Analysis
-
max time kernel
133s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:37
Static task
static1
Behavioral task
behavioral1
Sample
0848acdcd84794c177b66003e002000b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0848acdcd84794c177b66003e002000b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0848acdcd84794c177b66003e002000b_JaffaCakes118.html
-
Size
32KB
-
MD5
0848acdcd84794c177b66003e002000b
-
SHA1
3888d937e88b660dafb7b691de685b4824cdcd32
-
SHA256
6b32c95a60c834aea8e788e0a376d00571ced70f4ed76944f32492a242c9f90c
-
SHA512
a256507f359ecd94af4ec7892ca2fcae023cea28ba32d9912f5e7f67080fba9a0aabce36b4b358c18817ee9d0c0a3edb16dbc7abd0c90776415559cc09541d5b
-
SSDEEP
384:RtsWqDi0VuZZuDXRU3OahaOkIIf+6zlKR8axuSGlzj1ph5hjiL/DSFP92ki0LuZo:jzF02AmOahaZ+8aALlXL7ZiL/DSb00Eo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000008d18718097f088333d04109a206b816b840c4df227e8999b182a2feea335f76d000000000e8000000002000020000000c73c6ba6d6e71ed5f922232a6f8efd2eefc4d82b2715db45174d491a1a90c945200000004629186c82fd1acc66209d289e77690f597e88937487c6701cde48191625e6e740000000ce7d06aa54145022b22367a0a9d1f49c1e77e1da30194e7f4b16d3e1b490e1c50ff2ba0cfaffaa1f9a11b2901425fc7d392728861ee5b8165f84a6d742d93ffa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E96C9031-805E-11EF-AF9A-46D787DB8171} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433994928" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0d545c06b14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1972 iexplore.exe 1972 iexplore.exe 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE 2072 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2072 1972 iexplore.exe 30 PID 1972 wrote to memory of 2072 1972 iexplore.exe 30 PID 1972 wrote to memory of 2072 1972 iexplore.exe 30 PID 1972 wrote to memory of 2072 1972 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0848acdcd84794c177b66003e002000b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1972 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fcdf2b84ed6ab94f4c9a6bab6e4392c
SHA1e0dd747250ab7f1f1ec076762aa378fda62213b1
SHA25650e9f660aec5167dd74329faf40f14d3a7baffb70d8f9303258883f3b9c18ae7
SHA512147c147d69b832eaab732ecc59d003c57b1402855587a185ecf010fdf3b43c7a7fdf3e01ff9093210fd1c9bfaa0197b6012b48b5efb706e6766fec8c38f76a47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5879757d4b123af843e9654eb28014702
SHA18300ff14399ac285ad7cc23fb3d40060c73692aa
SHA2560bf407c031b1138cf8eec51cb7b6694a0838de6335166cd74998d415d101a8c5
SHA5124b5c17feb413ab9763ad27c39ff7c9bc7a02118f0aafe92c4c5f4ab193b13f76f80c3d15b624a61b6fbf1292b6fc1f91aa60b80cfaf6a302d2e92899a167f5bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb4f69c2d78a4c7feecf7fc0eff0e61c
SHA1a789fedd663a23acd3910fc32abe3d2c19f99e79
SHA25669579fe7e57419714ba2b074242a8e7e39273c99f9f9b1941a423ef7c1973d5e
SHA51242affda55e5db3a817d7a60e3c9644abdd645e1baecaa175fa38bfad7c82eed10dda567895b7de0cd6c9160f4e633a34f9c5ff0740c23b26b426b95a1205235b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f596c31aa0daa9e2a023a55c303e7999
SHA1fad8d7b28307a961d2bb3ece591bd0feef26be7a
SHA256f29b15ee319ca070a70d453f3e6ca09b0d4f52f216113d8e4eeb463d98712187
SHA51262e092e9cc01d2fb350aa8bbdd49034e29b473b348eb38355d747e158c703a6d735df55917de1a160e8a37551c78b4919f35e33e546f17216045078364eaf1e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf7041cacf2693e4b322665df2b4afbd
SHA1300a80fdb5708135f2b94ee3c304112fc0cbd28c
SHA2567b3695798e0dbdc651fb0d3ae52bf6b365d0cba2c5889e240f9564686c5e5719
SHA5128a92ce843216a6c3b99067d74182f52d36ec5528c4dd0e8622ae62843e615618550f10361d0147ff26ec37ffb2c750aafeb58b5f5a26bab309ec04b02b897ef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e636edeed01ed455b4307ec84475d9a4
SHA14d4c6b5c1706ebc989fb5259023644bdbed9ce70
SHA256fdad320e078919ea768fb4ec55c9f01b071994d01f7e9868d505f11d123fa47e
SHA5121976cd9f19875fd257cf1f776e008ba2534f5a114ce5105d2865e779e7a4b711ac2b8fea87100d39a8faf3ff50ff85c8eefdf4fe970fff05a08e28a21ad6f9b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585f0dba05160bae0a66327ce0a9ade65
SHA1b59166b79aa2d0674372e1d92b9207aa51424e48
SHA256520703b4e9ded0e7398f61bb47552895d02947366e32461e6458bc92e766dd36
SHA512d0c853fb25882198d3da5957eb377bf299305ffe5f1a0e3624c2f064cf3f89de862fb59ee9d134c45086f6f088e43cf11abade666fbee68b7ba551ac65107629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a93d06772f8924fa05e811f034b96b47
SHA17c0998509c53234fb7d03c94333d350e1a45d52a
SHA256cca997c6bb0acf434fcc2278694d2217c7827cfe013841d504e885b389582926
SHA5123289e42aac2362f8300ea4706e5cc49444d95364f87b8109bab20e921648e4edd433dce403fb668fbda3e26a3a9d42e32462b6ed93ff0e4acc24524417a1fbf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfe286e6d4a1994ae073a1945523b559
SHA1483b07bcbdc004cced3c13acd6bcb9ade235da55
SHA25687df2f165ec8b51e8053598deca47f56d70daab13fbaf96795c92e436b8bf48b
SHA51262229d7855a1a33dea421542ff0364b583c1fcc5fd78f3cc30ecc6f398f8e7c746725fda66b2169963b9e403a82d3066ff5fc6bcfa2d994fa3e39f24ac1b6f2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d891bd824b9177211048ee5d1a915b9
SHA1f936a0b30c4c3695da580d1b0439d03c51b61ac6
SHA256558468d712aa3d9bf55853591de867ea775874d08c1869200dd1009c2c5302a5
SHA5127333a09f72294af42ff030abdff549461106259f19f204730bdc4c9fc1825f6adf95b1f261a5f475c6c6bd4494d561018f3ad45193f329d8401d4be95d1a55e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d087b02c75d36d112043a0e3ad627f77
SHA19d631c06777fcaf18dd54ab0264765aaa8d27898
SHA256161f87e54a1d0008f5e3dcda63a051db4f2b2af4b9770b09f524d2df7c43fbf9
SHA512ca9690efb521b60b44a040b11a2417a29bec4e5e6bac9f4a343dd3ee68b761b540df930b4ac28ffe73e2b4d4a89a88b6b5b30099ca1b9ac5342bbbdc2eadfda0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe59a899421dfd2529762560ba8291c8
SHA1279ba6080c936567580b4cce3ac7e64cbc4d2839
SHA256db81ae12c03a6d7f2cf0d4feb0eaec6dc3f17a00bef37a52f3ff4c52a80697b4
SHA51220a56f3d72f74fc052b975af6091d2de5116f0664d75d5d2b37d1f3051f9bf574a8b4dd58f748e23d52d45c5b3e198bedd35fa8b931e6830f52c933d95ee96ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50790855074332a8c1eeb101dafa70f24
SHA1a581fb4985fe1d197ff78e3b188f5a84ef9175ac
SHA256e2926a133353d236c0079310ee1022b21ced71e8ab8a30cdf90262e41cec6546
SHA512b5cd24447ad1945b7ab2ac1c939a603c6d0d6951fe9912b86122b0470b329c864b03daa6261c513162a5037efe35b0f0850d11c7f9b621fa9eeb597245d3f6a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a75222bb76e28f732f42f50ca1649d15
SHA1b4263a14fbfc37172c2bf216b8bd3e68b319cbb1
SHA256ac67fdb6c4d9941d5059233e2eade0a06481466701c56b52c29ffc8a3c919c7c
SHA5124843dc4eece7ff67a61f9eaafa77cbe082e78f2ac00171e32abaaa512c0a7407ce670c50440e8bee50c62b4771c2ff74c25981c22cd30303612f7ae5efa9f2b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543c96d402bb5f3dd1982b05090cddb51
SHA1c9b3bb2237732aedad814e9b7384684007b8d72d
SHA256d062c2708d48a00a057d6992124cc1ffd66ef10cc9b2c9c56fa546d3318514c6
SHA512c8b303f5cc67ff49681155cbc97db6b117477be2df5a034993f5672504f2c4ddfd515d2afb89cb12febab243f9407c944341d29d1f9fc721071a976bc4ef9e75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e5bd8a459762f62083baa2e8c0d9428
SHA159d10781acb0c5c6685050778116fbec2b2e9327
SHA256f50e142758434259e80b458656d9969c015d1528aaa20d5f1409e12dbc538982
SHA512542114e9f808f96a9c155183bba920bcbd66d97231f9d3e6aeb4f7dd8b3be529ec37081ab3c88225e5867faaee5e797811c73e72c6fb3e2da65ca72364b83c12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5997cdfa80f202ce044309e5e5771b5ec
SHA1cf2b2c6187be0d56f6fe17e0c4254c6643f24a69
SHA2561c45b8b40ca6a8fdfbaf3fec99a287d6a84b75b6e0f351a3720d7ff71d578ba6
SHA5120bd5bf9df65a7d6f574143b0ba0234c1517194bc38c3298b8262ecc1f4669036181b8a870d1a3afd20ebd301d6089d3a1d4786e5420a06407baefc5debd5eb3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51789f3fae5a68a10972aaa9bc659effa
SHA13efd8f71b9fc98bbe8b4f82fb16893c88eea1bcf
SHA256d00b2afb7c50d3457a420ed6f539a6e97e5a0e63a3590cc9d8b8c11f8b05efd8
SHA5121ba8a06052cb0ad31ada042e875b86c79d19b7de423d8fb97777b75e2ce876b72a4af8f50336b0a3f79f53813814f8e3452e438482d3e1883d3bb1e97c842c7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56642a4fa9f808c6db45ae1bce324f5f4
SHA17fe24eefa763d9ac6ce3a05c890964e36bc9f715
SHA256cea035a89c904c9f28ff9f8edbae26ffd9e37291755e75e05dfbd3b4dd7d11c3
SHA512ed6bbcfa7556948984eead979481445c4af55942d736c2c28c36aafc880029404fa2ecb3d9c0185da2c5dbb9d1001064a42603e9521814c97b4e47fe74427a98
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b