Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:14
Static task
static1
Behavioral task
behavioral1
Sample
0834b4f7fa7beb2e2d32e32bfbabd9b4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0834b4f7fa7beb2e2d32e32bfbabd9b4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0834b4f7fa7beb2e2d32e32bfbabd9b4_JaffaCakes118.html
-
Size
53KB
-
MD5
0834b4f7fa7beb2e2d32e32bfbabd9b4
-
SHA1
6caa6ea56ed6a56c0ed9dd8aa9ee080ff51d141e
-
SHA256
bc26df5148f262c6e2dacddc0c752738343c073fd8d0e504c8a8667269b84c06
-
SHA512
88e0a02016f5243f40344fbaa27d58b565c032ae35866a26cf31177a01f382c42511547cbd32cbbf66ad2e9f8f78fc4c805b6189a1e326486eb634c625bb1766
-
SSDEEP
1536:CkgUiIakTqGivi+PyUQrunlYa63Nj+q5VyvR0w2AzTICbb8oL/t9M/dNwIUTDmDk:CkgUiIakTqGivi+PyUQrunlYa63Nj+qe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000063923a3182b4467cca1db3224ae0cc9d305b3e1648f7638770d6be0ed4649398000000000e8000000002000020000000907024eb66420cf8bf655aaffb6f7a57cdfe90542c2ba90301b088695b5bc23b200000002cd9aa4b6b11edacd838efd5594880437c63407ed766ae31f01c3873a5be1282400000007d0ab59ec67a78a289ca2035010cacc6a4b60db860ba776c71fb3dee7eceeba39703e3ba34e92e7cd7036937774ac16d2a0b2f3cc3e6d39d6f2de6432753ace9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433993537" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AC48C461-805B-11EF-93F4-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0f32c826814db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 800 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 800 iexplore.exe 800 iexplore.exe 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 800 wrote to memory of 2584 800 iexplore.exe 28 PID 800 wrote to memory of 2584 800 iexplore.exe 28 PID 800 wrote to memory of 2584 800 iexplore.exe 28 PID 800 wrote to memory of 2584 800 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0834b4f7fa7beb2e2d32e32bfbabd9b4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:800 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58319606312cb34c3fb8820cd2b40321d
SHA117358efbf7f912f6aeadee16767ddeb6c83e4be6
SHA256822a41ef2a4f117c94b65ef56d669908b65fb3c2eb77f4ae6ac7fa578a2ade29
SHA5121ce041f1327079dd1b9badb28fd7d353f609d9f45d2f29de52d0b9eadc739c9c2b0825cd70057b9cf8a8855140a7feffa3bc8925d8b8475285d133ad08fae078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519abf39cd721d2eba41ee8ad3c53b5da
SHA1f92a912621a78afb8376e063965d563a9505b097
SHA2568b1afffe55fb619e54fc53e25e3c096514e329bc4ace08e8c710c51a15beeb4d
SHA51295d16615bb64d410bd8a7a1c3caa8bb532d5c1b520a30c342d09b5bc9cbe15d4b32d2be2d1a075f42b7c3a596b0094c5c24944b2327ba489947b923a0b98f510
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dc6ad91513acc868b1b77d090ed35be
SHA1375d74f3b7df907b855d995c06e4e91a400ba93f
SHA256fc6a1a3f317bd61988965e6315c5a18bc9197511e1636f4dc56975446f621e17
SHA512dd22a0a72805b48a1e42bb507a1001d60780e31af74d091bca593b4ea5102dc20e3f99aeed3eea46ebefe2bbb5933bcafb9d278575cdfd277f1144ea6e94cfbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5440add325805d62a2e3da73e2a198b0b
SHA1ac71067196bd1cc4f79594247d469261bc6a80e3
SHA256c1c1aa9615f232fc57a585a92ebc36c6653745e607f5fd51b7b81734ad4443e5
SHA512dd2481ae5076fe0b5b93b7acd37b84abbfe21f1a4706485d130b2eadaeb5e5c378f909dd19ea2b3b546bfd8e9f1e79f1c24889098c8aaede404fddec8df8b9cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511fad3fc36e57d84b8dd4768fa8be17d
SHA13a0be4a48a7e90bd8e44df5a06a5270a066cd8e7
SHA2566dff677b6ab59684b4817185ed5f110b8819fef336af942557676fc4613f3eef
SHA5125c25c80673f17e2029adec63bff2da9b440dfd0c326052aaf3e1fac5874e571cc95aa8e6b44312d85818891b29a9a465c8339367c8e19514795d72e8e18076e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550abce42d8218aeb57c4723faf646a5a
SHA1d4fc436607f2ef3beb7a9632fba2cd7170dd68fc
SHA2567b766e7b0ce8e51e9ba2b004626c92be695d345948f9e4e00ad99288862116d2
SHA5125431b8acc2ab85677d4493525109e0a0ea3bd68e3aede3d1917e65f48a70b932a92ed3fdc546fda61e987f1544ac60c4c068fad64aaa16fe8c86e71ed7588eac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597d0a80b6e8aad6724ef9c8c8a3a6182
SHA1fb6f636d143967a03323072e820344366477a156
SHA25652d0a29fa59dc40209ee6dbc9bc6b476be706abcb6ec631c35c52e7432aab927
SHA5128da22932b8cf09252d4b56528feb7eb308a674749c47e68b0d600be9bac450e91a95cbf3f53efc216ac11ac51299a6f898a85513f55bc62a34c7eebcc5e35a52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7674d37313f09c1440787789c4d1469
SHA111a13e8b3ec9c563398ab57ce3e46184a82b14fd
SHA2565e9737ad46703bb8ac188877e16867a3657ea0b6d46df2d89f7fcaaf9afa9c10
SHA5125b6c75b8719afb5c8aa6fa94cda1d4557ebddc086e39d383555cc1c55eb6b46d590986eb099879ba7daa8163bd51e32feb7b7cd5776629e8cce4828ad88697ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea73d1a1b3f6c86dc92fbf8831ce0848
SHA11275af6ca8273ed20acb3faa041f4ff220a5b74d
SHA25654f041a593201a40acd20984821c393a6c44b362bfe0b212923a9be0d45414e4
SHA51292d8e3a5ec51dd053388da5ef5104144474d4c3eb32f05977b9cfa51f8398f34cadaed1b5fc86be66af0e0fb816f562d600526f1bb7b03aabc64d3c0bbecafff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52732917c0a69d2f04e599b862072783a
SHA1ca4b4251964689cc83cef9d20fbd5ebb0281832a
SHA2569142c699ce228058e48bdff4d18052e62215177d1d62ce834cf5cf255da6f0a2
SHA512a288e3f787e3824577a4c5d67c4047bc2077c95ef5d70e6e485c799be3385bb7dbf5a566d28056dc24c477f8ed76e9729bfe560af8808be46ee7e38872966f55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530175160cd888ea6f92018dc02b0ec9b
SHA184eaf6f51b586e0bbed7594089394562fd940e55
SHA2561bfa78572e4f1a47b4fa59c3d401b58720731744ec93f326f9e604d7964b9e50
SHA512039bd92a4d074eb7e49427aa8ed0c442da4e1494f3bcca7f2e8f2c1575e2d64f435df3adf3f5f539d6ead84024cbe4f764b196a68d2dacb58e3ce964e5320d74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bd96e972b47d69d5f3f64c211fbeda4
SHA11155b602469baa065ae550d94fdd755e116b23da
SHA25687fd76d01d70d4fd99c40fe5307d8eb958ec0da5f948f52e4e1c147d085d6267
SHA512012779f090341fbb3a1e99a69cef6f0099ecf25181537f4147f96d84c0c134c49bd5066061efa1b699a071697703d2be1fe496c4a269b0e1e93a1c2360def321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5050753c3d65d886b2071c14176c4bc38
SHA159593c066ab8aa44f6c5b4447bf92f1fbabcf6dc
SHA256fcc57e9e4e5b32c91f99d0ea3614c1830c2e7ee8e533c0d24924feaadcb63e57
SHA512b8546f460740abe6ffa75db78c433f3bdc01390db75cf2dda7203689880a12a5f2754a969759ef3769c6b0c40f492b89c664f6130156e057ae90b35438694300
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6c7655b6897e08684df05ff3744b0cd
SHA1aee771fa05b22ce56c104f34e14f83c1f7a60387
SHA256c80a55a244e7340e9d1efb491609382b03190cb8ea2b8210ff537d37b79ef342
SHA512b146fab482e7ee48ca33b782aeb0f5738b886b6cfdb6ba89109f40c2c3b67280a8f5e01e174fc161eae1f0580618813e2b134dc34205c432a7e7015885613bc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ec5934b9f7fb91db8578cff0d84790b
SHA1c3b7c33c811355db0181f37d2f80a0c9659c969b
SHA256a97a3664ed7983e9f948083617bee118972974a2b5e0ab9beffc44bbf54ba9a7
SHA512b5e27e5c60d48ebc1f5f5c362efd99e2711fc962bfb9a078ac9f33f5317fb9a0cdb74c729b54e22cc49b3eafc19acf205dc61dfa93bebda55968042e3f275162
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b29772bcd614891dcba65a6da1c68121
SHA14011504f08f9aab94def6af5a4224acee7565edc
SHA256aa9b06eeb3afb45c28fdec420ffd113e611403a22e7aea56134d87f7c8edb919
SHA512918f921564893371c22f814dcb27455ba3eb591fb183c5a6685d2753be756a0fac09b489d4287da6cb17ff8a198100a10b118c2cc56a471e48e811d27c2d8f3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e9b9267ede2a56cced862330a4b0b37
SHA138942fbd90399f38491480cdd06526d84fefa3e5
SHA2569d5d34f411cf0f900ccb6cd6b0dcd82fc93984072c7628becf6bad3a9fe94c4f
SHA5124cade7895f26fe9f706aeb95a0058835179c5b3620cb033558a1172cb7f03dee6702c942b365789d1b0c6478117d9e306eb26ce085142caeb728f28845552bef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556da6590c6c887700c1311e5389b95c3
SHA1b5039bcf1f07011603c62dbb9cc316695b3be8f9
SHA2566c0baa532f47967ad9cff99fd1abefeda963c9991372eb68db30c7f81a83ccb5
SHA51281c7ac14d0687a3bb7751bb3e2e5c0393c9c28acb06330a2cb3e37b0313701930b280b06b329c602a3b3ea61b6f5c1b761a94ab0dae1e1b24986ffdf8ea5ef9b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DJB1KT77\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b