Analysis
-
max time kernel
123s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 14:14
Static task
static1
Behavioral task
behavioral1
Sample
06298d34a5c096ad6afeb77f27e9a99e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
06298d34a5c096ad6afeb77f27e9a99e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
06298d34a5c096ad6afeb77f27e9a99e_JaffaCakes118.html
-
Size
35KB
-
MD5
06298d34a5c096ad6afeb77f27e9a99e
-
SHA1
c9b0880c2d97b37c568961e3d24e3a1d9c19ea4c
-
SHA256
a14af0c691699447aa2227a8ac3fced2f92aec30546c20253bf8c43e0bc6f913
-
SHA512
baa452bbbecac504b295873c094deb80390bd7de5128be11d68f17a78fd1197c86e7ca5bd3a30e26a65441b4e4ddf5f1c438eef61101ed155672488fd0a2e8dd
-
SSDEEP
384:qSPxplIckt/4q9GTHatHlSq15FfZvNXPVPvXPHr5vlf/Xf1BzePMX90OfD3/pT3R:nPIH7s80gSexLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000007b890d3cb72adb24d0d9a801f11a3ac743d6ea51484a867dcaf5fe95a6d4260d000000000e8000000002000020000000656b90ec34ba57fbea66c2c0ee99a7108cba6eefc8dbed8b7fa62d1fc111a0a220000000fa17edcb0c0218e17ec6849fc818bb148fac4ee9494e43a81da46acc25a93d1f4000000097de8fdb0aec36e021aa8e8e43f7bf7359c5c63e6f526e8f0ea7dca60976c7cf0cc955b82daf07556d40df24b5f546b253aa932b224ffd395304155c20a91c4f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50ce5a750c14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{695FA2B1-7FFF-11EF-AD2E-6E295C7D81A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433953911" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2100 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2100 iexplore.exe 2100 iexplore.exe 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2432 2100 iexplore.exe 30 PID 2100 wrote to memory of 2432 2100 iexplore.exe 30 PID 2100 wrote to memory of 2432 2100 iexplore.exe 30 PID 2100 wrote to memory of 2432 2100 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\06298d34a5c096ad6afeb77f27e9a99e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2100 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561cc3a130500b8c2eb441ea975ce06d5
SHA1e4d44740390b27c773195ee916624c485c04f69b
SHA256926f064456a89c61cbb711f9d8d75052a1c724f3b9d1696911974fa165b8a0d8
SHA5120156b4e62e73ea9c404a6f9d54defe8ec45ee4fb1c929dd6a1cc296013b21d52666056b5114e97874c1dbe7d0901de465b01970b7d290306bdbc494df8d4c048
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5317e6ef99b52b20a3f5e0bd49046898d
SHA1a7c0fc3df254c975afb7941d8773accb709b0835
SHA256c4b3baab8d5470e7585f849b52091fe6223d6eb9bd5e790350d982f93cb24867
SHA51291cfb1c777812c1b8e2e99a531c27b9e872f6780f9bf4c397989e4d71828eeab9bb31e66f8ec871eabaf299999e04c3392133779e32abc1511f32da0e462ef92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528fd011a250f8c435b708440f7062d75
SHA153b196bbda6e1d5f1a55f8fba243a952320b0051
SHA256e86630a8fae61bf746a09ca6e5414a0bc457abdbca6bc895af4cd330800a9ead
SHA51200028947211295551a0815a8a76742f84f6af6c187969eb8a7893e7a625a302183e07d48b62085bfe0c57d7600909ea087bcc9e4d36a430524877fb7d273cc05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5249968fe007341744e8fe61ee1b1fc98
SHA1e0ca4b192e419fb237195fef14fa2c0e1e659805
SHA25637b48a5ac3052605bf5e481896308bb8f089aefbe28eff83a36cb8d2b289e87f
SHA512c9dcf9f1aed508f7e7fb65b14d4de048a973acfa52241214d5419e4f06a2c0bd98f26abc5d5b125440fe90e3eee60eccdf450c7a2cf6457963c2a0fc106b83b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2e536c988f04644e3913d2c35469fa0
SHA10b908918b5f0331a91731c576c626389f75ff81a
SHA256c71bb45dbff782ee1c1a39f2899b096db4b0565f11f997bd8e362382b7d44447
SHA512e7b3f5d741d17864e632ead1691b2be518318238f6d1a975667e4f8917aafa138ea4f8ef0cfd8a707da49ad50f0346151a4e1af410957863a3770c38d3b7c3b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac3f0ddcae1b5058eeac2d6ecad93c83
SHA120e6e41dffad02f447f70b32d5f57f344f1824cd
SHA256641a2b91000698a21b4d854a70abf8993339f77c769ddca76b2a6141ab0701b3
SHA5128dcd3351c5bb409663e243d747c7f62297513909ad083059b0e07e30ec904cf94840c8fbde7b7003f23560c299535656fdc8a93499a2295662cf823060d59adf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a64a0ca910115bb7ef4673fb5a0ce8dc
SHA132db2ca1711ae140df5e02f53f6e01b0f7d5d43b
SHA25687b9bd6965a0102b6205f925625c028f6e3f1d6331f606810a1393951a2daec5
SHA512d560046905930dccd290ff013903a262b0e5a66626cabeb8f8bf9bfdfcfd5fa3c8d75b89d4a6f77b9c07572ab6bfc276879cd29b9c6b3b84c15482dc0056d589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae09f28d156de74f73a6c05a22347145
SHA145373a11d22f6325d845c655d0d3571299e12057
SHA256126922740533e0919008d8e25b794a3661695423c69d60a26e1515df2bceb335
SHA5124fd834f5db6d6c718822fc86972b1445c0bdec88d06e820f2fe3663bf6a24fbb6bff8a99ed5835f93fd3a7cb047b6aa76a2d16cc8e3182feee23e19a39fc70c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ceda99fe1e25dffec948738f06106f1
SHA1df839924262eaf5570167eb5714e151e6e55d9e3
SHA256f44c5a2ca481cad3d9fb7f154253d8d9d8da73e6c4b6622ed65c493c1e587c6d
SHA512237648f34d0fc732aeb08c44779a470f1008a4dad17d29f930693b52d8a3baa4bacd6c4b598a8a1553174a57a466aa063e9097309fbc300b7c96bbfc9a11703c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5656496c81f8a632d7dece3bebcf3b33c
SHA1ff6ea15d9de4712054eae6169ad296b8e41e5e76
SHA2562b046c9388c9f69ac5197c685f2e0baa19659d4f21070b54434a36cf3b2b7b06
SHA512e376abefc6844120e31a1f741f34b10a6572dfb0f588da5be30dedccd86bf84b47ad41bfcb0cbe5df44b64db79474395ff103b226dbe723a5808cb0aed992316
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5557e9a675cdc302a375da8a038f58abb
SHA1273cdae4233b78b007dcbdf6aaf633a4fae8600f
SHA256d70ccdfad3e77868225d4df6f50fb9eed3192589f394d364a14c9243d1d408f9
SHA512d3725eeedc129360780e1496a100a8f4f20cfd58255db81cdbc947b1628339218f4d5e66bc0c41b04530ec9a95ac9ae15713f42835fce9ce5ff22a44c791b0a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54495de7333a733f664284926b9e2212c
SHA131705ee1aec3165501ad7fab0d375c29accedad9
SHA2561a49013b9eeeac9dc6b06bea0f25017015ef78553a573ec0211c38a79066390c
SHA5120555160a322aaf4224484fd21a322888a058afae973184d8d02c82433a23aad784873a18040506243e331603b8ac86dc25c8670b56fd081dd2c41a04cf4b488e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2fb343006f087f1a273fa65941d0bda
SHA1d2ae1c2d66aa6a3b2039574147b51ea2f5907da8
SHA256b33c8f974358feea29a0f339f8d85fa911333757474c62ea3305b3eedeb11c6f
SHA512617580dbbd75ef2127d65f32cc00c61937e835708b733013c648b584e5ea0c1f6765b400b453031c836b689b8a174746586c1a2a684cf995e59c4ef200a0b175
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54149706176b46e06bdda887f210382ed
SHA1e497e61199a1ecc8cd6c04d385ebaf7c0d194bc1
SHA256654d0e6caabcab556dc7f07b0f3bc43c7ce80bc2435db7a9d3271c987a5a7296
SHA512dbed5da64f3e6446ce1c112fd18a6442bf71b0ac371108d8fc50cbf77e96f8e1088a4c2676e1c80e48eb9cc2b8417b64a4780abe1b655b5b276d057c2b4a9c2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5881233ef2192f52cb3dcf360bdadd68d
SHA15e3947392362fa15f70384c236c5dbcaac7ee71e
SHA256585b661bb160c05c706db73bab522c58981613f2e3d84e4100c5616749a37671
SHA5129d300a194575ac6c1fdc76f9a03d8964d11e6a280220f69a46173a4e8d240dc1d45bd7c289bb032b5215f8207a2b2927fe8e6aaeb24d68e7648ca3100fcc4dd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5597c2c4bab654e9b1e74f044bfe70678
SHA1af983939cb2283d6862069cac521aeeccbcb05f3
SHA2566dff93879d15c4d93ad4f0e68f23781d7af2ffee6220a1a71141ae7161d0fdf3
SHA512e79f8e12184103e826e727b72a9b1c79f19faf3a7cee7309a8a90c12f57dfe39949f24ec4f0fa95197daa85c0504c88b47282ad9282ce56f22e1c7db6d3f3961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d88229bac246633621bfcd3d38135af1
SHA1b25fa3e660b975c519cb8634151e7faf34c52e0b
SHA256724c17ef762e700d4328efc097b67e25dcbb340d054b8c943a682632d78dfa58
SHA51254a390cb7ea05024b2bc21bb72ac356b03261a6db537a02af8454a9d590be21058f9432905df528030b64f5cc26900f1da5ef3f83253007760ffeaf9d40b40e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5997e41bce2a6e65f65a7f446ec82b952
SHA15ee6d397980650f5610b841417027aec76f0913c
SHA2569cc994c0144267b83e581fc4d6ed95fc0477c3bfa148bf626337c09201c0d2c6
SHA5121b3a0a0a07a2ed774066c6fa91f55a61f3f49a18f792dba9262ab2388e002eb13443b1d493a7e9680c6fe3bd2399ef0e152f91c409e2f31e1f88ed5903eadd7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0a6af0905f17ccdc1e52c2ebaa1e832
SHA174cc9e4f6bc6c8f9f6fe508be4d3e077eba1d190
SHA2561ee8f8a8c643163c5f55757688b1712b097bd3d99fad5dba8cff4f5db84b9b66
SHA5129e2ca75a8cd54ef06bc9d756d5876e7a94088ab3b6bd6f8334f4f2c36fbe6ce1ef80d7a0b34b396f5315541445be660e53aba5b14be1f32e6df8fdfdf4348227
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b