Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:41
Static task
static1
Behavioral task
behavioral1
Sample
084b9151643668d602a51fc57ea4a913_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
084b9151643668d602a51fc57ea4a913_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
084b9151643668d602a51fc57ea4a913_JaffaCakes118.html
-
Size
12KB
-
MD5
084b9151643668d602a51fc57ea4a913
-
SHA1
fa19c5cf6f8977db79f326974a1bb9298db23ded
-
SHA256
1d4847aa1b2ca2c3a786ee83884dafd83a5a4b3a53975d435b3c9c174b4d96f9
-
SHA512
1408d7d4d2a1e749c9f35ce27dc6466ca29dfe1ea9b21f0ed32760a83f90243b7c37597cf166702912918758438f376cd9266f7a997de071f7e6e94a836f17e6
-
SSDEEP
384:CyiLq3DoaBOuPOEjAigb/0lMz2T7eOwi9o2:CyitNtEjAigbslMOfwQ7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a064f9446c14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433995150" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000935d564780059e6bbd340e9638bf6aab6664c458deff2f4b3c5f9475abb94524000000000e80000000020000200000000e243ea59beca2831653b681f8fa655704ccf2e8d8a70140051daa4c9d4810cd20000000f275bec96ba2e5b7cad3b47d3dd2dbc6c351d444a3b52d0760311138ee3ae435400000001c15d08e435e74e2946eee31b3045ab6bfde619accbe63a40fa40b8caff510da04ec0a51ae503c6630eadf25fd911dc7d4c32b2ee4d1b0663fe499f4e286a19b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6DB0EA31-805F-11EF-946E-F64010A3169C} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 964 iexplore.exe 964 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 964 wrote to memory of 2372 964 iexplore.exe 30 PID 964 wrote to memory of 2372 964 iexplore.exe 30 PID 964 wrote to memory of 2372 964 iexplore.exe 30 PID 964 wrote to memory of 2372 964 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\084b9151643668d602a51fc57ea4a913_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:964 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531e5603fe3b0f3af9d66781437784f08
SHA178668414fcd155c33c5b290d6aeaa3802b455ebb
SHA256693933e992ce810635b1fc6325211067bd27f16bf54c40d68b9a48e189980c34
SHA512934f03fd2b938a2eaa0c6d684841a7df9222cf4620ae28de744dfe51378030e67a4a10cfd55c0f97c43277404a1377876edf57ff10a34e7cd9d3cfe98962681d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5775510069b89ff27d6242f2775a151bd
SHA1af805253366e19ca0f1bed8e45ef72c954ee5e22
SHA256714b4f7abbe02a5a502f25d4cd605e47b8d54d481083150c2aa0257ff9a8bfc5
SHA512c90a2ee63a7d07437b02b923d487a3ceb64fe6950099ba2c29822307ae03a7786183be24263da9af30475dbbbbcbcf530a96122ff7528698af7eb4c8ffddf4c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ae072500570a409d2e2f8a10e99e6c2
SHA1d735d1f7cf6c5d721e132386c944de600af870f6
SHA2562dd931d429cfc8be16d69f6fdae68a11fc690e437086dcd74cf1422d3964a501
SHA512a7f43838aff6305bc84f0aea7659560108c38a4b0c6b002d3f4191a9e71a17a22fa801b95492377ac18fa80b1845aa843a6a51962327f28cbbcdec632a51dc5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c9e66561077ca6ab0376ef062816a65
SHA13ab92e1b3ee2257767246ce27dfea4e3736eeda9
SHA256958b544ff65479917fb9900481c9b2e1d5b250eaf177b3eb2db79ec8f16af5ce
SHA51295e17c16498a4cfd04fdb79a26cd1b458fcad835708abcc0e9cc1a784aac8bbff9fcb5ccbe0d1f145deea9e72c42173f5cec447cebb70874f0c7cbcd0b5af96d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5046a967ad31fae2cc4fe2a13bdc3fac1
SHA1b7fa024abe3878b34851f5da0b724abee9471045
SHA2565a43618ecefd5708ea1e80ce9b022e2dcbeadd8c8a49587f0aa39db8aa874648
SHA512458f1b9d12284c88e474be6f5a84295df253ac055a2223e1a4a471715364e94f9d39241ee068761e2ea3792a3a190f24703458e1d418bbf8ed883f8fef30f480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51abd4b6975054509a5525a13a7659353
SHA18df15174a8fd4e49188cde6cc328efd421f96438
SHA256320d30667535d5f29309cc4c533c1a99ee941febd06a8c5052ce7717dc8a1b97
SHA512e99bae95b71372fd1ca653e26e42a87053f864bb84c7e22aef094e20ed4150d64cd31976d6d2a81248d255ac8d41817fbc73195180f63fa68caf6aa6c8e3bf9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0ecd44accf1a40a23a96f1adfe4fe33
SHA169698fb1f010804dbbe610be8a9b09c0d7eb457e
SHA256c804ee3d604583b8ac29cdf9bf448e1a70148b4eff9bde3e72646a2235ff4966
SHA5125cfdee867a645563efc6ef72bd06f0ca9a1dc2e64cae087b8caa2a98f27cb1e0efb9a74e5f9b4162ad2b831754e75c73622fdfe8f7b077fe753a06e0a1eada20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54efc619884c803afa1febe77032192e6
SHA1a8d392ba6c03f640a60f5220d61417eac6f1b479
SHA2569b2d2ce1e7d3ee6ee6f199c9cc41a025cab18ceea4dc3445c10b5220765fdd16
SHA512f5188e59e047fde588687e77bf067a4f82925559d6a922ae9f8c65b0b913084b0fa3b058294d5b7b2c688de1d2161974856ec9a51b7d04010a10e1ee8db571bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c68ee83273a35d1346c769382dd9cc9
SHA1d223783e0425efa4de13197104f2a382ad6e3f9c
SHA256af23bbb06ac487524a411a5ac079737a34e976b6ba2f21c0173f2c0d37336f35
SHA512f99d318b555d21386bf5384f02562b7339d912a9d26520a5a9eb6679395532c0a2e91692a6a7303cd2403567afe370533d715ba27727329a80f88c8a9c1cf0fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581572a505f7ab159e894cdd8533af67f
SHA136282c7d7ef3a73fa7d601a27cd0c3a3f7ebd787
SHA256db4ae9c33a71a2ef7d64a95090d5687cec04d5371c340c86858c4fae7e3490a0
SHA512e330b40cac3ee620d56511657fe34c4656f3252f9e67ac76bef60d1a86954b3e12f59249c69b989c843d4545bb8af0f96b99bf36dda421ea46b5a94a7a78be12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520c2b0dc8b8f4c809d638a846b0e6d5c
SHA168b4fb4f60be57edbb5e5c6d8ab286978c2a5126
SHA256a6934200646cadadac2ce40318fdf21eb9721777fe2c0250933cf67145fc7e13
SHA5126cabb357baec1791fdf7f1267c404a6203f56acd17c97f0d4d9f932aea8c811cfba250d55c1ddcd0269a346296115ad87f1bec64cc1e67260ee1e9afe8fe1dbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcbfdae3c950b920c8e54433c146097d
SHA123f1d589d43ed6110fd12da35a01790f6f7e080f
SHA2562577aa4c1e62fa7a0f286372c14acc2b85c05fbe6cf9c215d0ff344a3d63cfff
SHA5128f16391192a1c47885cc560fedfdbf3086873fcb5c6b22481a095f632c15a032fed4dab8f4d2bc0f20e8f583f4e5d627b7770ba44dd430b08a465a4d65b45270
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6268c3e6db903bbd54fef60d48b6f99
SHA1d8459939fed2b1c85cb4731ce06721cbd7501d44
SHA256a343d595e30b63801fc49b94906d130677a4d19de26f64e1e1735c0bd2b9ed65
SHA512a0d85cc4df678d143cc432b788b38f0f5a865ffc767a4c3e961e784e75689708009892aad0af9009efafec7f424ed4b7e02f60c96e38a292085f53b712407c78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e94b73667e074289d29dd1a627464bdd
SHA11690630013795e123e76a24251f920ccf22619ca
SHA2568321857aec69f15f7528024b8328ffd40045ec4e8104cf79abe55c293f3567a7
SHA51245bc55357bfff4785f06303ee44f77c95775aa0ee9f243db4928b9abf3ab7d6bc0527a6ea6d971ad5cbf83c374c65c8c600e140f6ee4ad7ce0ba0eb5a99ec7ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52183cad36c66f00913abc046a025c9df
SHA16e0f42c49f466790e10049b34e832267d1b6f282
SHA2568efe263a47163ad0cc45b40fba00cb71a01ff293c7234b8d118151342e996c7d
SHA512986e5c5bb22b02feb20e54307f18e40b2770254584882a5cdf371ce7fecad6df2d68328c2ed48949fdd70b20dbb2552d98bc42824c54ee0dbd763540db1bf8dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502941bfbd20524c68fd83c407732a7ec
SHA15f28929182b9204d9b65030ca6f3ce6c312bbdc4
SHA256b917a05b006918c05f83e971a710d84e0df4320e73d916d1644cec9352abca9a
SHA5121e071bfae875bbab3346af202c74bb57e6d2f077c912d133a7bd0806ef6aba2c85dbe6b0b54b512734db41acff398c30fed109be887087215bdd8865f5e708b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58360bbac9377d5fd96ad5fdaba3706d0
SHA12b59dad44f25e338068429f66af4a65ab74613d0
SHA256c5f34d4d2ea18841f504822e5d8916248ecdc3c383fae7a24f39f8705da8aabd
SHA5122e14479ee6ca65f2304aa1838a9b2883c76f4ea8c97b47acee41aa76d378b1b56fc54ed1e84208d9932b5db8029fcc25ca8ff881b8e949c6c86bec48f98c7e56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4bcb75f6ba4c8acc6877e2d9485036e
SHA1d40c338adc125a6cd2266fdcbfba25616b349c9b
SHA256ab0a4119bc8c8d7e6cf141f63b8a10cbe6f7bf9a539b8d09453450e22a0bcc8a
SHA512d79173c5e12ecb802d26e22db5c68610cfb02ebf1a0a8a948bcb2d799163a66cab0892d893f09d8fe7872c9b827f765517818a7f0239e3e84387546fbbfd4781
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b