Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 16:56
Static task
static1
Behavioral task
behavioral1
Sample
069e4e7d50dc60fa703cd18303919760_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
069e4e7d50dc60fa703cd18303919760_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
069e4e7d50dc60fa703cd18303919760_JaffaCakes118.html
-
Size
139KB
-
MD5
069e4e7d50dc60fa703cd18303919760
-
SHA1
882c21468a6f66aaf53b5b3ab8c18f481f34013a
-
SHA256
f14e9df67800df5a2bffcc2778087d292d073f6eaeaa091d01cde4f0b64be743
-
SHA512
50087e9d58bb07551bd1338891266b34a6c8d846833a3672875ed17e4419d62ebce5b9074c5d3a55ec1dc4efae6cd5a8ec27783e5e4dd024ccba250dba94da5f
-
SSDEEP
1536:SE9V/7/UC0RwaiVV5UUmpU9lhiExyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76Eu:SE9t9xyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000deff05d359c981658c45b788ae33b62b40c5adc78a14ee2129124baf128f0316000000000e80000000020000200000000d1478009d85cb803fd277a8b24ba51d5726947d46f443f3e0c86ab8b481209d20000000df24bc85134b7b2ea841ac86a1570adf026e679fc057a9a47d7b7bf504a355494000000028649d8e6a58798d353b1a14c163f0aaa8ffa032a7aa67face29716336e68511c57cee09e4feda27e2d25b024e1e8c88b0bce7b40701569c0028dd48e916e961 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433963690" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0D3BF621-8016-11EF-A6BB-F2DF7204BD4F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80539d252314db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000c9a00f2f59e4649119fb18d2de644c5bee7df02c81eca161b60fc285a620e6f0000000000e800000000200002000000019c72279ef1b13db10c3d2cd59a1c17ced2c6515ceb342035fc5b6c5dad05a90900000001cfb091ca4569ac1b4ef3db4bb6651685f428c5e2b7a00a274024786a2bd67dacdd418922fa063e644da809eeb523dd46c477cba10e0e0d24823da18f6cb4890a65b2137b97379816a0a0534b77dbbb5581d4549a60621fcd4d51f5de9164ae80862f31c4d057e788c8a44ec9c6d950e90dcb7623b10fbd62220c30260aeee99b26c830d7bdba20f3b5a46ab43b9af7540000000d847dbfd84bcd04692007d22cac44ec26b2d3a0dd338812562c6789ce88392afd73e760db9276c78e66183f61e67a0a64ab10c98912a8646a6e9b26840c8a45c iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2256 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2256 iexplore.exe 2256 iexplore.exe 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2240 2256 iexplore.exe 29 PID 2256 wrote to memory of 2240 2256 iexplore.exe 29 PID 2256 wrote to memory of 2240 2256 iexplore.exe 29 PID 2256 wrote to memory of 2240 2256 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\069e4e7d50dc60fa703cd18303919760_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2256 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ad09fb8a6adc1493a99871f3e270ad3
SHA12f649d8cc92b52d1be12809c05bb108552deff6e
SHA2560459382b40d239f6a190d4adbb397f23380bec09a8bce554b65f870bade298bb
SHA512148897935edfc63e1fad10509db093fef256efdcd29d7057d7c8f48b8ba377beff97562213f3b17a0e3192c0d42cff7dcf05f5552a0fa7b7f47822227ba6359a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d1b5b105a88b922fe7c4eb5f803f6ba
SHA10d6c96b000a875d8c4b1dbb102d7d3db5b0042f3
SHA256fc82ec7d0819bab8339964c84c9736e4ab6d767fbd63153eea8041e1c1e7ee45
SHA5127e5fbf1c072fe6c115d9743f506c7b1dd1e02a54c185ef14bb236470b4dd84696213607a5099eed5763be6554a3ab7eda6722aceeadf0baf0806eaeb34d891db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f48f673ab1bbe9afb586fe00bdffbb06
SHA1eed2d95c7cf4db688e0f57e8f48c513aac2721da
SHA256d474b3b34e02a2d5780329d454f96d19b88ebfcd88e4ba1415878bb9d7171d70
SHA51226ff40940f78fc46b95ad89b4e1096763c2dcc6e9b3ba55df92085282a763cdfa56ba031026d0d886b2d77b6dc052cc51959dec0ebb52908277a67dce4872bd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589e7a67d5b421bb07489d5035e980bd6
SHA1e7919a33afa8b11095ac11c707bc1dc03ebafc61
SHA25691b6fc6794b5e96f97ca5ac598d441d860011de748453ca450d7ec1917243e16
SHA512efb85d88e3168d97699d0dd0aa966f8caf130d01c631095aa3d3e1fc6b89029e5be501059ab0538b502d44b3034460a9b8f35e72c481da31d6eb3809c75d3c3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59282d8377590d0a6c933c4b34fa1c646
SHA1958403842d2259490ae42e46b6e75eb0a5bf1b97
SHA2562d165cffba086957ed646c5a48b23ff8b3ef10519cf7b968154775a19443027a
SHA5120203244c114c72aeb2ff53f388d3bacec22ffb63edcc330a85fea7998643f13a4bd36699e8cc81086f7fa7b4292a8f0ddfad62855b18c8e33788df5d0bcee7f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4b2c3c0e1f643359e3db46248d1174e
SHA1fd7918e46a948692fca9a1313d24826b59b71dfa
SHA256a05367dc68aec0c47cff1517aa7813ff015a0d85d830cb80f41db4fd03bc2167
SHA5122732cb07657c87e56115a3d1c6e94e5fd4e49ecdd56cce38a5f96ef2e3d5db49b2111c003db6f33a7e2efaf445ef6ad58625803b64719124d753e24a2266cc70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555a2bcff807764e90b9d932f99513024
SHA1e464867f2c57aa430daf2c092b6da200ca6fd85a
SHA25622b68c21ccf9a3c9f08f62f1be4e7a7f723d195b093a02e3b739a38e538e7659
SHA51216fbad04af78902a875f45a7ba433120e696fc6dea657e399d58ad603f1e75d713e5557cdf175ce413f5296adf358711ae75d3dae2d39fbfb875b9beb91504e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5debad1e3f299cf55006ca10fd325d2b7
SHA1ff05a0db7dd36d1faba317cfa9470271538bf90a
SHA256254e4b51b5c95c5082b6374fe92c2468b99f2bc83cf7e15cb737cfac169000a5
SHA512cc20a600ce5741952a77c1f503ad5bd047f1f1ac22c5ef20215c6ef8e5b4138a0b83fdd50335a5a5889945bca542b81db279375dd4a675fa571a3498ae5ea306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cfe3e12bf5137d7e93dc355a6291a6e
SHA1b31f8fac6f64a5ce0a633291a8c9cd1e77fb0432
SHA25642f707e6f7042bc2a653ecd75c4cbe9fd636f811d30e914f98e8f30df481fe25
SHA512d757a03aa8e76b493f9aa09295617b70b88880df2d0937558c74314c0794e0c4575d29d1344b820f7c0a8431a08494fe4aab34de93c0837e980257c34f219a9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0b48337aff865fadb0419ca8a217574
SHA163e192fc1679488a967a052bf6bbd45100a863cd
SHA2564e841b2c8ed394efe7f74a9d7733ab6d45b298555e5c5fbf436ce94ecb0f05a7
SHA512a014434f2f7c7b632a1505951298a5ed69e19890f0745db062b14df4f349d6d4330e046c95967967cd5b61bbeb5d7ac9c05715e648faa556db6c0bb8b14ff3a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf5fc80eb3bb4e7962cfc8677fb14f36
SHA1a066490f54e145b52689bc4294235e0591b86601
SHA256967e21568ddf73303abfb930f520770fd97730d6b0055ffd5d2c9a3c35066ece
SHA512fb24f1a4d41d59ddc6496e3a49b39e78de944b639b5134946011a6c8281a8de121b171283fa860998818e8143987c368cc9e2b16f845a758e7eb972860015a06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3e79a69095e3cc9542bda54c04fa8eb
SHA1f85f551637f16a2836e08aded712d69adf449156
SHA25696fe31d400f88612c97f6011261b193690b704b4e29af50ebcc3977c9dbf3efd
SHA512d0cd45eba21a7a8b4c24e035ed47e315ef711f0342dfaef7e615142631d373881e63e109d99b6f4c2a47339d4cb4c424855acc52c9542696e079b8765bddd38e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd70afc3640627eecc0af6ba773a2ede
SHA1fd0cae6a374f7324a43b239c4ab1713ace1daab1
SHA256c75148809540bb4d92fb668799b4e7b84c116355611c0cecd93b9af65a6e4c5b
SHA51283658c600d0f235129886b126fc0f5433705252895e595a0684af94d2916fb28cd7ea5c32991b7e7dbb38a7f9a0307c648349ee19772a8c4520300c72dfa4e15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf20df053952c7a75a9d22485a60cf21
SHA142ef97ca75f6be6fc4cab849969018e1f0b50ddb
SHA25608585dc4a9f283d3364bfa7bb12996aca97f34c5b56369443e34c7420518bfc1
SHA512b04393b32e34639541b9a654cb84429767173aca05b24bc12cb46bcb8712c09f1f2359eeb20fa2b8d5825014908f0724429f9be311114c707edef7a6f39c5ccd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b22de1c4513d7cdd7331fa9f62d4efa
SHA12fdd9663dc63f504087f869c2ff1c6e9092c4324
SHA2568e4bcf5fb2a2da5894d10a8667322f42213a0d203f2de0b4664a3981a505079b
SHA5124aa5f7c34cf884ba9f76568b25d3bf133a242911e001f6c85530e4b3e55dd3efecfbc9db8f013de684cb19a4d75254c2fd4b59ebdbf6fb6b42d828280acc5e70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a32c8f7eb72f8be6b163d3ea7b9c583b
SHA1326bfbe666a0704eb0f3b9bef42c010465adf776
SHA256f3d57aa072e0d35c1e830e163c8285973659c6366d45b30ee12f8f0c489a87dc
SHA512bca9a9d61a28917f9b6e716539938f13f48691c57348f847f1312b771cb59281e23b72ce99eb7bfa77d408c008ecbabe5d1b0e1c503217c040d23318454f039d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52291427306c849b8f6db442a88664c59
SHA195eeb990e28b6edff8941efc21725ae86bd73793
SHA25601f937067073a136026ae57725ee92b27caa44bd3a0af104a7f96e0e366b7378
SHA5129a97ca904c5a56821fcd7131967806193dd4760f930bc4cbcee02b097e2d756c173e1f05e967588967e4e55338497ee9d31aec22cd5a21539480da59b502f098
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b