Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:19
Static task
static1
Behavioral task
behavioral1
Sample
0838e79349cbe5b48feb94efae182362_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0838e79349cbe5b48feb94efae182362_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0838e79349cbe5b48feb94efae182362_JaffaCakes118.html
-
Size
8KB
-
MD5
0838e79349cbe5b48feb94efae182362
-
SHA1
178c0c185b931f5246a83bf3766ea0a0c347a12f
-
SHA256
75ef06d82363f2d8753c28fb1604dead287dda03be809b8c01cc951a87be580b
-
SHA512
8148c2c394acfdbf045524fc73256f99adb01081075f6b819adf1ae26b8f9645dbb9d5e36ba3a79e674a800823f71bfffc04a543b4892d0e1443b4b8cdbf7a5f
-
SSDEEP
96:uzVs+ux795LLY1k9o84d12ef7CSTUFjzfIOFu89lyaIsjMiIhO5IUFIDiL1I1xDg:csz795AYS/LOEtthbPPRb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000006d869ed2cb089f3e594a39173eaa80e83e3cbcf7a864d91f9c0498e1f0a99dbd000000000e800000000200002000000019d61b0e2d52b5eb49b117e37adc52ba8699cb0d75c2903bfd57c8b28fe1bc9a20000000b499d0affeaff230ad2f3ee7e9f067dd41e6095df7e0e0672f88d5a7878e2bd740000000845bc4f7f47b11d19979ea0b5d573289b82598153ad0c99695d033d1f31efa142f56b2be0f50d3a71436b0da756dc0f1d67764cb034a5ef3c63a7b8a6f97da89 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5DF22E91-805C-11EF-B699-EE9D5ADBD8E3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433993835" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0606a346914db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2408 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2408 iexplore.exe 2408 iexplore.exe 1076 IEXPLORE.EXE 1076 IEXPLORE.EXE 1076 IEXPLORE.EXE 1076 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1076 2408 iexplore.exe 30 PID 2408 wrote to memory of 1076 2408 iexplore.exe 30 PID 2408 wrote to memory of 1076 2408 iexplore.exe 30 PID 2408 wrote to memory of 1076 2408 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0838e79349cbe5b48feb94efae182362_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549f4c9168873923b7aec80395970ab99
SHA1153cde2e56ed0a22bc746b085dc637baa37f8438
SHA256556d4b493ad5ab6ad5bfa32874c7d8da7bb68d09b858241085f1684e8cd3b256
SHA512f07d7dcc1dae3f26485673f37e01c981f11cc9a8e093f5d44c13e77218feec5192f3a7a34def55d6bb16a27cdf2387c73ffb435eecbdbcee752014afa50b6491
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caf3c8fa0502597e79623884dc682205
SHA1e641fb28f5d7c675076d15a7bea29d6176bbfb3f
SHA2566355babfafe2d67eee918e9b19223a5292fc66c4db2bf43b333d630680f0bfaf
SHA512f1ffb337a9e865717a3f908f4e732aa19db2404d585394be4aea45d22c6f49b30b9abb437ce0963cfcba057bafd9afffd7c0973c800e5ba416036c98e8b6b0b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c452ef5497b93bcc80e94f26b50c5819
SHA139e4b6d28de4d18c446d4a6dce16e21978200180
SHA2563cc1b27b5595ba495b4765c76eb65ef9910e0f556164f67aea85016d7d0b9c69
SHA512860ebe20b7b7882b25bbf0a88ca86d06a96ffed3a1afc2a5ea7b2ee292dbf068456c957236a40dc3fbd87f74d8d90b726569ef91a5095eade33404b70b516dce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c21be0224b8cd9375b2eda4c7825ca6f
SHA1ebce87b3015d917afb9a397d42ce682bbf60184d
SHA256927887cbd4b7d3eb4c6363c7e115ffd7f34f8bb5e86976423d72fff863b2a01f
SHA512856ec7d8bb5eb3af338a74dd3628986efdddc841de8cd972f0c0cb5f0481cedc211bc1b36dea2e783699ca2b06274033c612a3f6a72404d5fd509cef607d58b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6082d02f94583f90694d0c622d045d2
SHA12f73fbaa7537a0d32eafbef3fda082120898e87a
SHA256008d73bbfa87cc06edc403d92c07cdc80c641acefef562598bcfa6954c8fef14
SHA512997818d723a84ecf81dddf98a097092b0ddab269cd8b0c0db2a42c8671e4832f5eda74e2605a63e86174159bf0dc4c2213cd648c061ef71e99850ec98d60f611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552932671df93072cfc8ca5997c9f6f01
SHA178c5e8b61b2c169c4ab0d783af831d58fa718bc1
SHA2569d95313753e5f9698cbd9d721616905313803c41c6cbccaeeab0f077390b2294
SHA5126d75ade69bd709d356dba974c4dccde252589ed8adc11ae84604abeedf0429cf0019e7055c589429f902e45199e28c7da75e3951930651c2dc47ce3f9fd39737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb24d4290b8976f87517e9b4c64cc2f1
SHA17d400f0ca2985aadd3abd5b81679d06eb8738639
SHA2560d3b3a6a787f705fbacc8403f26f529b7796b8cefa01d52fdb78fb83203839fc
SHA512decb2292796febec6a1e474120324aafb3135dba162565940b2abbeff29e60cea5822a53ccc114d6157958c211bd74e1d52408b87735baf72e43ea6f950c5966
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588fd4645c53f96ceda146f87c54c63d6
SHA1ec81a96529ae4535d30e99a29c5faeedf003fe2a
SHA25680d94699c8eaae6014fda4082ddb17d36276fb7c78ac2979d51c37f4a8bbb3f1
SHA512c0557e469f1ceadc487004bc5e8cb73e232d492e89b3319b9e6dc494437e7c35dd82e0d0d4de8e8fa71cd44b74e720e25e9bb093adb6ea6772998e3f06740c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505fb186d5247fba26ac99805fc91cdb2
SHA188c658c7ad0b39b30cd2939087002fba2aa5d594
SHA2561ae09c63afa0e9ba76a411760cbc305b5e5b1f4b6c4dbf34debc94e0283be356
SHA5126e0e77c9dbceee9710c9eb682b17f2547063f359005e94568e97a357a6d31fd7e6f60f927135c915921c6543c641ac3d013c6239f386257555fc8ab813892eee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed5686eb60a3b94e7657efeb66b5b2e6
SHA1ebc11bd67047f29e6a466c219523f631e6a1359f
SHA256821060245c35adaa78aef484d98be21b2afcfc4c2ec4959a5622dc885502028e
SHA51239db3c67c0842a7173fffb99a23e5fb22e9acbee47da5824603427530c26dc42bd40f555e7867f703deeffc6f4e5bb37685a5366275a3229589e2eab1b08b226
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580206fa4a8ea743aa4b55ade95e66c10
SHA1bb66cc663465ab9ebe0c09c727c4647bb5ea0972
SHA256027b6cb08ce94a9a37d7514af10abb68e319505c8ac3f374554b45c4b2c6c2b0
SHA512dbb324350bc8876368aac7440c16983af00f973e40a2b481f68d7e62149611565f85f648ffb0de533d38d2ce98bf4b0af110b81d8826fc3208f599fdd8fed1c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba833235dc6ee39457fb8da7a097fb73
SHA1a0c5af8125d25e69d56fcf66d80eaf82103c2c38
SHA2560a6687c0bd369280ea739c044fe7b756f609c729d5041e01b6a1a4881382ec52
SHA512a1cec101b1d6672541bd8d18a9d3cedc0e8451804e91f4f6f42bfee45e67ba8b34cd067c5df499a532bb8db038a5e9bdfbb4c9e042412ff9ae502ccb06268576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541e0edafb61bbe7dafa88bfb86195fc7
SHA1f8a853058a693fb89abb919abb6fb0cf23f9e970
SHA25614581267e36eb10070d29c56bb2c0f6f3b1d87fe1b43fbbba96eba0a54ea5e7e
SHA5126535b282906594a32ae671a85d803e2d27b79acf4a59ba47eebf2179557bcc6cc92d061354f89d0ef7464b13723c473b5d044167bf6dfc11bac4059fcb76c1e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d48e2d6aecc205d79bb2ad48c0a2746f
SHA138c21c375f43f0472343b2b8869b791ecb7853b5
SHA25631d416191aef8f3019903b49a1d7c0d43a2e73bcdbc5878ace468359dbea3667
SHA5127a22e02d3b9f1fe3377719b6e5500c251bddca7c710f454a5a5efee2f9ebcbb3306b963320f2357019d4ed5ec43f12fb878f20953fc255e3f38f9beb0649b5fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf3a46884224351d5ec3d2dfc89c6827
SHA113695a570e79657d7baa571bf4626d6dfbcd35f7
SHA2565d46e1077587ac711c0cf4ab8fcbc2228589079d46812e3c40747d16cd2d985b
SHA5125dc78ddcce086a62d17300acccaaf6a2d91e73b9db0bc19e9dc67b067a38acb2af3a3ba4240999d02ce15c1371c3956acf7a8989578ac2a62a8355832f95dfdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c92c74431c4e994c35aa6efb03c9d0a1
SHA15a06c7277485eb4ef1e7797d027697ff8a9fca69
SHA2567377fb7e5721ade075128c79c8ca4896e049af94308f891c3ca528ef6f8ed6d1
SHA5126aec6a296d5acb7208f11b8b6c052db3236421edfed24d2c05c181b8a5b9cae838c0b599db23e4531f93dda4f4f597268d178a4b732330132a95e41fdbd2b220
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54549960abfe3f2be042f7c4f0014b5d5
SHA13bf7495e5d1b83019b92efc41a047dc877f76da5
SHA256445ed9543c8e84fccbf142bc82a97afca44374cb235d2143b78b138846273c20
SHA512ac0ab42ad4ba4db4ac828568515dd705fdcfbc854ffdc6a0fe67219e7e07948df2856b5627310c1d7c9b26f9dc4e398e328fcb4a865675856cf6bba60e876ff7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d1d064fa85e0b89ad00e1a4dedc7c6f
SHA1abfdd9788e84611e13a374ce4075b4124171bdfe
SHA256e656ba0263ab1d90fd5d6e7becd7e175509ed7c0d9010bfdfe2171c0ffae204b
SHA51270563bc12966518f27ddd12e34c5df18cbb6a032b7d5ae00823209b9dc52940238e40942615965b3ec3d83ad3720a06c8da47217792b3ec530b1ae8787efff28
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b