Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:19
Static task
static1
Behavioral task
behavioral1
Sample
0839325d8e3321aabb1e11d773fabb79_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0839325d8e3321aabb1e11d773fabb79_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0839325d8e3321aabb1e11d773fabb79_JaffaCakes118.html
-
Size
10KB
-
MD5
0839325d8e3321aabb1e11d773fabb79
-
SHA1
e6a293bd8a0446b04249fb706332daa39e8e3c04
-
SHA256
dbaf6778594d487ff40010ed7ba7e00bf7995ba4c5865f8d69b388b789e72318
-
SHA512
99fee886e70787b87de0de1d79a4d9796e43fd49642f075dc181e9443f6149d96db0d412dd332520fed88613630b69f3fae67daff8df9b6d080181c5a1ead4cc
-
SSDEEP
192:1I427wVXCgC70cX48nRYblg5hiKmOZf4R:nu4gNEjR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433993859" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000007b533907fe82114daa90afd26ffa0ba4cd459647503a82f1d86a2bc291908b87000000000e80000000020000200000005ad77339f77d29f4754b634d98a17fd8c025700149d8df15afad43a8f919eb9120000000bd78e67a03039c4cd5beabb859b75cae111118c16ed8c5a610d25cf478f9b28d400000003b1a7895609b43d4958217fc2a727b7f4dd4283cbba9785d95fed82a0114b0ba4731a728ac44c218832ec23796bd3e5f339459063b85f12b2a60e69d90da1ba2 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 808d78426914db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6C4134F1-805C-11EF-A76B-E67A421F41DB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2544 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2544 iexplore.exe 2544 iexplore.exe 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE 2376 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2376 2544 iexplore.exe 31 PID 2544 wrote to memory of 2376 2544 iexplore.exe 31 PID 2544 wrote to memory of 2376 2544 iexplore.exe 31 PID 2544 wrote to memory of 2376 2544 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0839325d8e3321aabb1e11d773fabb79_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2544 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f68db64ce0702ae6c0105dd835ef5f65
SHA1cd517d8df0495c38a69a0124deacb1c66189d97c
SHA256b39c3c15874c3609ac5411839dae11ad74ef8e9254a793b8f18d4d5020d6280b
SHA5121db0c5f9da3ff52551abaee162c17aad7fb982d6d2dc1e19dfcf99061e16c1017d5d0c629a50b3c69f677de768e203288f78f563a273acdd01d5bafd3d5eebb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53edddd451ad1b7271ca84151a07f33d1
SHA161d501e6bd0eac087a221a16fe43963548346c28
SHA256af697f5550b523b76d9921f01e0fdb613e639817afa02eadebb290a8d9e9b415
SHA512bbf88abbeef6ae6c9828b37871c906e0ddbd72bddc1cef5ebb5b5a82d48bf84ea7d5039d094f1d1cb044b6106df9be6a8483f1cb39472f272471c3c4b3f5c046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e02f3c40d9b35f985684d872e41d35a0
SHA1ada52764f28126eba9ef1e53d180481ede69ceb0
SHA25644f2c1af47b54251e07c2002a13f0a53de439c33d91c5e6a5eee7b9a3c90bc91
SHA512dc237afb558128102753bc746c34785b1567df3a9cc556919e1781cce51086dbbfba22b7d8d640dca827b9b653071c68ff30332bf91b0cc8c2a0492c4045d9f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f94f536331e37bff94fddc788b9a897a
SHA1a57110d44558081f0143583671f948d967f7a5a9
SHA2560ca5f5e395832f0ef5f024909048ebccf9a76c2b49750395905132b2f4e13ec4
SHA51255fcd5f92178f8b687dfa89cea53169ec965f7d229c861cd157ab0e788ce049869fb985b3b7a8377187dc4d56bb522fee7803709a9633bc9ec55b87e087333db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4952667e540c1688beb5dfd51d42fcc
SHA157ca10187bab5db43e1f7f611b2b4e0e20c80816
SHA25686ee559611a99c1cf009808c280e6c3703e2c4f15e09fa3d75bb04a5ce64cf6a
SHA51258311de909ffe10474a066b8d898c859c956c276c566807601e97160febde085eccecae6654c2a083d7259edc832214345f5b051a1aaf70513a63c6c0d4bef24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac40ab8fddfa80baf462e7e668d862ed
SHA1815411bd1fc0fa7ab2560a0892bc4a30a1347c6e
SHA2565df19abb50622ea139080222e5e29c8a41543c3da98525e04042fe4ffa394a53
SHA512ed99b453484f5d9cbb77923787c0c6c9240bf0b1e25a106bff9e254a07a7abd82d19afd1b7c68f905642b928dc274eef10aaf0741c2b4cdc002e71b200db8384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585d12a90dd8bcc6a14d794a3c06ecc02
SHA114a54083a9760308eddb48be76c110a2135a2cff
SHA2567edbf992f8b02f19938c97d2bb83fed786482fd96265f78010a3b6d74309b47c
SHA51270c9428c6c61737cea013b7dfcf0e9db677adc684b3d23e78930ad176f0b3006ffe96fbfd0f4d893e0b9e9810a9c522fbb1924d3bf4cb0aa4342ea8fa25f8d51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5591762ae2c0ac8bbdea0e39d218f19e3
SHA14148f06db7e7a0d60fb71beeed4c20048888059f
SHA2560023e4ef9f9a95ada963e0045eff6545b7c2f30a293e5961c667586f497b2c31
SHA5120ed111b6c42c10e9ea5da0c80d831d68f1bb94658208bbb05cbaf02525f3c04e2aded45e586db7d77e27fa50c1a245605c63d6610a2b706dfdd72b7bc096fbbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a4938b618f572fdf5a680c95b0a6929
SHA1550fc8a7b2ce699d7c22f480365789f78da2fd09
SHA256fa47a26b4ebaee6cb99edb6b3d4933df469d998ad9cbb2434d38b8e567a4de4a
SHA512b3eea11bc7fcad4182676a7a571490e262985d83552300a309033f885cd428e67a2861451dbc1e6aeca844e51232d81977dd64bd998f6a44243b2b9ca00b6209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7043f036a6064041914ad4b48aebc9c
SHA1bfadb98b8b0fbd641eb08acb135d9c2d7fd3a6c0
SHA256a6920fa6a1bb651aac3daac9cb0cc072be2d2545b4010410f7e41c7c19935681
SHA5124293b37be378f66fe66a88c39b668b700ffb659e3ecb7f0049fbc798963380a95bc80acfaf942e1cbfad1cc2dcc861fb1cccf6c3d89b8a5a4b28ee1cc803748b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5764134e7d2501e6d726722e81f3d4c61
SHA1239c5bd091a19619ee9b2973f16f55890febf0a8
SHA256e71c46a61ceb9c43c31a17e71968ae381f2128b1c0ee7381bac7d0285f9d2c72
SHA5125cb92c6f38d5f825dec44a8cca3f1560f0ba587a944d637fc6d5adc184a5891db3dd98bdb3b594fbf01dc4916beb78abeb758a5a4af81df812020234470418ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580fccc289ef8529dde03974d9b62f437
SHA1c7bbdf100bc548bc6ad17f4c5a19b4a1f98fc888
SHA256c0028de203b655c3f1f2570d9e5ffdbd2b1b69fa75e7963041d3d855f7aa46d8
SHA512d7091694d194fcedae826705070e9d8e4e1e4eda84c8161cc2ce30d074716f04aa79053aca3b42329896eee85a36cd1089bd08a0014818646ab22f3fef966e67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55254cfdcdac0409af6caa90ae59184ca
SHA17ddc6fc2a0bac6e90e69e79ef3809ca40e7a1229
SHA25681062d77c210b865cab0243784fa3254b287a328b2d393c35eb98f26f9f3148c
SHA512b5672541f1e4b6fc105ec3ff55dc31a3ec377bfa54711b6c1d986cbda860d1a7f371d748a20191912902f3c5ab7bff7c619eef4096c2a288c2d2ef42a6b21bd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552cefdcaa9940254e73ca7ab60f26e45
SHA1bcd91e17056425fb013d6759b20238b991ce0fea
SHA2566c1ec05d75b5b7bc8d75b0a0ade64f00a1231470ef6cebbd6da2adf022657e20
SHA512cf476ea6f4d3cfd215a95d348a389bf19dd99d5b6ab7a9cce9aff1857bfc04c804bafc507db08fdfc6d735a105de53ae900a6f02a5996f583b0a5cc7c76c8535
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c687949460c66bf4095e0c9cf930d541
SHA1e7c1eda3423058929efc9e50c07ea375061b2f3a
SHA25651b02cbe8a18617c185beadfb2f0635d6ebf4d7c0595c05b0df02760603ce761
SHA5121a59e04a63afabf9bd04e3b3e18a21337bebfc49ccc4941e8087c230766c8cfdc252ff1b321d036950e5fdafcff98cb096b02f9164685748d96010696ea608e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c15f0ea9880ec51122a732735d7c84b
SHA17848e2eadd820597e86d8593418d6ddc0b59e01d
SHA256d1c4d3ae49193abbe47562669587d47cb081c3f8d29e4eb121a76c1c5ffea54c
SHA51227d9c6514e593c3e765a249cb79eaa8101ef3de7a3b1bf5e6634624c1130e86877b723c1f6e301b1dceb098832be4be0bf7dab00f6f9f6a3cf52599693b73c6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c12b4c5bf4b068194d560deb2ab0a38b
SHA1232f1436094227a926d72c666a83aef40dd72755
SHA256dd40e8088086d0f1ad121f7e6676191c94b3bdc6e6a75965a971d8d5355400e8
SHA5120d9cb326f8240f2fe975702f0076b6532dce1e673c38530e7991116686704aeba98f68dc260bd0564428c0ce49287253589551e78c1b8d8ad21265fd48febd5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cdf33f7988eac4136d2c3276645620d
SHA1a2e4301415ef17e4d2eec88fc6179eb1f5129673
SHA25615d5345a43d663cfe41c20a0f14a6467d9d80102374c9a34ad1c9f95654602ac
SHA512219399304c39406a8f9e7846ffabb1d5ed6678a358a5863ab8ff2d78a8db4fd1309394cccf7c96a7cbb5b36a6476784662bc8ef0feed848abf6a55a199bc3de6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b