Analysis
-
max time kernel
138s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 22:23
Static task
static1
Behavioral task
behavioral1
Sample
0cb1d7036e5c7a4ab8ff30dae88bafe0_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0cb1d7036e5c7a4ab8ff30dae88bafe0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0cb1d7036e5c7a4ab8ff30dae88bafe0_JaffaCakes118.html
-
Size
10KB
-
MD5
0cb1d7036e5c7a4ab8ff30dae88bafe0
-
SHA1
685be24d55684cdf9d87fa7aa861c57fdbebdaaa
-
SHA256
775fd89f744cf16fd87d0d1740ee9e28f29a1f9613a6a12f0fb97fb6fab5d8d7
-
SHA512
e2222342958c8e81671f0e70231534e691d286eba03e03e2365ac9d049f7f119c838265b6f85bbc52f6fa828ba66f411e6008df8fbab90e1931f2e10429ef559
-
SSDEEP
192:SgUdp+MAVG0tCNyuzxmLsrIJJ6jLyOLHi6V5UPHzI9T9OfspeLvFF3LXhqi6Lvms:SFDNmLsMJJALyOLHzV5UPHzffspeLvXA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434069750" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000000f7902e5df6cb66e813d753f28f114f976a262d6fda11e3358be397c6cd41393000000000e8000000002000020000000fb86db782b3d6db45cc1fd3344dae090ffa82ed5282f0e842b41ac7c2c4f131420000000bf3c1e25a664f53cc113ef0ee3d6eb2985a4e6dd73bd23d8bafcbfc6c63ef1a340000000cfc5b7d20440f84c3c27f8daf5fb295062d982553b79e72e15314503e398d8aadac86f3a0c55c567fbf9e465c9ba3f7af40ce60260a464a1d4101aaa43d997af iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0e84af31915db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1ECD9451-810D-11EF-916E-DECC44E0FF92} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1620 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1620 iexplore.exe 1620 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2852 1620 iexplore.exe 30 PID 1620 wrote to memory of 2852 1620 iexplore.exe 30 PID 1620 wrote to memory of 2852 1620 iexplore.exe 30 PID 1620 wrote to memory of 2852 1620 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0cb1d7036e5c7a4ab8ff30dae88bafe0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1620 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b141d1c7c42f372d460fda0c9c9c710
SHA1c19530b9a7b5bd001ebdb9ba6dac6afbb8f94369
SHA2563b89c65ca52e73d996b128fc19e8765077e24ea0850738f3bfe59705dda3e0ae
SHA512e2e111cd1b6619ddb485757d2450a0b7ed6dfe6e86eb3132815822578515bc436902823e95689bd2f067fafcf2216bcfd28fdcde56119321fd1fd6cbcabeb94d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596731c148ea5bd5f1f493f270d75c442
SHA12d2c0ec3ca2faf3a55aef582c990fa4758b72d18
SHA25658163ad5b6ae97c89e9081ee7f7bb8c15f6221c9fef9c60725cddca250f2779e
SHA51254e093cac5cfae9663adc3c34753e34a53849182dcd16398e8ae79223bf018e058cac6b260a1457f378eea92549bce552e1e49ac4acade987a913f578993f852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545112476296c0202921c8a0d8fac1dda
SHA1c039307adee92fbbb6fa0fdf011bef9d570f6ee1
SHA2560fea9b2e96652344dc7efab2c238c5d4b33c688214b300400c6e0361881bd041
SHA512df3bb7a21018888fe75e011f51697c03f5a9cb5eec51b9e45ab87763a1b621992ced45291e8c3e37e2ae779232ccfa4731fe3d567642e94b11a1bf6b49c12e5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50274bfa0e1f94c1a87cc351998813635
SHA10840eed17a4dd0d20eecea059717232dce6f7476
SHA256ad9d9377f7e74cd1c7b49a9f71d1162428bb143a2829966f3fe28c8cff694f2a
SHA5127cf96f4809c1ff4c6f12ea167c7fc0307390acf31a2da157b95ac3690b5ffa9733ea2a5b127333859a1579b4ece7fc5c2d1033e935057ff3d57d5b4f3e55b035
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd05a096a89e8cbe1c202e8c8d1a2401
SHA13cc0a42d20014125f36ce9042e239c5f4a0263d8
SHA256bdfa3898a4ef071cf225f8247d65303532cbd8c6d5213b71ed2b6e6ce856929e
SHA512c3ef0de32c195dbcdebf9821fdb763a7b1866c32d76d8661f3fcf5d2e2749ec2a0ced0d6bb80aca44edab649f7489d82528779103e83d5212464e29ef2aba95a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad10162ae534bf4034a9cbdb3c04c1f2
SHA1c400771ad016ab43afcc5a3ae2afd1bbebf32ed6
SHA2568d08be7b6682c988cc891a7df2d8ece9bed1af699268d8e04bda4fa947093aeb
SHA51220a1cbd0290e1270578b062b0a519a9792bc94be81d744401ce5965de6211a74ea4bc55d12c5342ad479eb8c975d0f8df4aaeaf85584d38c27648511e5290b2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dde7d22411ee126d23a5bac482dfab1
SHA10622adce7e321e2297d233d15ede1c52d16f9e9e
SHA2563c271783babb8f28d9fc58a10f165ea20049aec754bc6f0261c1e1c2d392f376
SHA512549d7d0f5a8b7a6472ef7d94b2b539944d6867f376e009b0c0db7b5dc133a32cba04343f15602d2cf007b11bbb56ae8e855267049a5071e718f8e168d3b60c2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582783878b28759df35cba7885df958f3
SHA1a1352ad4c32062a1ff82cec2b605259a4db8a9da
SHA25689d27335d0d6ae0299dfb8e51c936c0fc9492015c6225f8760ac14c956a6d93d
SHA512d19e4bbe7b796f3a3c55344fee823abe7e6088a526dc077b57413ad0fc42b23f211fba4053fc7bee0aae96cda6f748fdbcb6bc3a4a12415a2cb4aa109fd6839b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d8c563ddacc014dde042fb44b4c46b6
SHA1b5a4e91658a75f5b41fe9a450757ca6758a03b04
SHA256e34657ad3ec7cdaf404286ee892c6b5e3f34d9c7c73393f5ea22f37723e04d4a
SHA512ed540da89f91585a5d3fabfcf7f171daafed9d2d73d0cec080f95128e0b0169fa3ea7c6395d2994c451558d42de904992cfbd93f8fd2e4baeeca7e36b3181439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5611494ac26e6f958b7fd4ef55a6718d2
SHA10ecdb1e9408f3fa5a4f1186286f14e726082d7c5
SHA256dcb1445b093dc98f3b100f3fbe539e6c3c584e36109f9d76ccafc0427dc573fa
SHA512033a9584c8b4559622555ba582ddd47a6836f33c24e424f6cab746aafb3d56bd4eb19318bd29060b8b19e9393eb76e962ecb3e553e497fd6f52a258eabe1e865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b52a4525db299b06d7b626a40d4dd410
SHA10f275dd49f5d1fa6b4937e2b4850457227b7af41
SHA256eb37a7656a0cdb768059c89e264f26943e68d78a4df39f0221029c554c2ee57f
SHA5120ca7d7150c336aa40a5a72f8406ef5ce9eae5de97a40bbeae56bc26313ebc3bc565939a9a3b9aa882eb3908f7832672dba6e6bd1baedd922a611b7dc6c6f6c3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a32015cd147989facde909425ed331c6
SHA11f45c204fbb2777e399509df88cc0d7a7d901a56
SHA25675cf5184a2bfa8cd1709cfeaff09e7c20f856555591bb4e292cb061ea146fcfe
SHA512ca4f4397a355924959285c3f4bc1381403faf32c139afbf78bec6a310a82ad8ed82b4e2f3dd5f6ebeae821f1fbd7adb06946b565486fa8b2fd7e85b9c493aa2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f588d88b024754248ea9c14e3458cc04
SHA12a19c92493133ff85954cf219f57a20936305335
SHA256094b01724da2b28a16347fcf620dd6732a645404b35ef3b13b7443906196474d
SHA51273fc79ed3826612fd486b383a74c912f8e9c78da364952ea04a5ca47abbb9d6e7712a2d5a78942fa3f0a75bf5ef2ccf1e569d99247320d96f4cea234cc9f96f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511a3f95814a17bcf7d9225d065c5dc80
SHA16ed4360cba313131240016eed44708e1988ca5dc
SHA2560bbf5c1e55486e11c06c79a5c12974b34e7240ae61d92f958132e9ec52f2441c
SHA5122bc5d1da675aa402f383ceeee62b2fc10ab95f29504948ccfe06aa3646597ea038d1c5fae4d7bf0f09b847a2203d3edd059c9267c22757d9469c5920ee0673e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f188cabe08ad78c4115e07102d70b416
SHA1fa86b4133064f71f442e4f370edf9961fc76c271
SHA256d03d79cbc4cbf91d67d8e8426811f9dd519be8e9b9c8870f41032556bdbfc880
SHA51299ae06a7ac56fe2e9630dcaf11afba9e14d3a9aa437b614e4ede6b7bf828949bf5bed918685ee5e54d3b41a1425e4d4872823411a16db353d58918a81f8f2a14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588e9459681bef73fa40072c90ec732c3
SHA1367f4111577d8f0e6bfacba22cdb98a485c88974
SHA25689f38bf23a84a57f90cd609203f5c6ceaf5924b9b9c6cf9bf913b51da91ef6b6
SHA512e448ea972a62c1d5db581bdbf86fd8940b13e8aa272c6876d8e6da45e1dea78d9062085dad4ade4fd4ee30d66fd049f1cf3d51ff3b90ab275c66d0f5c080368d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7c7533015f707ffaeeb4531a57ef1b1
SHA1d3b42902022db7629957a62840b4d9f9b8bff0ae
SHA2560071395acd44cd0e53aa3b8e0050a0c35b26f2fab743f98bb49b4cb5c91f8dad
SHA512db86e01a8b094a59ddbeb8fda11f9d74e9d63fa97d19cbb85b4ab95797464f94d5a38447a9e4818162273483d613d854d4c16af21eaec7d806d0aca054517131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5a2eb9c8d36f6e038d19f447cc66ba0
SHA15fe690528ed6c98a820bf9bafb3c51a2230551fd
SHA25663beb6f1375497fb47abf1ba47e6e6da216c4f112d405e8491663e904290a5a0
SHA5127772817991f36a602185c21e54f7238562271108144e76a441247cd96fe9dbe08bc2dfbca72ac03b60cde490a2201c0d1753fa030519a9ca280768000b84197d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5274a0508a14c51a8fcc8e56ac12939
SHA174ed1f9dc93afe792c5827bb3ff0ef199e8a7c69
SHA2561f4646d621f93a94cb17ca628945f07bc4872207d521c606842d989fa87f2c8c
SHA512dd535d836e608ee1ea1648800f6194adcf4dcc2a709f0b9b1d16bf6d69f7d21e42ae3a3ea1a5ed691b017bd4ad8d5cc563ca6bb38bbee384fc35320ca11a990a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b