Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:43
Static task
static1
Behavioral task
behavioral1
Sample
084daea235ce8371c3c941f7b00917cb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
084daea235ce8371c3c941f7b00917cb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
084daea235ce8371c3c941f7b00917cb_JaffaCakes118.html
-
Size
53KB
-
MD5
084daea235ce8371c3c941f7b00917cb
-
SHA1
259bb0ab9a7901e15f928c487f4e8b1b5481e91c
-
SHA256
b8cc3ee9fe169ab78afac7018584dda68c6236dd5dc2d271f1f41df1830d75b1
-
SHA512
028fbb21d0eeb489152e7724424105a9ec7e40ae5a07d5f4bf7e20a1beea6e18371e458f9c6937e7d6a244c6d1e7941cba07ce7b1d2c39170b2b1eb73064b3cf
-
SSDEEP
1536:CkgUiIakTqGivi+PyUHrunlYu63Nj+q5VyvR0w2AzTICbbjoX/t9M/dNwIUTDmDy:CkgUiIakTqGivi+PyUHrunlYu63Nj+qt
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 509562876c14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433995262" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B07F6491-805F-11EF-A7E8-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000efe62e39f82217d5a77ea04b457d220d5a63c55cf8554018c3ba23b2280ea6d1000000000e80000000020000200000001f7e15b57046941faa54cef162d8205a9f1403633b1e7a3fc7126ec4e9eb2af8200000003fdbe6acb5065d9e7a117884bae6c12d3b3adbd8ade272a2492e27e9573bc326400000001f4d411bfd31dba830765015fc6169e00f22effb3d026922073a5e5aebb5dd82177584ef03872676a3db94fb85356bf39b3815786272a2ab9ff9e4d5abcf4c8c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 840 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 840 iexplore.exe 840 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 840 wrote to memory of 2368 840 iexplore.exe 30 PID 840 wrote to memory of 2368 840 iexplore.exe 30 PID 840 wrote to memory of 2368 840 iexplore.exe 30 PID 840 wrote to memory of 2368 840 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\084daea235ce8371c3c941f7b00917cb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:840 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a499337f28cee7c416822158f47bb928
SHA175a13a89bf26cfca46e61266dfe1a32bde2d19d2
SHA256c0acd477870c7a3ee9e23978352f8739d35df60c1c3af40be8c7f7ec308b4add
SHA512b62c860b2d1ec3c89dc95bfe22173501230f0fce0a98115061714a4c6c00068f9e7a47882fe7730ed862c871224a7f58342bad31c1cfa1100887ff8718b95968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563d284444c9c9e0a710f2d5f8aa5b3db
SHA1a7e09e6535f9e1a75de195e35b3183c2de16ecfc
SHA25600e0d54cc5e78748899da430d71cea925389ff2bcdb70069fd65432bfc64c68f
SHA51226bd93f650ad9e7fc7c68f7129d439f15f9d332b610869b6302500f6fa0d556c64aae27a50adfb055b96f2813d6da2e7093b9c0e99c4e6cbd3d1fc7f6ff01683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5543f9dcb7cb76a938c1b8dadca1805c8
SHA14390a62fd4e7e6530eb4222caffb1fdaf1f7f65c
SHA256f4ebc34789ea3e9869125c34d925c072526398ad8801f5d6a9006ad9870ba4ab
SHA512e95e148516efca83107ff57e4383c39ca92863db4dd0b6f2c3bc3e7510b2ce16fe8ac7ccc5e90093c4b3f59c83b3ea80bfd269c12af0550ec58462bb7bfb4637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5613b3c20d5592147189be50b894fe191
SHA19fa3e7bb94bda71e8eebc256f87480437bbc5591
SHA256b0cc0d1c3fe5dbe84c46a04e038c157c993dc7d58759cf2d05619ab575cd4c42
SHA512d216ad645b8b102453f61bf0d8067fc2efb53e1e6b527f0e5a71f592eda07cce385b92915bd4deb17af344ad4f11007de57ba7ce893a47eb7f637e34286280ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56236bf2a7f4c38c3b5f05df92247798c
SHA163ce450dab6234a034a49354c93b10078b9c4755
SHA256e62ffbb9ece40a33e62459ce01c02b87c7002b5b313328cc9590bb15976b4ae0
SHA5122e99ca2225c90a06a98eb82c27400f21756aa17a8f26218fec3e2fdec8c9512a2c3525fea05fce663ffe36eff28a97390071f2532aed8d8b893f6de38982e1a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4d964b6451ff0c485a7cfd5e3c8b368
SHA1835ee8f86c1941afdc9b3f12596479a10cc3497f
SHA256d15058e1c5c34148265aae405efc618c089bbf12d4efe00ba36a9cf2a2450c9a
SHA512cc3ad4f13cf0f10260d84e4de12bc13e7e3974009215e332fbf5feb99a8b23f27ab594b47efc0e9106261a2255691e394aee15552aaa0c504ec94ca79efd9a45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5196fdb0ef7a2e26a9fc11c75b7b2772b
SHA11d56fae29ba324d6e63d68603e7613d6d155e002
SHA2567268189a71bc53346db7f28ed5fbbcf35c2b3b9cbf1a47638cac27af06087645
SHA5123d3a2a523e40cbc3b78444f1d40a70af54df2bdf8b50eef042c7c1cf123e9d295540534565dafa3ae6d28f90f4ef83b8fe1a210010393edba36263d2035ced0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fafcfc59938d103db1536b7ab410ce7b
SHA130b2e3071ece6b28922fbcefd2f6509c7224d0d7
SHA2565bdf1392a35a611a7d56e04fd30a195b7363caf21a6ba1042f97c5a2a60903d2
SHA512c5954415fe4603ea4bd66f785d972e182431213c435dca7fde83293a2e6904111ea04c28407a42ba27ad2171c42da01028132b1d70849e6ca45676471a09205c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e700865241cedc15bd4632fd21a347d7
SHA1be6e630a4d7a2e4d2d03a09b5e9f7fbf772b3863
SHA256ddd4dd11553a8fe99915172996fd6ba164274ad90e6ae7e7514803f529fea0a9
SHA512b92071e20cc49cbe4eb7d2c33010ebf6bb9b136d7ffb2a1e4622f0319af80b3924ea67b1eb6b19fe4c8b201a20ed4a0059d3579b2aa0684ebf76b2ad2dbbae0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5092ce62e3e0e15b81e910d76464b4524
SHA12a3170d6646654375877bbfc9606c45f00f71499
SHA25671fdf667c621b3c60fd9444eaae2d7d546915c3afcd4090dfd18f400aac6496b
SHA5128e28b9ad3e9a77bd5a40e759b4ed2b049e4bc4c3bec41291a42fc11c83178384a8c2b2deef4d70c0f38295e2545a6cc9290dad6b654d7213357c8608432d24f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587be517d8a67db20b7928ab4434632ed
SHA16b43e5d2afd716acc769f96a8ae89b925ff9feda
SHA256c77c3b1ad8b43aeb1d934040d814424bb1a780b92e2340760df65b91069a48a9
SHA51237f0ad48b4bed2e4f90ceacf501f9aa369fb2594f3e8441a28a01affc37b6561078b157d51b5cfb25b61f634d21bbe694d68e9eeeb094ed226c8c5996aa1b746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be426018c3925ad98876f75d34997021
SHA11fde067a968baf67807f0f0a8b50bea61fb54d12
SHA25685536f37316fb9ae1433ade604b2f7613bf42ebef9263e853d3388af04459139
SHA51293764396c0f8e351e3abc944f1b8216b618c684e98ba9768a82694065e76d21b88ab41291303a3db264ea78d5856f43d9b7c40e9f1c68861ad7cb508d6a89307
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555e1a5bec9ee1854f7f23610cabddf9c
SHA1b3d9cbf4f6db36b19bc5182892268adcf2dbeeb9
SHA256a01986e1375b90aa238b5f9289e9d0c8bfefcb1272660ed92ae5ed28892659b3
SHA512c35502ecfa169d6edbf0a73abb4c79f3666e2018263ef81135861ab1ce01950504da8acf5814304c581e5b05a2b834f84fc193cf0900d8d6067ebf2f2aed3bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512dbb0ec4e6ac9d0d00ca2d907b0e91b
SHA1a643dcba1dd3ee5a5585b43ddf2b2f7e3790529c
SHA256f3eab7d05ab2174044b0fc773069143ef1126239ca05c5018b3d86c575f0572c
SHA5122e3cd007d7ede2f006aaaf2c783eb6378a072d9b0387d1741a1d6ab3e82bbcfde6803a55e1370267b035347f7c589a092b2cf713d442ec3d9e4254b47abe0183
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54684cd525ce3f4d2bbdb2d2f5c223826
SHA10e7f32625e17141fbc27e58084854eaddacd1f88
SHA256f124584fae3c2797147c697992cc997102ff71c065205de1b5df0a0d6392a550
SHA51201ef40612ce52c65336c5090bf595e02980dd87704528d45e7f0e9178e41ee6201a5bf8e06ffd01f2214e96a5e70e6b71541d2e54aa4f6c045171926adeff91d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c5d752b052d1e72944f383b4bcc9e34
SHA1b5b82453e65503f03bf53bdf45c8346042e6c896
SHA2566883c9a7b16a8b5da6b2c28614f93ef1cf7923d8714a76f5e5a442a9d145e498
SHA512035fe642e4f37b46bbccb1e0180fba350fe40cc82b372a040e95f821e04ce434b53568afd3bd6168b416305c19922df1f6fad3b2757390c9d8feb824e0f7775b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c38726181432397734a678b75da074b
SHA16ab4c64168f396110dd52b93fc82228a14d4b34e
SHA256c6fb1941cfb136c690800133f93139dd32340e69623670c88e31565b545441c4
SHA512e16d28fbbd31223a67370d1448ecde1fd6647445686cd08c79903048d99bb4d954bddd0b4646adfec7ae9ed88704a76a17ea43bfc015dc664a9f860c828f3ba8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q0WBLVJY\normal_post[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b