Analysis
-
max time kernel
137s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:27
Static task
static1
Behavioral task
behavioral1
Sample
084009bb22cc976bd5065c685bc7c702_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
084009bb22cc976bd5065c685bc7c702_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
084009bb22cc976bd5065c685bc7c702_JaffaCakes118.html
-
Size
56KB
-
MD5
084009bb22cc976bd5065c685bc7c702
-
SHA1
326652c8dadafea0d2a497ce2985069a0456bccd
-
SHA256
a85bd84aa96b210c78916fd3dc01359bb81071b07d7234fc141cdf5ed5038bbc
-
SHA512
288151a541cc404e6a672cc4d23cad80c6c7b3fa2451d1b20889fca3a3632fc3478fadf80f6c1c8803e8e921d609762a8c667611b3e07457f7a9915e577209ef
-
SSDEEP
768:Zcd9QZBC7mOdM8PpC5I9nC4b0obKVi/HU+bPd:gQZBCCOd/0IxCo1x/LbPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433994290" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 602b75446a14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6D1C2691-805D-11EF-9C49-4E0B11BE40FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000062b102968accf42f87627e7bbfed355c7d548835b4b4780dfe23f21e323746e7000000000e8000000002000020000000357640c763b4998fdcb3dc8c2edf51fbd45eda74f08ab1f1d7ab15d7abf76140200000003696c21e8736bcdc9238eab601d6313608818eb36c127c05e5787a48b5ebee0140000000b4d02044c73fb843068cdec1423ca52ed8f4d799bc3fe1e375c2a45f03e98e705d2c8f4bb440310efe24106902c6c04e93ab40144c0f8f597026829e7bf44171 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1704 iexplore.exe 1704 iexplore.exe 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 1280 1704 iexplore.exe 30 PID 1704 wrote to memory of 1280 1704 iexplore.exe 30 PID 1704 wrote to memory of 1280 1704 iexplore.exe 30 PID 1704 wrote to memory of 1280 1704 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\084009bb22cc976bd5065c685bc7c702_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cf4829d85634f3316b26c171e38955f
SHA12fd4b78ed96d52b7b3e824b30e2300c7a7004d90
SHA25656117621de9ba405029d75374e261bb04c499db082a4813807c183270bd10b92
SHA51289c3c893e675998e1dfd933ad701a11d09b4aa5917a091a221d3922cd077cf475b5b991a4fc56edf9aa109c47e1c85b6a4c6be8919c35e46d555064791370d1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e8ca2336e57446a578ecc2daede9049
SHA1c5dc3f085077f0e6cbef89ad29f1ce70dce1ffd6
SHA256bd021749c692fc7c5d6823ba5fa75fa19fd0ce3180f246a8a5e57851039aef17
SHA512a7c0db6a141aaa8788d9c696ba7f5dd3da32d23f867e2b31e50cd059f48d710d691c460a2982711c187ef5e5079274b6896c4d626e431294cb09b22f0c21b2b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c809df3d4fb47a91353fc08ab296003
SHA1b6758283c6751a7c909062763cbdab4b3c6c2925
SHA2563d0a883af611b9e1867350bf51e790c0be7305a362c6c54b4ac43d99f631e036
SHA51213b59016b613a5983904ab709a250d3311010410acc852a4ee327b731bac47dff834165d5c1a5041b2fce53202fd8a82d90b2211f69407d10e190b67e136f37c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af9f118028b02f88b702dc0021abec32
SHA1cdaf41eca754e3b7cefaf4eb29048a258539502f
SHA25671c2b9457f7c422f7078d4215e66d64f03f328204a08c86581ef7ff7d916eb6d
SHA5120286bf4a3ea9a3269cd2accee8a87f784102d60fbd09fe26eabae4542230f3da03e845dcecaa9887d95e85983fbc010ecda597d100e4ec5f66143d1abd24fc11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54abe0c578c5dc1e8362046d699774d76
SHA1b5567f2dfbf15e39eb9b11af989696e6b863195f
SHA256bba27e1a16f8e16888fa8daac00574039fbcef9afb9dea43604d5baba501ab42
SHA5123fed76c81308cfef73801b97fd7453657ae7bf4f05c167a2a36bd7d5ca0a8b4d00771cb327252824190a4524b9e4499491299ff9947accc0fe4112480749543c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513de9705a744bc2c005d2e3855cb15d2
SHA132ce28a36b0d01bf480d24c0b0d7bf9d11073160
SHA25617bcbddd56d4f3e4b24d549df103326dbf793217ad6b6e0b20d2fa26349f0925
SHA51254ad120b77904af720ea7e1581e2f237db9d94530f4ef91bed39e9e390a4d90ec634331abc3c6566751d3f1a195bfe2cdcd32aaf6c8f9a6a45b385f294bf7e7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1ed7c16f1f89d8b9afcc975f9e41b8f
SHA1972663f0a8050cd6565033e79c15b7d5babe2b84
SHA25685ea66274ebe1cbb8fccc73c5a8a75ad6a9c9d85892123fd8ecd93632cfaccce
SHA512341ea815d40b2377d818b1a777c077b6ae6c5c3ecb02001ebc3ce9970e5616e0bee9ea5ffd48f5e870acbd2ca44d88179b30b3726f99e85945926187fe6fcc5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5942205364730b7f997f9515e46fbf32f
SHA184758cf941935598d3c3e49019923e71eaf20d3a
SHA25667651bb5911dceb4b5809b168677fd2b53d052c3c8217043cd92606c3670cd87
SHA512b84ee0fb26a090c5f12c014bccd2236bfcf0f64ca68b4f64b23d77e95d4ace9938177b0d8ad7208672c42fb4a1c96300a4b74471af7004e3dbba52da1b7b851c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563b1a6b49e3a2ddfd75e5e15286072c4
SHA1ad67d30860aa614a2ea3d0bc0cf6a6c878ec9acc
SHA256d374521e0564dd3cf171ee9206a5c573dba8df86963c21dacd563f8c15288ce5
SHA51243c5e53d039dcf103b9e74529f16cd2d60395a2dbccb84fb21b8404bb14b63a9c6aa514b4565b60b2b6aaf908a317dd5332b3bc863319ca1c348460e7c40ac6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee221afaac7d66bc606b5de83ba04621
SHA167c8bd6f4cc8e183520565fe56eeb34690292951
SHA256dcf70e6173abc90da522357f92cb7cfb057df507c333811fdfddca3d5c4be93d
SHA5125c291da838ef9fcd39b1607163bb3c2b79217b606a7feaa364f09e36f75481b947336f2f5e70385b6734991a7c99c3752cd5062ca967c877b6cd0ebd4a3899e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586dce4eb06ccf86be6acb25f3bf3d0af
SHA13d177bef5fe1e3f48817b2015382c25b23124093
SHA25613de90e7909cb922fc815a6a975db5aeb52c0c49f30f4de67e29cc9f1d013f23
SHA5120c064fee1345fb8c31cfb0be31740840e409b2b30cf2699676cd18dfab873468e897c7e14a5286a40cbc8a346a7a8235682cdf9cdd40d75046418bffba6a3c1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b8e34888687bb15bc3c3e83eaddca2b
SHA133005bdecff009757bf35559d54c3502a0df6451
SHA25600582561d4445868c628c2407ed3f8ae7c8be8e6d280fee1b91c46646456a3ae
SHA51253e5e13c1e8c85e82b20a6211bf398a97309e79fa0b0c252adcf2904543e2440b1436f14e45c2fc982e9ef2789c37b921559e0eaf2d64b4fffee9b9f269c0791
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549a8129c88387238e24b9ef991937760
SHA11bdcefb6a2b534cec3626a584090d4310568752c
SHA256594e1a2412a7d6e8b6ee44e17305c02adcef0308a89185e5bc87212bddcd7c8f
SHA5124e23fda88a941a6d8c953001366366dfc403eba5e66a0a45dc3642febb7b0bb2f80818a708917e0255c5e27532d84ce76846b05b98f4fcb0517a0379ca132ef3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508a57de80f94197bd72abf1293d49158
SHA1b63ca52fd4377c8f948c4510725db27ca4517703
SHA256e801067d68f4f79bf0ef79a32e100f94b7db87d724e8f28709e86f87bbba3a4c
SHA512271e3b91665be7de642324fd97c62cb3b4c641ed9bf1d88ca894be6636a755719535b613cd7a09636ec80ca25c57fe102a9998f10057426faebfa19a1b887d0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f281e74f193fc28486bcdee266699ab1
SHA1b65d7ae7e03198a1542e4a4b3e9f0896feec4e63
SHA256c0c210afbb1c000480019bd7ab25226db24ef6d02f39c02ba8a7ea7d880d59ab
SHA512c02c3e53ea1181abe5a5a337d0aec97948b05eb6ee2531c92307f1abac0f7eef2d98fe31c38d3f8491752f46f2de4a1103a90d9397cc244349bfbf802e5bfa0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566105794ab20cc72bde4b9b518b72bb7
SHA18a539cf0a00cd87d4c0ec2551e49b4f61b89d9a8
SHA256c5254e980137b4af50de9b25d20576e2dd3efa124fc3e125c12ee3fe6cf738df
SHA5121eb522bf4eb832cd18141ace8d4904270be9c07aa9262ebe33bebeacbf2853c1f78f28444deb484d13224320a6c452e9b31987edf315d87da904fdf98a7b6e4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575d322189b7649b1c91001e367f4354f
SHA18e19c9e433a68efaca584afaf050c46200cac310
SHA2562d423aea37dc3884495b823bebc6740bc80aef1a8c1377337a6703c644f6f13e
SHA5129f90e66f8a95eb2c0749128076ac93449f7fa022d5029fe88e5f55a0d5bf2d43edadd61b4ba09aca687c6c93ac5834ea8cf20e4d79ec96847ddde07759dd7d33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1845c11ad8c657cb263cd9dc7b645dc
SHA1a456039d4c198d87fa02f87329fe939264a6a316
SHA256c5729e5ae95827c93d21cd47be2f0b69d72085a21965474dda5335b8f0ecbcc2
SHA512156e6441c21f9645ac118b32fe5c6fa1c1c4330bbc3766f0dfd248b426cc2c08dbce966ffa3af1ec64721e75737ccc1e3e399af8957b4034df764eb1d069e009
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b