Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 15:44
Static task
static1
Behavioral task
behavioral1
Sample
066478e8e5f048737c3ede41e5578f88_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
066478e8e5f048737c3ede41e5578f88_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
066478e8e5f048737c3ede41e5578f88_JaffaCakes118.html
-
Size
13KB
-
MD5
066478e8e5f048737c3ede41e5578f88
-
SHA1
6018b43ad225f78f4101fd24e23f1e600a629ed7
-
SHA256
be94b2e300f4b3c68547e0a37cd50aab18b8265c4964bb27fba98ad5b44ff5fa
-
SHA512
725830d1fde231d3ec023a692034859a55ca1e9e3429fa479e5f5df06eae60eecd71b44d0714a693c4cbc9cc21e17d0f7cab81a1d8ae01dfe3b57c3885290fb6
-
SSDEEP
384:VwXcIjbeKpg3kuBXlKZv/6FvatRyFBl0mmFd:VwtfQku32ow2BlRmFd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000001c25a4288bd1023b45a5c682911b83fa37d788b3d550ffe9f0ab5bc48b437236000000000e8000000002000020000000f542f19efacef9009966134eb05b6484bdfdd6048b87891c4e1b913a7a7c55ad200000006806b01377191df095dba03e928c326887c90d9d7f0648f915c5481fee773de5400000008bd721ec09a98dffa31d3e72ff769084307aded3b2c6a8c96e96754cf2357c0d027bf5ea79a079eaedd566dc803d72f5f9b55b207df5b71c1c030398b093e94d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0520ef11814db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433959363" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{16D69FF1-800C-11EF-A6EB-D60C98DC526F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE 2536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2536 1984 iexplore.exe 30 PID 1984 wrote to memory of 2536 1984 iexplore.exe 30 PID 1984 wrote to memory of 2536 1984 iexplore.exe 30 PID 1984 wrote to memory of 2536 1984 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\066478e8e5f048737c3ede41e5578f88_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5c7289ec2875fbdd2adacb34057a24a43
SHA127e9b721fd73c904a203e6d4258aed886b709400
SHA256ae40e23f631e50d0962c8e657937e50c27a19816ed9cac83b8e0355b75d43dbb
SHA512a4f44f8cdef76ef5249c2f295217554f600e4b867f4c5b10b09a69a745c661de35cde42da7c4a5606a33ff68ad6b85f0dfc91ee5a570a223585c992b465da778
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527a1d7cbc831a7898a15e5e04cdcbab3
SHA117e677f4033259bc5ab0d2a9931a77497f40df41
SHA2567d653dbca6bc079577f4b9f922c8df0244dff6744c74430357e956c48d6f89f0
SHA51297353ff742ba5cc75fc51107c33c0198087ca784bad82f3cef7b6ad5f9357ef6eaf380de6b77ce63d2c0fed102ea316156600366f700f7f889490f38ec6708f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552842db3ceb5cb2ac00b17c0abaf5433
SHA1069b125672f884adb9db772ed5597131d85c48e1
SHA256501741e260bf750f04b22b273138e0e9eb47f8edcbe56f8ef9ace23429aeed68
SHA512a9194d74d29b5dd4030a93ca6d84765f0ff4d8f78fe295935bfd834636da3ffe9d14fedde29170d5f3d31bde17cd0ba8b1ffbd2f07c84d53b9975c418944aa60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579547112ea724157a70503cc3d50f3a0
SHA116f6b35033f4c35856315c57283f99f5e6349a21
SHA256ff977e35942661f0f74e9c8420b68760ad8f5525e3518844e04cceabbc30d177
SHA51273af610cf7cd41a2efc3b8d60add3358d1d6bec97ff65f5efb484334ca89a9c0ced7a19b1a9e6e9b755a5b7994fd69803f269e32c11c4265fb8a620e6beb76b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55189d647334752bb01a49b331e61ea5d
SHA1ccd01b908af687c7a9e0b5b283315a4848818da6
SHA2563c5a2498b56fe3a8b3a118a8110487e8edb374f0be0f343a2079889d9b656412
SHA51286808234afc5bac223e941035143ffcadc672ba89f7d043b2ef3e84d1985bf2fe0b887c5c69516b70544b45957eecca9371d69edce2739251230cc44b54c0772
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d0214a610858b7e3a28d1bfe1338305
SHA1f8a5dd8cb3309607c3e7a4eae10f286072dbdebf
SHA256778aa63fd11c800ffd5c34fc55b5d16f23047e79ac88d9cffd3cddc2edf2d4bc
SHA512602188fbc7fe85e80a588b330cb0480c523fbbc607008631d61c43075e86a628042d81828bdb341f88f7656391e8e4e558c25f326ae7ca47fc6ae712abb44f25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb764e2955f296f669a667e0475e949a
SHA1fa0d1e930fa1957497cb7944fa748f333e580b6d
SHA256fe5795e737ce9a742fc65f4bc31f224b9f94327d1d36867ebaf135fc3ad89291
SHA5123d8d9d6c65f91bae14b216c89ad3d8d8434d24dc6168be8e134038cd8d1129304f7fa6c9a49ae9cbd358e166306d5ae884eb0f6f017189efe4282fb5b5968b16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b92de22eb8ef0c1d1e4b2a1b181e2962
SHA17e35366e414c6667ade210c6cef26486075915af
SHA2563b87ec099956db6a7ec7b0c259d7207f196ba65404cd7f4f8fd6672dfdc93c3e
SHA5120567c162270c460fdd95b7299b1eb991a43e611f7ccb1aaf48d0f92f366b447371a1ec31a9f8b46f54d0b6d586ddafd8881fffbc777c75d4e1ed359c6ed40205
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f332dfc4e6b9460cfbee22c81706d5e6
SHA1bd16f0d687402f36a0cd77b9e8ff1efa5a20308c
SHA2568a28da2284e91778c9b981a17f40a0303ad9c9e04657dc7808eb427ccce22340
SHA512c550ef6e3f64e91e794787377bdb13c39497d9b9f523af62693d80131db11c30eaf60d924f7bd1780bd6892929adb12c308c2327e91e20ce62f98887830e252e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bd384aaf1662da3e22ba5c6d545a529
SHA12d97fb13478cacaf489b7cf14f629cbd0a6f17ee
SHA256790c06762c3b6df556f170ced3a930f84eaccddf98b5120951dc915bf068919b
SHA512139bbb3a0d93ff5710a0020f954f96edc306973a0eaae832b012e96bd258293d2311296ba9f30a917061bf7464e318a1b52d3d45bdcab903605e08b77958b499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5854aa0586e8603dfdfac7dec82cfb160
SHA1c9c3d8f57d0dfe7411bc74dd0c75a8c0ff916795
SHA2562e1e34d71b52485e31cd709a4528293f5eda0f54868498358a8f3130ac71d1f3
SHA5127ab7e312c2b1377fcf4bc0ff34b9a9fe5e42916f2067123ea366699ee3d67b5a5cd2cdfc8150bcb6d9dce6831830140fafea3e90355d8123cb743f009f102b7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e020ef4779afc1534751d116049cb7b4
SHA1581d70b82ea2b4c5e83a10371da1d76c2cb0f042
SHA25670d972b707c0614c4d08afadfe57855f14601bfd1a3777444cf00fb6f3990ebb
SHA512331192c1c95cc6692f6c2f306a65a97804555131dff6d2edf0d261f824e30f1c4c88737186b11ec9adabe9cd958b8c90d5325fba057cfa51902c4c86a748fe64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5257bbc304106cfdedfb7dab0fde5621a
SHA108e4378aa02846310391966253d2dee768a6fb01
SHA2568e07bd67ce9a1a2d6f5c67929d168cbe0f15a85289c5fac732549c4388e763e5
SHA51250f7f6a73d9e1531b00950d8b264a64f7570169972163d8ad3a639fcdb2f6ac5049e9cee69832314dbcadd7789cbbfefcc7b291a046ad89f8a74b3d3cfd68f16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502fc1b91a6486776f9e297cf740c67ba
SHA1d56ab2b509f853bff7fc36b9b5c476b75e7f0380
SHA2569f043c9a748239052726362ced5ca9566c5c096da834264ee42dc5dae0c3cfb9
SHA512b872df86d00ebae4397bb01cd1694f6a2283e01a77692a70254ae2867136bc3f56a2dad8d5af593bd3926fa2e04ab066794b713b4a7c65e775ea03d9cdf2f9c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b40d17762f2e7ef856a37fd24f6a028e
SHA184283d5c2c870fa18f514cbc0df15594bee64b01
SHA2564da6e92c092da588243ca0c4fa5d576b3b9b3691a106100d0d1dfda2a0103efe
SHA5129b971fdb9db7573807b879c1e6c54c53ef4a662aa74dc0ff11a5796bac0680c6c32c6d964f551b254267d8548d9f186111051b497b331e3c2980d38aaa6447de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522760d1174dcea32488e38451a50d945
SHA1489d368571b84edc768d713ff24ed5f22f0d2d60
SHA2561306a0190a435ec710a85dc4bead466de7b9c41a8b999bfb04130529f4837edf
SHA5120a43da6332453f6ac56cb22f7c5d72d9489300fd2e28bca7e535122a56e3fba4352a98503586be8943a408c0f96b48745e98882643b0d075238306d0ffb4ba2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d7aa55756a4e0eaf5e7f2f40998c7791
SHA17b8078e15d59c8fa37d52c9e3f82f2accdaafe98
SHA256bc4b741be24671bcc6b309b2e05bf0356f87703a99a8e48b136a0e51a276df65
SHA51216c82e0b4c97beae3db45e175f5b782dbb10f60c50feb9b832afddd1aa8caf2edf85b06502028109754893ad9ab22a421c5e4affe6ebfa81fe66614315fa5411
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b