Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 14:07
Static task
static1
Behavioral task
behavioral1
Sample
06233e2598d3e091827028a1e004f1b1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
06233e2598d3e091827028a1e004f1b1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
06233e2598d3e091827028a1e004f1b1_JaffaCakes118.html
-
Size
9KB
-
MD5
06233e2598d3e091827028a1e004f1b1
-
SHA1
cfa64957f9525bc1ed6dda6cee7d00e6dd82ebe1
-
SHA256
79cf54934e4889afde10215e1e71521014978aebc7efd5af8b3a20d53e5b0abb
-
SHA512
17700bedd9de8aef8029c6ba60361693918ec8154812d314dc58850769ac637729ee0a392c97fcdf002bb09825c204f0b847c78605bfea2b56ae920d2f0d49b0
-
SSDEEP
96:uzVs+ux7uJLLY1k9o84d12ef7CSTUBGT/kPsZpUlVHcEZ7ru7f:csz7uJAYS/0SUPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000d818ec81b2eadc28046a0ee5449e8679bb9010db53a62bcdc1198e32e43b7ccc000000000e8000000002000020000000b7741ea52a30fe099df13c0991efaf400aef3b118ec3e99fea3d2adbe09b919f200000005f830cace052700702c6097c89e30d72e1654efdd86950a2a8caefca7368209a4000000096e6692409a240c28dfe1088d103adf552da1b1abf5614cad3af4adade78a39301036aa78a406f7cf9ff0cd2f6210f27799061a7716318b5b77f3924aaa2c0f2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{821C9A21-7FFE-11EF-9A84-E699F793024F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d07f05590b14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433953522" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2400 iexplore.exe 2400 iexplore.exe 1488 IEXPLORE.EXE 1488 IEXPLORE.EXE 1488 IEXPLORE.EXE 1488 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2400 wrote to memory of 1488 2400 iexplore.exe 30 PID 2400 wrote to memory of 1488 2400 iexplore.exe 30 PID 2400 wrote to memory of 1488 2400 iexplore.exe 30 PID 2400 wrote to memory of 1488 2400 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\06233e2598d3e091827028a1e004f1b1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2400 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53101e2031c1db2af33b782a84d150d02
SHA154d25380dec54e0936430f52a74f26a4998bdf88
SHA2561912e30b4d91cea15b468c6c7a1a87aa9f724c5672ba97f3195b8377ab5c4472
SHA51267236b00b90ef3cf98efb610e4f23903e467d0992430af30ed484df43ab4388e5d229a2090ac1232bde47a5eb7ec0b9d45d58da93bb3883e2877c68a3b930dee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510b21a4506892ddb47f3137e57457070
SHA1786205086d8d9a1f2ff295be3e8349fbd20e6391
SHA2569a8d1c17701be5d54b545eb3eef7cd9274e747faf2404526756c6410fb3b2dda
SHA5125d023f02989f6683297087f8109cbbdb65d77c182c1b31ccd0330ed8dd7f1880130345e85e592ddf152839a7edf9d6fa463720f2c668314ecf09ccb5a3def077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bd623bd9baa07a5c3f986f129a3d4d0
SHA18352ce9a5f0fb843d872639b8a0ac58e9d47d8ee
SHA256674aee573086b122398b28fac9b532c1ce2d88565402878653e44f25ac9ab3f4
SHA5124c347a933a198dd909b2d6722b707d121d2e6825adda85ec28605b4b3179cf9f20a01534e394ffd7575c8e59eb5a8d4ba5229a7948b8d4d7d0a68a6b08d8ed76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556e4f92144e00a30e48462a5446756c6
SHA174a9588cbacd77ea0c2b16e782d9361018962e1d
SHA256a6c66e5f8d514786630922f93b5bc293061d91b26c36bb416f1540b602b0a7a6
SHA5128ff0ab047f68e7653af4fd4b1b1628ed13c5be9aed11afb141dfb1b8d89b13490bace5fbeddff01ef0e3cc5700b6ff1c792791e2abbecfe679acc51bb6c3af71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec48dbbf66d347de2653c7c4707de836
SHA16b8468ae754f71be0b6ef1f4f8ed96790ec00048
SHA2569e3e50bff1255574d4976cc13f96411152e0a2facc2412bb3c6dfa768c7920eb
SHA512493f5f514c4420314b0fe9ba3a0d2db21417cd5421f648092e100a0a2109df27b46243cb22455627d01f07bb694ffd8f19b90432a2989b4997284a178d220ccf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7ff5ff9898a2a794603c6ff71a42a27
SHA18597bdbe103aec7bdefdb569adb92a37647ff396
SHA25615820178ebe470d0973054bc0b1cbe3de3ef3eceb4355583a3685c27c9169d0a
SHA5121f8498c91fba0294d66f9ba16d63f6bcd8481266035ff2e2985bb583d3bc311bd65740f22c19089da4740465e4e267ec26a11c059a8c6019ea0d3d3fb2c23d8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c418932559e7ed7048732b3d800a869b
SHA1f22e535842b57e5f8be59f568de026d561dbcc37
SHA25647987890db6723e86f125e938c08090153842cf4ec6a6fc176a986c077246790
SHA5122481e9d35200585871efec436c6e7265236fb56403c8821a74f51eaadd92e1101be28b765a84c35859b4cc9a467565b3679897ab00904d59de106f52ea36fae2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520595f15394a60b262e1a06f34bf752a
SHA10ffa0e1247db5bd7efa85a2ab05bcfa32ae92919
SHA2561879ca15b2135308f8f66adc21724e57a307e9e0946f73271b1c85e9c1b19e3c
SHA512bc804bacfb96d4616fbfabe4a0f0b1b7b2b7612ed6f9f46bb1f3a52db3c1a76cf9badbe0a7df25bfc1847a0046656caa06922879f7c18b30664febcf342c9713
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5754a0c204f143a90ef899e9ae734148c
SHA191d41bfcf796fea595e1e95e7d3ea32293f25d81
SHA256545492816c01c58c8198b38c9c2dfd49e263e0048cf6fb9dc054f9885deb8dd7
SHA512b124e307bcb257d82957f7786e129661bf2eaa37a90bf2af55fea1beb051a1737621b5d56c12d22bf382629c48a22bb5a61dc429542c8eef72fdd90e67c5a5cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539f665002639c7b6a2658deb89098496
SHA1b51a10f3823810aa0f009eeb2b04905d1825e2d3
SHA256f9c79d0333799577a22e80b41793c2d9ddf83c4abd4217c522e3d838c4129b9a
SHA512cf4c7aa3800f8c29a9897a43bafba7c60c2c82505030fc4672de1b059d343bc7ada7de8e009d38bae1b8baef11200b680e87dffaf6e3af50367cc8d0d1fc1001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5926d5859958255923aa6e284c6b999f9
SHA18e3ac6b3b76870998d6f1214e58cf787bb0bc6ff
SHA2568ef9eb1bdd566d6ac47d235d63f5a0228400ab93fc38b21c6284631080a7aafa
SHA5128425a0e2315bf6aca6c52f25c0b7157881c9a16d0101a3de0e6e14e90dffe853cf9362fa1dabdb91b6233ef87bea96c5b9366e484af6d71e4a85cd5eba199f2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590b2fe9ebf82b8def6b9cf904293f373
SHA1e3192f723236087ad6823c354d03fdd8183e756a
SHA2566064fdb251cc772ce20f5cd727b1d6c104b394fa03e53e5446bade1d461e770d
SHA5120710fa0272778ab42b70137e58884086397276dcde75fb47d209484d2cb73fc77a6b43d3294bba4f85dacfcf795bfa683ffb866f89a63a1ff7cdd3d0839440df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecd660b57ed822a4b57e818177d6ce97
SHA1dcd2aabcb7a5e0edf637e8fb9f1c1ae1a68499ad
SHA256b65ed3231829eb917cf1c15746ea7f84306ceb09dce57d18dc35d3e01aabad4f
SHA512a325530fe224dd0a82a323c0416f9421f6fa119114e71087f0d6e8ec7d9d1fe33ffa811ce9c9d2639b7147ad941f51fce5fd17d15c6f80bc56de72307239ce81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c4f3a2fcc41df26624900b3ab3fc030
SHA1566ef7b62d81309d4124eec37620029f20d7298d
SHA256ab306b75cb77c7b38f1aaf7964a7ccd45111abbf8a5a4c8af56bb10af0480533
SHA5128cc3a27f594af50421823e8f2a6794c75cea533e3449c5a3fbe4eeb75769e9d88351ae2fe23943a8cc4f1c2a9fb04a2555a5e6b5ffda1ae8df0a556e92246d3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d65752ca61f6aa115744923cf87a07e
SHA1d26988cc96cb10e3af500ab7b803cc6d00715dc6
SHA256aaf405e793a89fc6a064d20a23ace2705d5e6a2020f6655969a9c9909cea7cb1
SHA512954c45b807c1151dd757089cd20eba8462df5443294e6c2fc2b155bb0530ff279da5f4140af7e96a2f7f5f00c3bebb529d10e9aa83c472e2d1dcf1b316a89ac9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c82d0522d9dc9253e2e77552520dc2f4
SHA1a77f757048b3f02be2b71e737708fb81b742ebe5
SHA256e1ae6c26aaeef181d3d1659ae3946456376122872c33baabad64f3dc455e54b9
SHA5122f6ebd3e8aea90cd75980bb2ce2a466429cee004c859c0f0ec1dd1f642dab48969df993426a9f04dad0eb8be4439469e12c1386d00e937782ee85291fba39490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c1e762ffa1d7df24901f5bd8228cd4d
SHA161aa9db762fcc3cb2e8c65e1d056668b58408f80
SHA2562bf6550eb14ae31bb71f3d335f29f10bf4b3229c82226c8878bfefec63eddaa0
SHA51220af0836777724a8d98d0999d84a142e2734c525a5b40aa90eb7375079d456f9605eaf999d95c5bb36350e065779d23b1aa2439df12ccdede7a45b9944717fa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d044c76033d3d40c466a46843f4090af
SHA1f356243ad60d1cd5991978a938b5aba9b7a054e5
SHA2564dfa2f2522e2170b4f1c0e3f497100e3601e356dbe307527df327ba2e675bc90
SHA512659503d04ce9f3df3cba65aa9ae2fe87aefc8af7083b2e8581eb328af422b09d2ec477b57d4f7515e44d88ce1fb5417042409fd251dbe87dd7dd2467fcc5b133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc3e580fa5eb3f10662cd23c23f81587
SHA16a5db6a450b4a1271a4e133e4b087a6bd3268969
SHA256f725b4962b2ce1c4d13a0c21ebdefafde4050107e368a346dfa6353e3a422d43
SHA5122486095dd36fbadf277c27de9aef047608be75328f5e04203a97a03b031f70b816c9e52cd92fd8a5e6d4d827348e868ba20c2e2e4885f0313a3434391f4d1803
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b