Analysis
-
max time kernel
69s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 00:47
Static task
static1
Behavioral task
behavioral1
Sample
081dbb046262795eef1d6d8a09c64d4c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
081dbb046262795eef1d6d8a09c64d4c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
081dbb046262795eef1d6d8a09c64d4c_JaffaCakes118.html
-
Size
4KB
-
MD5
081dbb046262795eef1d6d8a09c64d4c
-
SHA1
f655110477b18b90743d7f023aa3814f97bdcf87
-
SHA256
b3ad04d8ecb70ddc529bdf846571bca6b7ed2814a3df788a07e338be62cc7100
-
SHA512
0ce293baa0b50b51de826532f863dd6bd7aebf4677d6c9fc3b155d65a499f1fd80f389c3d4266da01af155fccb80c2336886c7351eb6f137db4fd745b52cdb64
-
SSDEEP
96:KOwAlJazDZEEEEEEEEALax/43bdCbOQ9JSbL8JJJku:KOwvh43pCCQXSMJJJn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50ce91b86414db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E30D7211-8057-11EF-8FDB-C28ADB222BBA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433991912" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000811ff757903ed7eba0b4496e8160978e1fef9c21b62db3114a1f34f9f501b3e0000000000e800000000200002000000052b0a42d4b882f7d945271908976dca6402f8f070704a6843f68f385898df4d9200000001b2c821b71cf1d57f81b7dd57142484a0e14339deb5653c9ac0e9fdb013ed9004000000006d8e6f20c41c085ba588aef2058cb1d847e42ead2357afa33e545450274607a2ace4c19a883736cbf84787a82a55dc186c0ca926e171883b8ea2c3eaa2c1fd1 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1756 iexplore.exe 1756 iexplore.exe 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1756 wrote to memory of 2064 1756 iexplore.exe 29 PID 1756 wrote to memory of 2064 1756 iexplore.exe 29 PID 1756 wrote to memory of 2064 1756 iexplore.exe 29 PID 1756 wrote to memory of 2064 1756 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\081dbb046262795eef1d6d8a09c64d4c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1756 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5381bc3c2aa2145df285c2a88d70631eb
SHA1aa293ee5bc4ece65325ddc10c3ae0dba9e5ddcd1
SHA256de7219fdc9f9f2ee69ee55bf9febfc6822247f9bfcd9feab8511b263165580ce
SHA5128344ae1e451f7c92327bfcd4d6c4c7ed0b032cf8bc7c960795a0ce8b355f764d2ba32bd21686674a9ee8827101e8abce1c83720b8814936c955285161f45e046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af0174082dabe96861a550a6affb684d
SHA10422ec6c8ce14f474fff0fe040953fd5c4aac645
SHA2565bfa9fe7fc60144ee8f5a57ee02c81c2e1ff1fb21e8e20f5f6ca03dacd7a0c2f
SHA5121cb3eb893c58cd443f258796f536555fad44fd0db137ed3ec85202d140d9612a7b2799fd48127c288ba53fc8206879ccaea6aad8c3067f5df4ec265c071182d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5900e3a3741ab8d8f5763cc2e5c7f3a24
SHA1eb6b61ef5bbbcc55048b77af225cbb7e24e6ff81
SHA25668832c12eee2b4099c404373a7564c633318635ee6a104c881f428e42bd0c20c
SHA512b7280527e722df541151013eb7bb53b79a29330d0d7c643da38dafae722f0b08e93228ba7047e2f8e7d7c0053b487d57b1c0e0c858e718afe9d783cbb2a23287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3618b682da03f314535e127696f56ad
SHA13111a4148481114c79680cfd958eeaeb3fe60d72
SHA25657eaa1b3a9306b48a667021e56fc900206585f4b4e48fe33db3582b2f06febb1
SHA512c9d597e77d07ede263e7a7a0067349d664884dbe6eb7262c1cdaf8306dd91603d18b08624cfbae21f3a6615934c825b168458979d90aaffe0bfcf912667141c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f62f748c02cd7a41620c67b03ba793a3
SHA1e80890727f4532b018bb55c51d892a3f8f86bcaf
SHA256e0a8c659d49d730590a7ccba6f218931b3e69fc669d173bfb6c97e88de4563af
SHA512fd4736bc5d15d7e0e46b568bdb8794d1baa1fc4811267ee13043ea19a6621fd13c382174cbfe4e73511eebdcf390260f3eafd9c812db7f5c9593f13b6c25961a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b269fa00a854f3c2079fb78557ef8bb
SHA12cabfbf8681ec81c451353d05e156100482a0790
SHA25620a97553208b7123edcee720e5f9bc47afd57e47d331a1750359586db4ddb0ef
SHA5127c8d94355eb99975c9c5433f74220626767528c3e8e69810106354b965a33293be5aaa3284d990a97bc0d4476cebaa11b049cc5ca7baa5247e7d3ecc74237daf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59728e9b75622dcb617aeb5abf0202208
SHA1e8e0569e7af8ba02ff59e6964046f45a92c303e7
SHA256a69fcc4620c85a15f5faa9986df38cd08c1f4586f4ceebb549e71e9540add91b
SHA5129c42a37302c6a74d8c4ae4217477a8c804b769c689c08ffc1aabd75215901bd0004bf11b5bbabbd1ec1e6351156a2cf198f3f1b191e1f00864dcd40c0bdc1dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526c99c9f82ef86f97e3321a342d24164
SHA1386e1de98aa70771cf5f2cfa2e580f69fedcb4b3
SHA256d8690a0dc692f5891ed4ab603eaec67c4b019b39d98d7cd7447cf8ae0b3f14df
SHA512e67e0849a7893834a80f750b2d63add612146523c2e460ec3fe0edbdb9d670977afcdf9dd19b44752cd3f99f15912402c519270730b4e910fa9ceab4cf6a877f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5901436e249cafdea8cbb46e33f41b4f9
SHA15740eb1585b02d166985fe0bfd203729d0edb963
SHA256be1e618baae193412b9056d4c5123d19a5c4e912b37ce54f895337a72e8125a1
SHA512adfdc052e808dc3e3c63a767f0d22b1093d856a86791a94093c4eb815a501db6bb80ff6224446a4481308133baabb3d1bb0d1d2397bc1b198e1ea9f08ad593b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e944b36687420b790567435bd2c17fa
SHA184e03333d725296eaf7df1e539b3d856247ef65b
SHA256a638bf0906361b3d21fe2c697dbbafdece329e8c082ef6f8679eb59518b58988
SHA51236c83be89e37b20062f9a13c8e826656a95352138f037a4a338ef0226f96b332bf1ae87ca43c358b524678f36ce075d133b3c6f84d05cc180d120d1990e4c8f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d81ec428f8d100a33801570f3052b1b
SHA178576609190284d790a6338498442018923ee967
SHA25689535e409387e0343f7e6bbb330ea94fc7aae24149a3692a54f660f7877d6b2e
SHA5124a4b181dffe1a5f63d7cd0d94a5b47315ef9a634ae02db63bb93cc0bbbc6682edfab9b0af16b6401858b44941543442f71e14cd3b04cc9becbcadd19c866fb2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5513971280a70f85e2a08887d719e9820
SHA19f059cf9f069498b4ec6e72458346862f36161f3
SHA256c4ea8b101e7bb1ce1a2b31482706a0aa8f6f42086f145ae063447c892ce0ae92
SHA5129d1035549b46b251c923e903ef690854ca2ccec1350050c6ff7391c7c17540c5927df74e51968404363eb99f1b1fbbde2b5fbd997be74a2434fd87cc31ae247c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510eafeba996a73abc03c1435c7067d41
SHA170c285aedb84bd6bf871188da4c0527b5353f994
SHA25603748074c1d6b90ed10600e538a8b5bcdd07c61b1760d7f6f37e32199d6684e4
SHA512698a280386217cc7cb32a98111e8b7d1e331ef3c258cf25249d402e912e4dda965625edee32d513976a65bb291e78cc660338f79b76c6299f2178ae7ca168157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb1153990004226055f730970475c354
SHA146fa0b2f6c708483d7602388f327d1b78debbb56
SHA25656c4daea66e309ffa003a6f89051446163c2f9983139ec598f2c99b84c78ce6d
SHA51262995326c04a5c0b36afc83d26592f48275498b154a878a1da1344ea8066af6eec6ab025e5f6f1430ccb1d39bbc93fb779eefc13aa1704595f0421688e6d05c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535696ef6dcc47dad1e9bb2774945358a
SHA14d26e2ecaecb279b109d90f527d8d119e353defe
SHA2569fe831f7378d2bb98f81df013d05e8e413b78ae2b67f2a4a2c66b0c1ad47e212
SHA512e53e41ea9a22cef329e1969fc54440b46a3d335e248f692233a288fe6b6fea3aa241fe4f368622b8c02714e51ff10d2ebf50c28d2a73e8fe7c8ca476eaf0bd52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ba89c1b8e201d0cf6bc8be7a16acc0a
SHA13e7b547dd0109407aa130eb6db65982a8374529b
SHA256f7da8044953dcd0199b07f81d3ad090a8388ecf445370426bf6dc40313f81662
SHA512510be22109bcbbefe1ff88aecb3c27848afd54a5063177c434c6edf344ca825851182a7ec01a0d4fae7175b942da54d613ba7a49e970a15fb1dfd189c4e4c6b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5353a7346974fa8618316bf86643c39b2
SHA18360601811b6679b12bceb8d8430d2a88266e42e
SHA256abb8c7cf42ebb20a0e7322cf591d2735115861484c9c3f2106ad381652bacf28
SHA5125c69323aba5f33db0907ff3f95d06319907a86b99d439664b2827eaa517aaf82564ce875ed73df93dcdbc9cf7721af30f35bac21caa04b49ae74a413395c8d19
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b