Analysis
-
max time kernel
139s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 01:15
Static task
static1
Behavioral task
behavioral1
Sample
0835bd5bffd2635994f04460282dd17f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0835bd5bffd2635994f04460282dd17f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0835bd5bffd2635994f04460282dd17f_JaffaCakes118.html
-
Size
10KB
-
MD5
0835bd5bffd2635994f04460282dd17f
-
SHA1
61f6e3902ea5c94d0de2d84135aa2f7cb7e36716
-
SHA256
bb53153ecd2de635ad2459cee46d4fd7eea640cfc1e22f77f72ca919e7d7cf18
-
SHA512
7a88e60258d2461f078cde8200683a3b8f9963c1bf827fb4b3879910e89a94c66eb6e560a2ce01405aadd81051f01249e6d8f7a333d88bbfdc2ae44a6742f309
-
SSDEEP
192:2V1lIsr03MN8k/w1wvqVkZ/B5AnRvpXkf01QJauBuLbdU8d:s1lIcuMv/gY/B5AnRvpXkf0QaguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 408f7bce6814db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000002f0311e460407d297fcb984be80fb1deebcf26d5e44c779c77c16b576cb63a2f000000000e800000000200002000000005d6304e513d9122514099196975790545cff4c01b215506b8b3f35402adfc71200000008849420e54583692898fe72c0a585187a000c663cc1780a94c9ad498012daacd400000006e5915d970f5420456ed746b9d6927e46bda67d324baab8f5de168b16c22fca16f9224509413f5bc36d0dd6378a63d5b3fe283410716d48d31dc1a0b6402f908 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433993602" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D309C1D1-805B-11EF-BF50-D686196AC2C0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 3020 2236 iexplore.exe 30 PID 2236 wrote to memory of 3020 2236 iexplore.exe 30 PID 2236 wrote to memory of 3020 2236 iexplore.exe 30 PID 2236 wrote to memory of 3020 2236 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0835bd5bffd2635994f04460282dd17f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55963f24b595be9fb5bc7834192440e1d
SHA1c527729dd038044d36b014c234c1013d919b14ca
SHA256dad4e09c2ef221011f62dcf3d9709632bfa485e3954ec0095dca84c9fdd5950b
SHA512d5080be79e2281b79291834a3e12e0ee285f5a069795386cde91245626c78b37273d672aa11b1d7248ac6aef5da89071060a6aeec5cb985b11729e57a05c9867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebb095f7727b9dd6193dc1b03cae498f
SHA16e40f4ff6c4c2ec06a7175e22ade778636449aa6
SHA256d5bee94961410b709b2ad3545dd85431562c00736ceaa5203a2e3f7692a3a00f
SHA51250afb05bf6aa01704d926bee027c96d9b13784fa34d64f454ef32da925ad1cb5ec4a33b4bfb37f55663e4648d2c93438a12b50558479f371d2d5cdb9c664968a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5906186aed91ae77320a23b3d8120516c
SHA1d4e2035cc54094a4f50599f93ecbf9ebadb854ea
SHA25617d38d658dc1a704a6b2a16a80847b2831a4a5bf210312444ea93894c3b9e8af
SHA5123063ae30f05cd90266d67c272e4b177a8c7c88b9c95bfcc744ad4e55a5542890cd1249e7c64a55730e8fcdbed6193d32c0e0ecbb23b2de6ac7b5121b7e22ad3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d9b8ca4938e597ce9dc977841a9d04e
SHA1fb3ecac427966f10f62099600066b91c7f5a15c1
SHA256507c942124114d18ec33a9af35d13a10b75687c831fd78ab109f75b6b077209e
SHA5126a5ff45759c8e11b6872a08668363db2adff2f1503293aea3866d1a0c1cec54ab93b5d904289980c20156b72b21d07a7013bfd9291e8c1991768cf4a58953e8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa3c404b570878464f9e8e368e670c36
SHA16ec7f5c4afe9173f65b153d74327f4f0b083e421
SHA25677770c9962c6887cd17eb291d09aa26aa7312e667e67b796dd274a72d7cc64fe
SHA512aa87702dbc4d1cee78ef2b0475efc3c9b0ab996925c57a4ab0171f7baa46e48ec4dbd6c4fb3252d72ca2349fc6e99b57e2cd00f2b496a80b979fd5c3e79a46c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577a0e242ddf6d162a2cb6f001cc2c21b
SHA1427537c944f8be7441f1074cfaed04d0009539fd
SHA2563eef5591d762b7582ac6c383ab5e46d39e6f0104c48a208e2e7f39b9be7af4c2
SHA512736969c6bbfc68e71a7e9916c99d9a287a358a46c0a1c036be9a199e26340a204d7f108a9e788d3ac3c82e342f20321ef7e2cb8fc425891bd360bcd17d9ded29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e85b4ea89bc34ed2623aff62f57eb2a
SHA1227e7b8ebd503878dd45893bffbe2c5ce0d6bdc6
SHA25622d99fd0ad9b6c8608332b3e3b9e5fd0ffd908aebc593dafb46b8107c77bbe74
SHA512e34c852d6e3a6652c94edcba15ed12d6fe3367763eae5a2b27f215bae0d4deb0cafe5b09e1f22056f6555825cd4564e316596b385d87681784eba2595bb52bab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52be57d51251d408693cb2cd619f2d413
SHA189660b004c518f90dd11a26f823693676d039bd9
SHA256d8c40cff7928ae6c217d26ed91cf9252e90fd1fb1768f3cf83b92a89f700c577
SHA512ab6ba5470c57343805464b8431a4fbb4c3d0816a7a62f5b1483925cca159e34c7bbdae07af5adcf7428d24115a8cf0c10172570c60457461e31d9279e54f96f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d248d92503dd3b235677999070331f5b
SHA1e8c63288f796e9c832126492bfa267a793d4b9a3
SHA25667e5c8aff45a1e6b915a6151d1ef2bdc3ea0d377d438fc1b8f9a54a5d67fe1f3
SHA51258932b52cd971f87b3eef3a9eee7e27df067065a557e75b78b75d6e25fa256afa3662435961066cca01f58b843b4df4bc61c8b4a153cc6448cad00e4cec0d785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59065ed4949971f1a0cc0ced7bb8693af
SHA1208ea046f1463d9346db127822780a3b4c8cef86
SHA256a12d7fc271fe6966aa3b1b869974cf04186af8ee92b7c25a5ed74ab4cf5b897b
SHA5126760cd9e5494ecbb6daffd6a834106711825180caffc52b715362985df877831c323ce976f12a0bc0431b1d65452ffc679c0d8dabd5f9cad18007b126c66a3cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5250bc94a30988990e814cc0b92280d89
SHA1b25b818c33fed248503a8942a75af79840733eef
SHA25671b889c8f58e2cd0f96b61ac049dec243821e0fa5c2b8e34c99fbc0678aff0be
SHA512e96d75ea6f69a885f09f4e2da0084cf54749df70c787dfc776696cf3bddfe55eb59bb612c694e36ca79af95cf8bad0578b563f1b2917d1a9b38aed48fcb7a733
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1e9794ccd90bb93dc4450ade9525f76
SHA1c912a6c40aa3afc3705c366dbd5d4ea1dee86c16
SHA256bd8dacefbca7dd386f42f25fc3b3c88212fabe02f3ee2925b7c6f2eda4fa6b4d
SHA512bee73931eb368c7898998c78232dfde57c737621a42c959d8f264a8b86a29ab059de2a46f8babc17c44d71699eef65c2cf73a3bf85181fe54f83b11ec3dc8a10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e1e6c3e54a7b5df021b97a162b16997
SHA11d709cf96802d42e0ab7bf3a1c2da8b026836881
SHA2561814da35c7c8696ae9c0bef5a9841d67a9250c31e13024bd41af2dc34eeba105
SHA5123164b997c81cf8e60c5ede4e610227b34dc99de52cc1e03e952963612ea79dbb3dc8c362022fa3749fe6edcd19343c3a98d61b5f3d1562079f386f1db72e0097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c62e1431a3ada72c2552ddabd0da43f
SHA1b3a0ca1e55e7c831576ecb195679d11c76de7e3b
SHA2561049fd6ce25b4af921ed01d80334897853d712b833169b2a45844e3c39cf0971
SHA512c61b59404e32b132fb3573b4b223fd35cc4b25aa1b8f3cfa2d77886886c28a99e16a2c4c02bf13570564a26e1cb6e6ff7418f46b1bc39f9d49e3cc6ad00d9f3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beac5653754c6df602a30f1fcbfa4939
SHA1bae64e32bb7a991296fcb0234453dc9df89b55f5
SHA256d7512dacb4138f6869b67b12888ffbb9f0d8608774c5979fb3b7f9e03c6a4bee
SHA5121e16efde383d2eaa085bccb5fcfadc62ab503ea7b0cbe3b6ad6939404c2c23eeaec3b46a8c7ae28f21636ffbef5873e58b2509298b2aa64cd7be956c8e4ddf46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57526440adbe7ab762ad330dd3da0cb00
SHA1b4d268bd7afa64e2268e2a909d82e198b8eb7a11
SHA2561ab183b3225be211121502dbc2f0bbabcbaf4d2da6ce6699cdccac28674472ed
SHA512355690c1f05986ceee7be4cae192a660bd09af4456668958589355b60005107abb212d1c585c5289ed59ed0877c0793690c0e41101bc2d30deb4389839e94763
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b552a84bbbc672d348445a4880d56ca
SHA15fbb90411c74a994f6fa66e4a4573af4409d6c49
SHA2567176879efca9faaa5b3d04f12d2795b8ea48e3b6cd8a451ed76a495ca9c111de
SHA5124ef75ced0f6301a62baf4a4ec0dbd665d031e4eca2d5114893e405ab01961f7143f2cf95499197ba6f6f7ca776f5619acf0735fef1a3df3acfcb676c94acb949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c85d1f4ec1729b1184a2251029879d9
SHA1526a109a5f5cdc89e929bc10c4179cbf277f3539
SHA2566514f7dc3db51e9a95f1d299a0fb28f3ba0b6c147dc0bcd0563231f984513b11
SHA512ce526041087fe3186cab078ed3692fb2756c869105ab4c79cd10f45f088b9851cd866bfeff1b1dc6778360d604fd5ff77b25db9089945b6a92b9ef23a4fdab0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0e6ebecaff84ea7643a75652642ab86
SHA1c9955acf2851eeec22201a93ffb290139c82a700
SHA256efb9da2d1b39a086e52ff25a7de8ef189c10971707853ffd89c40bae02f784e8
SHA5125cbd1d79e356980f71533e6d56a26c377fb2b10d2353eafb5245c4c7557edbfa29a80b30d93d22c009362649530f6586a4373d43d4388374badc7a19b3757766
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b