Analysis
-
max time kernel
71s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 20:40
Static task
static1
Behavioral task
behavioral1
Sample
0757917d01278109896b0a34fc75855e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0757917d01278109896b0a34fc75855e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0757917d01278109896b0a34fc75855e_JaffaCakes118.html
-
Size
9KB
-
MD5
0757917d01278109896b0a34fc75855e
-
SHA1
69c7bb76f607406f4a7d930ae7ab24b489b729db
-
SHA256
61bd4b4ebc10e91139fc501a74772e2975e4b88ad1afb9ba4ec4dc321608c0d8
-
SHA512
ddf0f65eebe4916ce173f101af247a33279afaf6b5aed8ba7d7106cbb214976b3b04121781b93afe7dbc6924c7ef1d58b5f0a14e02dda016431cb76030e5f2c3
-
SSDEEP
96:uzVs+ux7BuLLY1k9o84d12ef7CSTU5zfJi2NF+KyhgV+Uhdphb+h8cqkOJfmeOOJ:csz7BuAYS/tN6pcvqwEgb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433977104" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000006cea6208ed98082c8846022bbb36c926b395219e5c115f8e2faa528569603d1e000000000e8000000002000020000000db8acc9447a0e74d52adb112217749961103f980ef5633c90297ca488bc3c1fd20000000892d63a6b0a7285cfc351ecd01362c0952217d26ff709b70ce8bc844ab45462a4000000004c559821a05d0a132c4971936e8e20095079c6bf2c7cac4eef81356a88492d6d5e0dd36af7e3e9d367efc47f1067f807fb2fe8c76dd54a6d87865fd8a3cafb9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{68C76231-8035-11EF-80EF-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90d2a83e4214db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1592 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1592 iexplore.exe 1592 iexplore.exe 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1592 wrote to memory of 2064 1592 iexplore.exe 30 PID 1592 wrote to memory of 2064 1592 iexplore.exe 30 PID 1592 wrote to memory of 2064 1592 iexplore.exe 30 PID 1592 wrote to memory of 2064 1592 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0757917d01278109896b0a34fc75855e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1592 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dc9bcbc3491507621d2b6da34f3411b
SHA1089096c98b0bce05a10bc028868508e199528d06
SHA2562a316be2a21e229378612e95217c4e0e0090bec875f082f3d8054c95b80894f8
SHA512215e23b3d43c987d5e56311ec6be62946f512b19c9c265ae27b9ccc7f785517bf7666131b3480ad44d729a9e3151b6e7ee1016432f5dd768c42be065af556ad5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c43feec594f8ee82bdc5b7a30e1b112b
SHA1dc1be0c901202a3f68c744c93ec5a4a4eb21fc19
SHA2569e82f6ef5235d42f5ced7bce10f3f37212d84bd49fd625fd4ad5726dc0c234e5
SHA51283e6db8ebeb9df20a259c5eaee5ee31755be926d32c8a001c41a9ba1e35329ab8b6474a2466cca2e43e80cb180b2b7f87df3550d5f92bc71d9f81ab99df87013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5497a2d2c8a0b816ac81813d228618a2e
SHA1ceea897e4f4c7c2e1d5e8d9149bb6ae7eb33a7a6
SHA256ffef63153ac0903a532a95f336fdf357bb9c6f525981ee8441db1e5b2f0ed26b
SHA512956f985ba023c4c1d4bf37152746b2d69c750d28b936491714cf1b24f26209b7a3fea43e8c430e1d5200214e0e0d4cb26804def303f7b860d0e461450569b22a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da5fddf55074edc1aed4981b6f494b3a
SHA1f80036f6869fc122ba3b003fd51d32db9c4abb60
SHA256a83404c8e20aa5b6f3dd26d165908b7664da36f4ee1c30cf4d8c90a197054e97
SHA512eb3567d31bc29ae55c35cad1181bdb12e036d4af39b8ecf9e7184d1668fe24db8148a1601a7884251d83e5eaf36f20af43f8baeae2800a14b09bf7a2903c16dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f27690b56190376c0978694f8b4695c
SHA19a1fc6c08af1389f21e5d6704e23394efcbab17f
SHA25648098ac352cc0e14e5ae60c0d0ba3636505689f7170b78f1546ea3a42fb20239
SHA51206c4bd6b855d92a00f39b82484ab4d2e7fa90e619bb6f4cd080e716be1e92c394c17fbc3c4e2b42df18c3535333f5cfb1c044fd035156abe01788c0ca07da633
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c279e6fd6b971d578436183771b8c0d
SHA1e0fdbb3d41f8d87cad7341f037057e33528d5cf4
SHA2568c9ddabb7f17a65e73348c56a075ce1f50bf7b4a779122adc184998e03a5777b
SHA512a9ed9871c066a1818428682330df1ea92905cdfe3a8ad0e0a508c7cb3ae21ed1277f18a395c337a570501c8de1694326b6e25b275dea9637447b688bd739a18f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5002ac844531020bc73ba37f3ca7dafa8
SHA109d2dd6552ede77a68a6d450917a3c1c5281580e
SHA25657f9972929ae8ec55ac4297ee6d0554138a87ac3ebd5955a488638d74ccf8080
SHA5126e5326974df3c5c4018e99b9a6d12aea933683b4b3788913455a03ba6510d7dab9d403f0c67ab4a060d8a2c5f421977cd01ed28b15e46429d504ed6bac393b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4542a6d360720c25aed588cc756c1cc
SHA1988a1fe49b1bd4b7c02311df66681e5063831f83
SHA2562b6df820e7806c6eafe39c6b2bba0776db2ac61dd73c4509169700ccfb91f55a
SHA512a8a93b41c0120afcf84f5802a1a1489afa072bf0a83adbfc38b15ec45206a28b58a36d4b6fb25ec948512825622debbd49755cc20e305775fc11d3478d8ab251
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b80df12d7c32711083b78166e15cd14e
SHA103a48935d6d9e7dd2a57509f43b48d328ec16fe0
SHA256964e4932c8310bcdebc2594925d8739eb70b86927741ee33d65c7cb984726029
SHA512e060cf74938d88581cc3622ec76a10c583f284a632d1f441898a130a6c971103f42ef83cc753b548e099fbf3d14b91b4d579058eb525852b93b5b1fa18583cd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555ad4ba08b21420eda612b83eb7579d5
SHA180eb9c8e0a7453e1efaf9428d605bb4a0088ad42
SHA2565f364d27756dae8cd95c8db16c59f97efed4ddd806ef90465dd01be9f18fbdc2
SHA512386dfd8e2b14eb2a7f06de957e3473bf6be48b72fea0da50d9f0b16bfeecb6fb768f66731c98b1671cea3b99b3c720dc121d846acae4c24dc5ab14ef8f659da1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5234fcc82ff6d8dc6516c280be7d7354f
SHA1518635396b3a621ae021e498404a4e845ef31252
SHA2561b5c4567a4c593740005c49b870e6d7367c49525b7d8a258d450d4608834add1
SHA512d93a7dfcd019ddddd572f93f0a8afff34604479b9972131b44a51332a4b6c802848995853bed5ecb0eb08667f15c5c5758ed485a94a93772a14f88b714bb78bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534a3b3d5173310de377c21455234ff81
SHA1ee75b33312119a147298abb47afc2ff9f16dc1b9
SHA2561a9aac06f9b5dd8a1ec362bbf75d72560c78dcf12323e8a4afbeb0d4c6eb1c5e
SHA512e97839a1a149f99193ca48c6313a34874609d75cfb42f3a0391eafd588bd580992533ab501f63488ec899e4ea1486dd3643682724968f53b1f287b7f75231ece
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce32bcedb9ce6ff2338950e486269bc3
SHA1a4ef6fd244edac60628f59e24123b55ba0cf6564
SHA2560979c10df5f34fadc40f87ec72317a378b8228dd7fa371eb238b4ab141de159c
SHA5129b7b06e614afccd3b6f4258375b838a42f9bdb5ff1dacb48e0293475a9c59c15a632555282e4b1112ac5eddf4cef3fb21f840eb9ace620504048100241551cc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5eb82c3bf63c4490214a2709a705518
SHA16fcfc34817b3c0c4136e81a7499012cdd378938a
SHA256f1e48d3a1b853c7df9a8c61e00389b5dd7c4eb497a6b5da65ab2a497b37e3767
SHA5122dc9907844a9775c329a000220111e2033ec5d6c2d3ad1b11ccce2242bb54bf085ddf58e6e2d712f68eb6cb16fdc41fa9d67ba4007db2b577a8be5854b7016dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57217347487aff871f4b284ec37696e9a
SHA1c5a3af012f8cdde12dd901cacbcdd23a387593fe
SHA2565c71f101ad4aaf9d0451eaa4a0c8ecf1b96ac8d64698daf8ea65edd0ba5f8717
SHA512256f204d9824847918b55af85a9132df7bee58fea26e6da6284cca89a3e7c18ea09d114c2017b5ab6ec49051ee4e87243e7cbd9af6986f66e2543cc2352be140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512abe73a5c19e77cacb796ac578ff261
SHA101f5c5e28045e5b999ad46a7f059d8845b65b51f
SHA25670b6c917cef8d51cf3ff7c3c34ee29302337414cd2b119ec3e9b592daeba5292
SHA512470ffc5925c27380a895f224ee4c58e86bb37e1def5b86c0826b21f62025f1c28d8b3790b1be5e4609e6f8232657295aab03d6e45e221f947644d18f2c3aebd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562630f0b96c1a0efe56a918150b4edf5
SHA16ffbf925fc297937f916d4efd03d3da47baf7f37
SHA256a42e9d568e0897a8a9a90242bfd0b656fd70f44090ef18cb3d2a20c139d4ccb4
SHA5124778d633fbe101007653d0ee97ba744e64eadc18805a210ec7c7e2a5692a3df1926bae2038e7871fd6829ef07b3bb7a10b679b5eba9c19dd3fcd36e823f1ab08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52946f470bca1e6bbf3a469ff74ea789a
SHA141da22bfd5351fef6dcd69655b05131ac91f06ca
SHA2563e2c8158ce50a1aae32fbde5ef0022d429cc2b63f99d0d9881d1bfc351bd6668
SHA51227b15e5a7c16bf6e905f3fc658dbfddab9fea5e951b258424d24c24009e23a5e4cba3303df30c13b8151d219952ee8851c437a373863bc2be872ec014f180164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d700ddc0520c79f9bba773815a47f684
SHA1c7604387a2f80bbdfdbf1e561526baf69c287784
SHA25633e8067a95959014aac60f731479254007c6723abec7362fa1f6e9589e66b166
SHA512ebdd3818cd4628e1902c72f88861faa7d6abdbf5e3e8d7da588dcb399c76792719618267667dda8168fb5ab9e16cbf3f16a01a84fe339edf25d28b86e8ec6494
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b