Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 15:36
Static task
static1
Behavioral task
behavioral1
Sample
065e2a598667b735eb9d69df24d099e0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
065e2a598667b735eb9d69df24d099e0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
065e2a598667b735eb9d69df24d099e0_JaffaCakes118.html
-
Size
12KB
-
MD5
065e2a598667b735eb9d69df24d099e0
-
SHA1
eb95ed20b4ee2d6faffb437a98cecfd00f8fdfc8
-
SHA256
38a013d8bb6f382b843d6c3a7a7627adacf8ab9f120d24ecb8b636d110b915c8
-
SHA512
80c7ef550d9081eef864decabad375bdc792f948dc2bfea2558037100d9e30c509ed58f375a71b95051c1f4919ef4ffa3b8ba44a7d89b7e6ea3dde1a610b9cc1
-
SSDEEP
384:EjNIWxMaQv2VTvtsuQGVApzS5QqfNiYxt0+0:I2WxbQv2VTiPGIzS5QqliYxtO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433958850" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0fad1bd1714db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E6E0D7D1-800A-11EF-B9F2-E62D5E492327} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000020d155376f08d978bb76a45c066869410d146956073b338356cff22b034f5485000000000e8000000002000020000000f782fb7c018837fd2c3d189664a6944ff220e657ddaf1414e4229447a0e5f134200000006bc0b88021de0d5c2316b783a7bf82f58b7449f71f9b22623d966e1c5f43ec27400000005b05cfaa7de2621d3d790e12d4ff73ec47a2f2322b35723beda10eaf5e2b76ddeb0cc768bb2760df1fbe45dee35b0e091b53eaace517e187564e97830155848d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2408 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2408 iexplore.exe 2408 iexplore.exe 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2408 wrote to memory of 2420 2408 iexplore.exe 30 PID 2408 wrote to memory of 2420 2408 iexplore.exe 30 PID 2408 wrote to memory of 2420 2408 iexplore.exe 30 PID 2408 wrote to memory of 2420 2408 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\065e2a598667b735eb9d69df24d099e0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5a4dc84b5159581089aaad2eb04ec1215
SHA1d48c0907593026efa7c4302ea819369e95a6ff99
SHA25654be647198a7801c9a78c3e6e3b794e9b42dcb6b4584c7ea9a5c6aec352efd3a
SHA512e8282c149df34727b28f37670f1952d02a7671f01c025069356599c57c975820d64e901379db9fd9e44534c845396571b4f6026a4485c6ee038ee86e66891473
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe1e832055a95966156277e2c8489f1b
SHA1395a415ea2971d44fff29484cbfa9408bbb641bf
SHA256e14edcf14b3d8029ca0470cb9511f6c61330c8db7679f7df2b7f9a84cecced5a
SHA512c0d4293c4a7c6e3925c34a91dc476c3e99646ae3a074a335f536d81280d77ade5a6a6a57b3adb5043e4bcbeb5db374a0a12e0e5a090a1b2bcf3e97160a71d2b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55004a07902520377e42611289f313bf3
SHA1a1a6e054b4eb9adc57ac1591bbecd8782039c624
SHA2565ee83648936e7a5fcd4bcdd291f3d640c3e13d745e56b328baef05ff578f6af0
SHA512e0cad6755e7f076d828c2a7e01cff7c1028178ee72ffed0bfa3e6581acebd58506066518c42204b52ffe26f7d22e3ca260f603288b53c7b2ba46dc965700f781
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5657e16bacf6b726a97139347bd714c3d
SHA17dd7d2d5695dc7bb713922a37987549cd34779d5
SHA25680e67ee53b6841f9578c3f5d4c241aa68e2522c2a96387d38c2056932cac8c39
SHA512a875782ceb8afb4441cd4bf3559a14835292afb6e7e81a463d1e9a9e56359afa0ef36f30987c3c193bb1233f5fedf58753b8e161116b9823687e966ebbc15a03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8faf64626724006a22d2c9d9c993f46
SHA169be557411986f72c8f5b88c8fea25c1e0adef60
SHA256ab6259822f0fa78a169e5d2f7ebd306d24854731963430b091d4a9c07eea8bcc
SHA5129b064d3c9c7016f7237d4ffc56509c8bbbdcb04d7b05296a96cb5c2d70b66bae8127b1975c3fb47687561365f688e12204f0452aa0fd3e7ca0f424350cacaba0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544df104bbc37961402fd8f16fdb5861f
SHA1b203e65615cbeeb767ae31cc85a8d7ea350dd221
SHA2566dd1bbd25ff91eb5e1cb87b1cc6cc0c4c709bb35ef23fe387ee0fd61ad072550
SHA5128d613afd2db4edfd369f8634d7d3e68af1f55f0a345c345dae3894ec2910cc20c9cd448e4e800979df808f24f91c05ae4e3c9cc771f0a47d856722a1c3410bbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e6752079d6226fd5a3f66632103dfff
SHA1d065a4982783cbefea56f3e4e5cc350d41030ffd
SHA2560c200977169d077a607198017a0d300373ccf0c27af82ca540ab3e9ac0a4e897
SHA512e5aaae53fd8982336e43885f9a3192ab40b09a1bdd94298ac6b60e55145dd8a2e7bfcb6220e700c3e1e46a56d22f05b6664831766bad84b6109c6c26afd97d2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503a9a12e652dac50a914f48a6574da55
SHA1994ecab6437c8771d974c663d8af273fb4e52e52
SHA2565e9e9baa1f123cf0774eff8461308de386dff012184ee17fab2d482642ef9def
SHA5127c054665cbbff0110699962d8fe8575182461d9379c08257c205a6b471a46acca357def0392a23c0b7b96bb24d93013082d852d6aedaa32a8ff38ad015f8d573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e3fecd1a098854f2f509fbc6eac420d
SHA157dda7c1d0c841f150da09f14b1ae30b397f3f76
SHA2560fffb196f2084eb3e19c92ef726258c638f7f253f6ea46217012e407ba047387
SHA512a62dc728bbdf81e8c2ab5960ea868c9e7c6ecc97a2566a0ec132513aa3ca7ca5e04f855718428668cf6082eaf1481b7e15e78aeed5c286315f0afd20814b30ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5477cc1b21bc8678af1b2a4b4ee620076
SHA10f874eb7266d47da5ba70000017d94a5cc523556
SHA2568b197d0a025529c01ee8d692b0f214722f876d117b36e7a68415dc84c75e1974
SHA5120bdeb3d516360751e2b519fc8c1d1900b2e294b1405e2cfc338d7c03ed8b563036d8b99860045325463225f0f421242ccea5ea9457cbd1e274a82aa317724eb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f29603a80d412de8bdb96662c34940a
SHA1262f633fb22ae05343c3ab95b1289a79e610979c
SHA25601ab8748081c081f5491d6cc329fc099c270aba9762a716de9e9f0c0744f736a
SHA51269816c839c8b9b87c0e05a63d09d964849a25e707ffc8543194f9a721075e942a20c48fdfe62503209113f76cf7f61709a9073ca45271ebc5763639bca3eca59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58337f83fad01012065c4fca7c2ae075f
SHA1c7e26d56d746c3809ef6122d060aa5f18f3b1899
SHA256273955267b35dd8aff03d9546f3508f8c9a12b7cb1726688fb19cdff81741c62
SHA5129c5195a9645528df0a5af6d97cce6548b0820d1ef24ed524e22679ec8cba13fed3a0ebb9a46fc1b5757bd874ea7de3011de1a6750040bae416376d38e5c7d32f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51df02d78c72735b28f13e9880e73d725
SHA106c94b921a989f953b42b8024462c3fba1b2baff
SHA2566c095a1aa084a5a1feea1b5856900fcfea2a977a3a7cc1bd0375212f8e23ed91
SHA512a0d658caf83e5a40da688a80235811a6a8765d416cc4059cda071ac780f0d25f8c7bb9e7efb8014b58bf4c71d78ca865bda8b79727743425b72d30783bc1b556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0b3fcdd36977215f894768e42b99b48
SHA1f9ffe6413d10fa3e24b1b8db38258a4d2ebdb2c4
SHA256e11670a044b8cd840af0b74dc905e93d65b443e0da3116da2f948fd1d3e379a2
SHA5126c219edd1824d6c3f219fe8bb1cc576f7d9181767d54209248a647f5c9408b4fd1cdf6162c6ac9e43b86aa5a287daa45cc17faed5d5797a533427df59fbe8361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d3a39f7bf864cefe35c53f64cb70a2d
SHA1d93b0ec118d352ccf2efee13c5b6aab504c5ee45
SHA256b13b4f40fb0490c8d35895b76d2c979f801527ef61f1cfe782fac920b372f023
SHA512c07f3d0f527403ab45e2293bd1f8ecde9c1f4a1f899e183cb351390d4f4a4145f44da576bb941ab426b87a9efbd97100320de91ec06255a890335c0a8353c5ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD54f904561d54772d791205429239e4ee1
SHA1c2a18b2543e4fd13559ea8a3192691c25920748d
SHA25687761e9338ba343b2fe44e623213ae0e6dd47ee7b0f361a895855078b9cf3760
SHA51253d95202371d39b2b8a1d010843e08ad4419fc3c4e05fd79cb8a09d94c078b0bb44d3f388c389787c8d5081cd656398ad13367d47273ad7242a93e66982cb45c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b