Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:24
Static task
static1
Behavioral task
behavioral1
Sample
083d55bf2507187562c6b5fa0ea4e6bb_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
083d55bf2507187562c6b5fa0ea4e6bb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
083d55bf2507187562c6b5fa0ea4e6bb_JaffaCakes118.html
-
Size
33KB
-
MD5
083d55bf2507187562c6b5fa0ea4e6bb
-
SHA1
84970ca6135c73f81cc69dd7889cf4211116c475
-
SHA256
2c0473ce8cd4bbcce88df97d4c378252db2243f39d910e5995666cd5d85ea04d
-
SHA512
069df351ca8c3b6bc46163bbc8a2785b05ba0b6ca9e5bb668e36edaad320b67200453daf2129e7fd44823056535024a3e7db1734018db892e96042d3bcb0dabd
-
SSDEEP
384:Cyi3E2CphnEZshiROvslfSvUlfSvFlfSvnlfSvCalfSvElfSvClfSvXlfSvXlfSb:Cyi3E9hnEZsU+Vb1TGPh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0438E4B1-805D-11EF-93A0-E2BC28E7E786} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000077d09d2e337ed9f050673bb30d602db5752970f5586cb0377b5ec95561a13004000000000e800000000200002000000076c714996c839d9f4af4478b4c1dcfb2f6edd32e23eb10a73785b0b8a304d9752000000067d531be7894ff1a7134f7e3c8e74f9208e5410ab510aa80206149d95629abad40000000090f77a1b2b1be94a1f4879be9e019784b3b0bc6d561b80bb2b8cc21be0f5ce0aeba687838d900b66475985eed5ee55b046a8cedc7104995d2c0ebabe6f7b846 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0a2b5da6914db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433994114" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2296 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2968 iexplore.exe 2968 iexplore.exe 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2296 2968 iexplore.exe 31 PID 2968 wrote to memory of 2296 2968 iexplore.exe 31 PID 2968 wrote to memory of 2296 2968 iexplore.exe 31 PID 2968 wrote to memory of 2296 2968 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\083d55bf2507187562c6b5fa0ea4e6bb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2968 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bed4505d1489a48f57ef3d774896eda
SHA19d2a49b4de9948567527c0752e28b4763c90e090
SHA256fc7f22dec778a0751cbefff53ff407ed058479ab47999235ef7d785c8607b417
SHA512458e7c152f66beae636efe1eaa0ef5a22e32227add5bfe06ac00a96ec4f862ed87a5b8be6acc2df072869413111df666d310ee96fa5da9b89525e6661aabdb1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b116e1e817e2cf958322b247af05c91
SHA157a13dd83bc3c04a4c176f7f116cbdb9bc39ba21
SHA256584c4784faa88eac21a911a1a01701f4ec63542e03d8a3dfa1f475ada3991eed
SHA5124377bb410f758be274d1b14172e5328f56b1ea0fb2bdd426ad8ead0fd54e99305b92f2968c4d64d3af64e4a474c470b868e52ca0e7df18648a96885930967af9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fabcbf9fd07841a167c98cb5525b721
SHA1a77a68cb01ab1372d50b1a28bf804a468202ecfd
SHA2560d00fcf1f36e5a07152bbaf26b5172b6e75e588c743daa5b7b9d2db91d7626c1
SHA51274d91d7b9530ba95ce54644533f324b177d7258f53437e855dd564c9135348d1855d1fdda44ee5ec0c16deaa3866e79e96381fa8210a64359d47f9c9f59f3558
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c533a38eed2226b2c58b3535bbcb4c5
SHA16ff1c0985177970632c2c84510e0395d2b5f9d3a
SHA25618fe88426c4fb6e9e6b4740457b731c01a00b20980e4d7d13a2b34674177f961
SHA512193690fa86c41a8a4c187bb3700e34bd78367e90d36bf7141d9aee63f5654012405a7ea63e4d8a46f3de006060336d8a87c5c511d99ea9aaa851f8382c92a6f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526783b3e93905d56da16ccf74448bb35
SHA1c522e2232a8e0bb0b8b0c7adf9acda0349762119
SHA256cb913965fc408e80a5de037b0ddcc9780fe7204338e33e3fd2439770a7b31275
SHA512f677f4fe09a0afccc625f9a23599f46a341f2d38e80c55ba06943cbbbfcd09f735018c52e5be55b8c58b8a969088910dbda6e85641e143f35afc22a6d391e761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5772b4600125c05ea89b8754c953400b6
SHA17f03d4f46a541e545fe43294ec654cfce23a6914
SHA2560989c64b5771efbc4ef4ae41de623772966285df50ff232df7cace6108b1a2ec
SHA51244467ce7a66b22f8608d5775b3e5c9a68fb685b55be9a15fa05c9bd131fa1c2102bbc12739f73376c7594b45d3b37ca1526104bc946f89a8f635f0106f638bfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552a9782143a6c945d441d93e7136cc8d
SHA1b06d5261e4a692a6260ceed8dca1777f704aa8fb
SHA2567d30dc01e3007dbb53741148d282424c87cfefc7a1b479aeffdd4e831a4b1675
SHA512398e7da3825dfb6a04d1d6e7927e90bdbb78630159609e5ad89fd18f162cc301df6816a4a6b5582cf54c2cc6ccf59cbb353844bb48b15626a33b6479d9f79086
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5206ee61350bf47221b8db65f2c13c031
SHA11a3a2d100d9603af50db3cc0c4809c01a4aecb4e
SHA256b81c2dcb786cf17270335fa19eb129bea0a1ccdea8de1ab676f2a89ba64de42e
SHA512e65482cee236ce6dc9e81b26e6ad67e683748da0794651926c93076bd0259fb8180b0e3deea3880563bd4b01691c367fbdf6feaf4d6347ae8b2e4dc014adf05d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56430948f0c9d4ea28246a732e95289ae
SHA18ecf379b39d2f958b5f06922ba06110626708e9d
SHA256e85af45d46f1a03276533cd31b8526b4d113dd41bac5319d8bb04c2de2d8e6c1
SHA512870f56340e160f4cfaa5c5af72c12c99981bf23da8abd53c516b057c56fad5accec8139a4c6a90f71f263d04914342ebd2e4626982b158324df6137fe7d2466f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505ca31233909392584d0110c8768cfd6
SHA174f5b641b1da4379929e776e27adcf184bed5c70
SHA256c1fa1fe86710d4f983abbdc27d3b86027ff6488b37f44b6a41860a9c35e15329
SHA51205744c2564a75bd36a5112e9e0402f5aee92efd81c1590d127f7691d546d75c317a27974f364b7a92681991741ee84851f8056cc4457d639bdae069b489f47cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de5f0589594fe422da4287340b9b8256
SHA1f96d811d591dbeebd49223a49630322b02c3004d
SHA25699928892bd5fca9edee2807e2127a218116e93070cc7d166129854139cdc6913
SHA512ca140c365c786f1964bce5c57b4ebe1da2d2102a82ba8ca0090754c0dd4f3d25e35fd58ff96d10cbd289f91a4aebc2c84e36ff86f86dbd5c8959385b0d4de3c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5527923cf07965323e75633769efb75c4
SHA13afbb82fcbf9870380a43347b88e8fc73cf5b28f
SHA2561fa6a666a8626138230d8f19bb764d0fa86426c73d1b0bb33b543cfe05b2ab02
SHA51244e5ce3557c46c7ed246d032ffcfeae7db539a74ff62eed1a9467aed0e596c3bdb67c1fa3e028f831a207f6b9dd9e451dce6f0cb85cddfb3f41b83bb86fece97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531642d8cfebb1aef3a1a5cd6dfe4b480
SHA1a0bf708c212b217054957d139c961afa2ee3ed15
SHA25640aee3e5cec579a8a21ea9a8f2d26f44047bb0e5f7276137a7653b71fc5042e6
SHA51227b2c6ba5459d1791548bcb0fe569275fbf99882d769850127d79ba9938a86aafe46041677c9a81e914ebdc2334fee3050f431ce096aa2beb9db10635a586430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae8e49015bf93ba2ca9733162bd02f00
SHA148dafab1992e221ece8cd3fa2a25a8049ac11d3b
SHA256ccb0bc8373b90242953c0244aafa10d6ce40ddbd730855f078f8d22734470c2e
SHA51292df0a5e8c569d992aa86f4868f7a2235b67024c1b3818acab04ba286712a4c8ec8ee89adc3ac09cd6c783d25081b105917b33238f3b4800998479943360bd6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588a4a4b44e69293b9b449ebdb1dcbc33
SHA1d8b277838d08258ca4f0732a11597934b5a349a7
SHA25649a9b2beb15a571a6b3aa9e53bcb16d523300a7bac30b1ebd1f55471038e915b
SHA5127d7f2dcde024480fa5b9a557212ad7387ee5e86b66214ee3b88804e1062eeb6f158d6928b68b9811251d7a5f1098777319e02e9ec1c67e150728a7d0e0ce6006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e510c163126bef234c8b54be524e6a72
SHA1689e4e931ef0474351d9a3f8498980a592d0093b
SHA2561c38fef6278991c56dfbba8564a155843ad25d1f2df1212a78d93f812b2c7539
SHA512f7cf2e939988ff4cb8e11c387bfb3b5b9d31887ce6f3190f4e288467f21f243cf5f5c184a949128c62c424e14fb5cf94c10a631dbb2fb516558b071a9daeafd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c42ac3b17287899a6f469cc3e2cec3d9
SHA163f3f1f68585bf147e5b8a9388337531e4d63884
SHA2565e9c203ce3a5a9aa8e1dde14f6df87413eb1f0daa747be8fb8d3b65f2f469ee2
SHA512f2bb653808ba6a11211e3ff63713540b4b9b8edbd82dd829c9abd37e2551f5d72d4ac0f8dc615c6cb1fc3939656b7dda6b4f2fef6348264141b20e61bddf70e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f431ee2b2efa940aa5ba76bf4e4188cf
SHA195e6d9898d0083f2c04e2143c03655864fe18358
SHA256e54bf6be6a0809cf352708e77962213e42945071a943a61d974c68dd737e4207
SHA512c1431c8f7361ff45b49bd211059fbfcb925f14bdfec53688c37807500edcd36e1eed11c0acaad4c7f524f8ab9d7dd3047a865c834b0e56370982ff6060ba4d0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c055299cd97d0bf66379aeb4733b97ca
SHA115e224acbeb206e0fc0846b855a8a8c2525a151d
SHA2569a8f3c48402ac3838cda265b8e0ec12edad56212dff6cfa0095d0f36b111bac6
SHA512030c4ec60dec7837db25066c68b9530561752037696de95e826ae9c104a6de3393d6e120f57dd2c44b6336a6319d23c80ca757c6dbdb6dc47e41941c0c4a6e11
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b