ea22fad6c9b2ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5855f6fff870d8f54fb14e1bcc0c7721d
SHA13b6f0f1a0b92337b8d30a7b5b6f8ae7b213e5b51
SHA25683404d3a0537f2a13eca2cea74dedc960ca65685a1d80d1d8a105cd74e79ecee
SHA512603aef195453bb59d7f306e4a23cbc134ecb240b94a82f25b9fbf6d41664a23f011187264d89c44d21ad05e7dfca5aab6953f320124403b5d8ba4af5ef840ac8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b