Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:41
Static task
static1
Behavioral task
behavioral1
Sample
084bf0629345c409dfe1e7166476f416_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
084bf0629345c409dfe1e7166476f416_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
084bf0629345c409dfe1e7166476f416_JaffaCakes118.html
-
Size
70KB
-
MD5
084bf0629345c409dfe1e7166476f416
-
SHA1
8bf8c7126d5e17298fa4d71117dab1ee7926430b
-
SHA256
8eadc4d47ee9117897315cbfe8a1f9e2022f5609715426b9d12142d6192dc65f
-
SHA512
f3cf9f20aca28f220ca2a01c0f2ed430226949054e27b07d1465e9c5a755443b52cacd38dc3f6d1b6a3625e3cabb60967fa56a765b65d161aea3d6c24153c3c9
-
SSDEEP
768:JiLagcMWR3sI2PDDnd0g6CQM+FUoT2e1wCZkoTyMdtbBnfBgN8/lboiGhcRfQFVz:JQMTTNen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 500e8a506c14db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000006fbf0776af5dcadf9c79472623832fb900274761214edd9c1dd277f9a171e2f0000000000e80000000020000200000008224a315d74ff952da8e3caa6fe4dd50e5f23bb151994614ef61945c462d2fac200000003274b19b4b2869f421db63d1b8c1f6a9cf33e05808cc67e02532f5c0de3b872140000000ce36d1fc33059947f0a44d69a78f5f8730c009e13065ca71fee8d7f88cb0ef9bf1d9fd8c1c9cabbd06a41faef45b33f1d17a43d183ce2770f0cb193d85de54d9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433995173" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7C03FFA1-805F-11EF-8E54-C2CBA339777F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1884 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1884 iexplore.exe 1884 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1884 wrote to memory of 2788 1884 iexplore.exe 30 PID 1884 wrote to memory of 2788 1884 iexplore.exe 30 PID 1884 wrote to memory of 2788 1884 iexplore.exe 30 PID 1884 wrote to memory of 2788 1884 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\084bf0629345c409dfe1e7166476f416_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1884 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588931b0f211b7895efd8a3572dcfa038
SHA14febf02e6d9c479500374c693547376a3db9106e
SHA2568b7f250b5f84119f03a02e0cae1c91f1f116458df4293de3cf29baf56768ccf4
SHA51203f86b59e1fedc6f9804000eec3eb57fcabab5ad5c840b9972e676deafc63ac486c0ff3ee9289081baf978cd96a334026293f3b50e0c8f68a04bb24ea7aefce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563323a69dd3854da9d275eb68efa8409
SHA194ab231ab14772832070818ffeee4a30ea272e79
SHA256594392049e2e032e2fc6309a31f28f7ad6a5578371cceaee410de979dec1ccb7
SHA512eaa068052a980700ca87f5eefd016a70301a55087730eb05a6c05f0a2ece2946a64fcb21b619f8b3a26da1f648f04835897d95eb38a819337990f5c0ae365a54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca9c8269ede2f89bfadcf9abc37ec99f
SHA18322d4b115f8b3f40ac1b42f4d4f2e749ff21ac2
SHA25602e98ae6d0e2653adece2ef36bc7da7c0b8936590d56970f0fddd2de5b490b25
SHA5128a863597747c28f67971d823671a30b648154a01741b5db7d07e1b93b5590cc704798cd5737aa4492283fc3451c7df310c4fce55408dd748d5b4ffa3703e2322
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553652ba7e343525aebb5922e20957b97
SHA1219a147c7562d55249ca5c5abfb295dba63b523d
SHA256553d13c42550e3137d633ff1813209ba90adc465739510ef99a97c2cd9049a9c
SHA5127b9cc279cddcc4016ba7edfd79d87c6436ba935e45226161e5d7dff25911f14536bada48d79cee13db43ffb3e50e98843553e1fd291b13800de362295aeb9835
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8bdb996e6550bc73be003b02b323e98
SHA1c17422164ab6f8cfae6eec8e788809779b04d340
SHA25605f7eba98b6fd4f48c93592cebd9ee2f35332260af2d76c0181a428a4c680240
SHA5125c76e7894445b5a6d140993d524cb155663fedba8d6273943a12ef35151b6fe71b6b47aad52b23d4d7f2b930c53778accd13de3745aef63cff6161a2b11d4c57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558ee55834ddaf2676f3134430cdcd105
SHA16177bb4c83f55dd71d6f14271ac066bec0b307a6
SHA256d260b5ce2b05fb2f294d24642a11f77b76887176c5bca3e591683570819e96a0
SHA512fc65c8b9f372281c730ca7fccb26ef0410ab60050a8d42a98271472c64bad9681b9223b947407377722a1c33e3aefd9a5119c6a7dc273078f4e5997ec3a838e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512bb3b011619dc64d1b1aa3c7c43021f
SHA1bcd0ad7fbf9fca0f22680a11782c326f7c66abcc
SHA2563ecbef3f450fc7be6d66c1bdf82d2e3e398929148938c2201eee888ef2c0dc4d
SHA512427aeade59c0058b234466277fc6452e7cae213efba32952d112c53e5ca1ffe0d536e1607e8843c31ca5125e56792ce3967492b89049bd8e59aa6b61ac7e4390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55299a1820ccdd524e18f3a834297cd69
SHA1ba3906c7e7bb99910dd352d7336971ac280d7f92
SHA25686842612606592ffd7f600f709d449f1e0c772415ecad5265f193c3e9b71db19
SHA512ce40b490bad6f6ed060f31b98f44be2f05c0a859e4308840f40fe5d9340d10bbb30621a708f320b5bb95920779ae90d5352019a44e60b5603becd13d1b545815
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dc66263bd44139b7eaabf77b3ef4f2e
SHA1c55b690f109929bba8d36439816af76b937d75b9
SHA256f4f080564fcd53af97269c475cae26174774e70f5761f3840b093e3fc94cd01b
SHA512dc9ee9e30bf2cef6fbce40a7dab4c166c8a00d4dfc0b83444b3893a99b8ac5c7bf296f52d4ad8eaa196e421b2b511af22f8d9894a26f91a5f4d4022db24a15fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bafa3d53179d28e095b371858007dc9b
SHA12fe1bb3d0cbd0b5eccdcc89c40629c82d57fde87
SHA256c1f0b4eb6ad649d4b902a87c4ee2658e77ee83d75e726b5ff5309fe157cb7797
SHA512a9315dd7216443ee7300245032d57f1456458f0ecd420a3b557a77e7e59b25ed50ca1420553dde8b87552c2f1d0979a21203d08b2f462d55d3d461f9b18562b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa85fbca0e4c33ab6fc90ac717afc21a
SHA17223adfc2f388ddf1bc8cc4a429a8cc6bac609c8
SHA256be463a1486cee48d2471653c781a863106f0cd98863d73fee355eebf5ef0adf4
SHA512b91cd561b50820a636a2c3b0ff820e3510fd480836d51f1a4f52e9bf4818ec2658ca83e62e44e00f0b44a6c3c2741ead77e352a8bed9d031ae10373310223cce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557b536fd351614ee9057089b24498a6b
SHA151bab5ac1912fe319c679aa64b586c77ce443ba2
SHA2569179dacf900cb024b8cd90b6e62eb998e7e54dba73ee59c600e7c3d57fbb7c1e
SHA51291f7a45c3adb894ece74aefba0841468768231f64f0a16f47cab2a17dd363c3b558dd09e08a16fe86713969d9d4da3c771e5364d58053e18a899601836931cdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a26b196552f02b6965110abca946997a
SHA1a1243b1a31a6c2f7272796c3f7137c4cca60996a
SHA25694a833c50ee180b7e3a78fdb49940c14bd6b9046d3ff4430257b494216bea534
SHA512f7ad9b6868f3b0ce2d7222f8767ab70ff8ae89e0a542bfe4de14037806d69968db5ea99c79781588c33d31eac42f741a0bf61b21ece80bb5577844c9665a7d1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fce024879e4dd30dc0a9b1c8943e0ba
SHA1b9758588bd0df8480384cd3672a2a4271504ca31
SHA25683f12fab5b9ddf9222a16eaa688b84f94e2a3d948aca1f648ac5a2c6064a9d8d
SHA512a1134f55ace51aa65a9f554f0f6677529a3c0ba33cb67e24145996fe459f1eb39176964d58831c9760c30873277b9362ae28e61da5a2e35bcc4ee67af477b2a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d182c828d65e6ea33a5a65dcf3947cb
SHA1af83f7b43997c0336cee9bac0704f1f52e882f43
SHA256641448284baf269842b2d136194b1cadb13f8e0c91795179f8b6a227a9ce1a13
SHA512b730e01a89a5145b2634d62b18c9d5642064925dbade8dcf7bc15c8c4c4589fb58a1cbbf905d617ac63418cfde955efe5f1b01b9791e8fa740cfaef1761b80fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb1b8e2bed3fbbc03d7533fca038148e
SHA1541d2c429446d07da8622d37e06dc121f1a6d28e
SHA256bfd88f53918578660c2306f05af5aa2b09e2d8cd04598f9fcc785f9643fb99f6
SHA512e9c89877ccd4bdd2490406f8084fad06fd61ecf6bd27f35dcd741653407f75f320d71d2e07466d1269ad41422617855e05a3612c6c190dd2230db5f311b2c408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549ad39d6e5f13d5e4372d0a4a3b0522a
SHA11bdd80668375c28957e1d966418e56294862ca37
SHA256cc52c218460c1824f2c80427cf9f82e65d9606cb549a4ef7f444ccab9f626c28
SHA51235718fde06243dbeec76860c4b9aea2c63f86bf19780e485f5ff80e07957c2a81b38ea681bdba357fdb80465a159390c4cd7ef3b991260f22a5954b143ef27c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5872bcc5ab3c1d202751598270fa0ddc8
SHA14c529f9ca01e5be4eed2d2edc2431a924f042316
SHA256abd70069bcd8956ed317de200e121bb1f01a3f052dc708e18ff76415e5e96a29
SHA51236a21c0ad3c8c7c5bf952f95618124ac429ed72d3208c3edd8464c8b2d26e78515b2badbe7b5ba2d680adb1af49e3221d12cd074588c33a05f7cea6653815526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d05c5f59917808b88d253311e722377
SHA1d685756f2946c1f1766e251775bc3ee709d7756b
SHA256a2f321af9d58f9cf86bba489b9adcc4da0a49e94d0b4082a45fae76951107c20
SHA5121a9f9a0aedefadd2f0a26d3bc25991586626d7a0cd7dd843ba5d1852206c5420c258ecd8a184968ea6f9fd1aeeca732fc247e64979a82ebec7977f5bef4f497e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b