Analysis
-
max time kernel
143s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:42
Static task
static1
Behavioral task
behavioral1
Sample
084c71967d7bcb2e37f964b92470a023_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
084c71967d7bcb2e37f964b92470a023_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
084c71967d7bcb2e37f964b92470a023_JaffaCakes118.html
-
Size
138KB
-
MD5
084c71967d7bcb2e37f964b92470a023
-
SHA1
91150566552c5c48e0285ba75758b2f49b7302ab
-
SHA256
f91ae52ea72435ccd9fbb14a0d4282ce696f1c7a1ad87e4cfd52a3a73f250ce4
-
SHA512
2e4d8349fa6fba145767b116a9fb25b32d222f092375f27dc549f4455721048d2d55e8f09109fd6f6fc571b86d17ee55bdf91f92132bd6f9d08c571ffdee92e9
-
SSDEEP
1536:Sy1sTEaLP3lAmyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:SyyimyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000000e6c43062b9af33146712103d7f4c73b3e9bff09522286e4b90475da371ca5b000000000e80000000020000200000001f838caf480ee5fcd9d274c92c087eef46b353325d65e99a6fcefa9e8475870a20000000940f0199c43755192170c0aab45e26da893b9feb1f7865bbd4777de2a1e9052c400000005a4e0d3b18f9342f2a69e0f812c6de35a0c75a5311e73a353a1279baeece4533293f1e638c317c4c79678cb04c499e679f3f3ed9a99c53032aa126ef1a741d52 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e03fdca56c14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8DE73111-805F-11EF-A6BD-E67A421F41DB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433995219" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2500 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2500 iexplore.exe 2500 iexplore.exe 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE 2060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2060 2500 iexplore.exe 30 PID 2500 wrote to memory of 2060 2500 iexplore.exe 30 PID 2500 wrote to memory of 2060 2500 iexplore.exe 30 PID 2500 wrote to memory of 2060 2500 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\084c71967d7bcb2e37f964b92470a023_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2500 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7bff943342514d43387ab2dc98ded2b
SHA154dc7c3991a3e1cf8842d97044ed8e1043a0deee
SHA2561d07d17bef543f5c308e71e4896593dc9c9faabbb647b5206cc6e00b585ef76e
SHA5120167324280f101eb7746e09c303564950038987c0ebd31b0c12152318ab3c7fff11de9f50a79cc82a2d6f1a21f6ff840e39857c4c7e1299d08853dfc7b2a22f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5132db988b540ba22bc570a161ee36916
SHA15429deef84328b84af3f0a0a3ad767329f0d6b17
SHA2567fe22f824c6d0d4e7599d2f00d384471b467faf9e699a19f7edbe61c003bdfe5
SHA512580bdbd0b054667a82402b16629fd5149ec75cafa0c9037abc0a3facbba44532b83fd99d1288e47b0bbbe8db5a44173d4b9649546f9515f47f306f20ef384724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f68f7494e503b454715ed787e75dabae
SHA1f6c482cdad17d03f1514713a62bdb9d1df1946db
SHA2566a1a3d338f887ea1afb4a2c19529bceaf56bd9fcc8c00c943f8d72893eb8fbf4
SHA5126353b3972e61dd4936217a3b78900f140012970debcf9038dac44758337647d9154ce43e11541a2df6b4c398f978a831488ee628e2155cceb883658027dde28f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f86a4cd64fa5d13ca47491d78b48775f
SHA16e7b2df7fb23fc7aed6a25ab2de18a05fc3c3753
SHA256a4ecaffd8ab8c730611a6f68bc489281cd1134d66d8b64cfd4fd173f28a5d6ff
SHA5121741ad457a1e5f6875aa6c2cea9410bbfb2dc84fa7adc41076a6f00a56e4feb79c8d0269349eef83a4c83ee6b0e380ad54bd0c0e249e857ba79a630c583360fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c863e09a2ac4f66fd7a33e0b44313ea
SHA17e88d9ca19b6269af2d775def63801a893fedfd0
SHA2562d449f64440564b7eb2690a54e75ffec68f8d11f20d8bae23752955ae1379fc3
SHA51244f30d465ac6faf4f15b0fc0d11f40ba2d367e451a49af037c28db2b7dd0eba79e5bfaa22e033cf6407fc950eb0cad69a4967b72495e2ce4c63eca68f1dcbcc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548197bd236882fba5359ae529a49f462
SHA1721e87112fc3172092193be06e7ef0039fa44b50
SHA2560b14669e888f3bc3c82220b77074e1782684f6c63767407c826dbf5d369ff356
SHA512f903edfe25c97bb8da551f25f5ac5415f30279751d4ccda4451eceacae2357339c30cec70eac31586ca2f137148aa67cb5d4b7f51a518aea27d0978dcd643ff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7623a9a44352819f19f6f7b245c1733
SHA1b44949a104d8d7f977cf5cd4fa3b7b84b7349957
SHA25642a18305c4a40a30455e8800790b003b0a4f73c11f22ab7ae539d09314df8086
SHA512c47e628ec536c86ff49b913115c2d91672a90c4a2bae83240e70e87b04da1bef5ee38fcdc751866ff684a011c7c50f6fff66e16bcd569e8028fe3e060a2905f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c5060282adcbd2fa5ecb978299c7883
SHA14338ab9216295b029161189e923036d3357eaf3a
SHA2568cb3591775a9bed3250c343a822e57923f50c2d99a1893830ac033f256137a74
SHA512bbe661fc56cc23bfc55143d0298d9c14ce021439498eaf72e81fd39277e2070d0c951ee741a860ea0987053381059596100f859746c59bfede06cd997327160f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e29ac7717a842e2c84e8684e87019418
SHA1f997acf4cd30a8161556632d760890bc07cfed62
SHA256e6bd811cf6a2edf9c3fe8cf9419460e402229cc0825005e2f2277be36ae9de7c
SHA512c36e854f1b6099f55b0e49c57036f620f071aa27acfdf058f9d8876ab6a9666396ca524130296588e8419aadd91cc738ccaf726e759d94387854886176771430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59113d26d04c9504439a7ec76758f8807
SHA1732bcb2acec972d8e7e98c9aa85c546d2e52d049
SHA2562c018e405aee16696f9b8e680fa3e06db4afe6366c6bc4c5808880a0f9cdf3a2
SHA512d4b6f2cb84eb119416aa920b6f58efe9297cdae37cd7e8a60bcc6e8a418a170bf5b849aba4cc0e83eafeb6151eb7a18765954682779914f8ced8e8767a0b251f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fca9d4cb234078a1b1efb6959d8f2d0
SHA1fd998fa6b2278d73ec7dc5ef9a6528977265f81c
SHA256865bb51b9d2417abe682e4cbad6ba9eb36c2199c51117149c58ee6cdcbd86887
SHA512b4190328a4abcddc94a34742cb7e11eaef3349f0a7eb7ca81020d422a3c6b422f5fa3570ae343585926c43b64d71a70bdd6e5d38df411d825a266397f989e3f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5564594bb536cc7b88968c971fe3621c8
SHA1c8ce52c866e44730db64731221598d722a9f9b63
SHA256ea5e25157b6e97663d2c3d21585338a4b0beafdd6cd497331db7801c7bb6c98f
SHA512df4bde7fede670984b27a629b3f728c0a86cf1abbef10d82af9a359fc3abd66c4b9410393f1aec1732e842f80ed928d3e3f7130cdb577dada9f9995157b21746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592a876be6cea8ba08dc4c2e2ad8a0c83
SHA110df7c9e1b9617226363b11a7f9188fb0c7f052c
SHA2567d1bb411c9f56df3c1f633a392f6dc15f521704452ed289a303bc682108f7b6a
SHA512ee53b91449e7e150810e1dfd7321eeea4ade070226a63f32141a8a33b2504e256a507d42fd4f6a7e612e8bbdc6bf2ba88e1b6f06ebb1d6171c40b90805a41683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c51d255b4066532f45c5300c1f551cd
SHA1b251fda5aef612e6d76e3636d40112a3fa054dcc
SHA25610f9578ee3cb342b91ae3ad45fe9ce69b02548403382cbeb8518179585b361ed
SHA512389ec0664656709a5dcf481086cf1bdc36b8f63f2c5e4bd3242d0f7ec78e4ce4bcd4b367ad93750954d68a2e6087177e71b1ec484c154e90463438f8d86f79b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f453bce3e43ab791bdd2d286e1181cc
SHA17c5d516cceb5ab8d1e986330aa0f285936431a0a
SHA2565625031678bebe1f6af83706770ec6be6a40605cffd8639ee8c14c89e37a94e8
SHA512930a90bdfbd41f802ba2de2320ca2e7c87fb17ca824537520cf0fb5e68dde50b6ff49febf4ea14c938ac4a81a3ef38a4d9114cebf93aded48a1102d943251b32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4aaec1045a8956da864a2ea6856ae07
SHA10e81bb0e5a2222b9dae3855efbd11fc0be3e0977
SHA256a0e48cbbbad5af1fd932e2594dd636f7bae8ea502a2c5d7ef986dae8b1aaa41f
SHA5128e996b8547c9f149a1eabbaeab5ab3f9dd00aa6a83daf338487f91aefb04f1c4abb2a65627ad8cbc4d24dafb4372c7991ca9a6c94976ae9f06cb89819670ee19
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b