Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:26
Static task
static1
Behavioral task
behavioral1
Sample
083f9e7a4d81564596a235f5ce35ba07_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
083f9e7a4d81564596a235f5ce35ba07_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
083f9e7a4d81564596a235f5ce35ba07_JaffaCakes118.html
-
Size
14KB
-
MD5
083f9e7a4d81564596a235f5ce35ba07
-
SHA1
9a8ef4fe5961d2cdfba912b3f8d139407e86fc54
-
SHA256
a6f23a261f23697fd343ed1a52135cb1106785e997ae39261f70316a45c084b0
-
SHA512
531be315b82c92b45449bc8ef76d1adc85e4789ad16e9aa1bc91624779e56f82d5d31261b1f7ecb62562202f8fa955b855344c97d9795097922ae0651e238e53
-
SSDEEP
384:j6YvdpAa7z8bOoN0wNmTKLWTJkzFBBgKF7XmiLiqiRi:j6Yvl8baYFUi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c05f29336a14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433994263" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5D158CF1-805D-11EF-B578-7A9F8CACAEA3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000d25375b214046b8a7c5776b321257fc8ce6ec81b4c17dc3a547a2b5ee6e2ae8b000000000e80000000020000200000002a2285357453ed49cfe176dd09983ee3e62b5f1d3f227c91da360276e2c3f4c4200000005d4a28a6c2674875c311f09b224f2d2b5c53f97b2a7dd3df4d55e165797006a740000000ba0baca85868f2bd5c555b8cb71efb4885cfd03a7bfffa24fae15a6f95197714f3b2e6484c5caba7fe29eacea7652190c5733b948392d3575c0fc26c5dafbeed iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2120 iexplore.exe 2120 iexplore.exe 1932 IEXPLORE.EXE 1932 IEXPLORE.EXE 1932 IEXPLORE.EXE 1932 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 1932 2120 iexplore.exe 30 PID 2120 wrote to memory of 1932 2120 iexplore.exe 30 PID 2120 wrote to memory of 1932 2120 iexplore.exe 30 PID 2120 wrote to memory of 1932 2120 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\083f9e7a4d81564596a235f5ce35ba07_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe4dfef70fd58f8a3500652aff907346
SHA15487a8bb1b20e47cc3dd50fa2b98aabd00a98015
SHA2562ebc2bce36706898f3b6c1942f8f3b4e7772430e55893b1276c5d180d89b600d
SHA5124392e012f6a2e9d4857187f89d7b2bb1ae3d8d28a01a3c33f5fc602700033cf4852e88fc9ae33ba887979489f77255f961f7c84044cefc9dcaa165907a51b1f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1f012d27cf0a14b718f59b9bb8c2c76
SHA153832b1db53466503d0d05d39fd83a13c3defc46
SHA2566889b1c8eb7989e026ae31894cfd340e40abefe2870f46d3a1ff7b49aeb9c94d
SHA512870b74dd64aea8896435b5f67046f157be9427409adc06deb0be80f4b773efd4b21dcd1f48198be6586ce35614651e464c2000922f6241bc12a789d031b680d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5464d18ac976e3c8ce3a94fb2161b7cca
SHA1ff79ca8ebb183e428f3fafbf5024c0544cfa6497
SHA256afe5c76bed19171d03e21aa0121ad5121458f75194c880a92c373eecfd6bcdd0
SHA512f50e999185ecb11297234e85827fa9e8e5a6b5664608f559dd558fdc275ca5fa9cd309ff0888fdfc3b9f2c64e126d292a67098cf28efd019b35d47004e1899f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c88d0dd9a50a95bf74d72705453f5ef
SHA1cd558f08da2c2beafcced536ce648bcb90ccb38b
SHA256df646c94c91d89326bbb2f25da2ccb8ea0240a6e28a126c55e8568cc9ca986fa
SHA512129ed09d583e7256dd37e5503ec3c279adb5916e31c1228a268b464d6bbe56c35094ba2d64961c77be482531a305bb77346d9b4cdfb4f52c85174fc73b96778a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549e257797fe747c057591a0966aa7181
SHA106e2dafa97bcf65f493c82a72b7cff3a8c7d52b9
SHA2567bf275b76a9c03d1c6a70b9a5b92fe4a03b413c848805a8876210d53e0d95bf9
SHA5121b9e9cc1a03be45c548ef029424af0f6dc4297bb5eb9cdc584d6eb8ae2fdf6538fcb42024b457416a3ccb56c39c0775f8bbcb7dfa86fb8c97d0472a70a6b3d87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57302bad594658c27c3480b9f99ce2b2b
SHA192e62a09d6881deeda9b36583a6dc3d9233d8b7f
SHA25684a7750cae681886b6e8c7e6ed04fa12c8e3d93abb6544ac38df1984c318fe83
SHA51291a34a0615e701f15890189a477d297416d6715f9965f313019bf91d5d25b1fe2f018506fe2fee76ae6934ea8c4bee3dd44f978f93a6ecf27a1ad65ddd1bd3df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56682a8ef3f0dcc946ca530817fcebe9a
SHA16e918c243119541ad073e2b929f0458c89cabe65
SHA2560896bc4f4fffc7ed87c42e8a8021ed50d7706a303ebdae816b87c0ca597db942
SHA51220d8a376b5ebf71028f0b8ec9d977695832f18d6d77d721af0ba91d0f4ecf62b94b78f39f36de35481e01df64898d946eb9e0b7b2bc2ab3d1bda3fbdd988f04b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54890878d3aad03c56d31b3980516ec89
SHA122ac7b52ce653f82a3afb02bbfbc8ad24bc07f93
SHA2567ed916468cc5829ba4d5f511aa0fdbe947e56df7a3b3b434f864b531622a4956
SHA5128e5febbf47dede43b064549649ca7d27a3b81458bdc83cd09a656e51df25619658178eed35cc9ac78d8eae7f56dd12748b897a50f29762945bcfe4890fa94796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c7d1be7acfc01ba30598d0e77f43da7
SHA1c2d6aa108c67a67fbe19152b6a71cfccd9a5d0eb
SHA256308bb17c6ed2bf4c476e05bebe2df33541adfd9b3497b491ec90cf0158b8a701
SHA512c3ff304c5330930eeca56b713090e3da9a423c2f1a915ea40e96961217adb4a2e3268c350a327bebadd0466423fb653b3e9603c11df22ae9fbc9462edcca6ba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1fd1efb7bea49d1e7e783bc9e9d74f0
SHA19d07dd6d658da121bf54b04071ba352ba5826ec4
SHA2564326a0c283d1d6425c5c30f5be331b4066e6726e32e236a4edc8e85c8d28970e
SHA512427eb56568124ca6fb608e6f426c491cc71d027dae4cac7c014e94c0a16dcb3b6f082bacdc898bf47c4232a29af8683a0d4a0eb13f3d31ad809b2431c5e91003
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54feeb6a8a8a989e9b4869180fcb0d092
SHA10e67bc7277c4cd6da88959a31e23f19793e1f3de
SHA256342f9ac56980dd0640ade6a4d4601a9f01aabc35239a52c5e5a51d7c3b15d4b1
SHA512b7dacf3e5f34aef9fe949f09282b7a5ca0a348ce8aa80e6caf31265630f6aa7a0b127d5989b1a5a2527b8ea52ae1800de3ac1e30a39898da8710f8491a8b5d02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cca0e0b28883cdea2219d07263748ff1
SHA14134af444b2f900cddfc39fccc9e754537fb4af2
SHA2565f5b9052075b176e16333cec77f8219b1274b40d454168ece6e7951e16c038f3
SHA5128a2140b3d4b0909ec8a35726576f4c76afc98c5095fae645ea84b837d8baf1c2ead2024918025de4da3b380ae22924feb1df4daad8422d63713909be78082915
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500db40e187ac11dcd9aeefed3ae4521b
SHA1fff03e6d32b090e087178971bf9ea060cd8b36e1
SHA25688d1b35eb64a25fedcd7a31521631355cc6470e063acd188edd4aa314fa8af68
SHA512b82c0614394909f0fceaa2989b6724817490c03ab2ae27dfcfe8da93202d352fe0a355134265784a1973403e0359aeef8045fb06732bf34e5a7fdf152241c570
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1a01a02a12527751c68c80c5b6c27a0
SHA13a14e4750d0e2a95540f0813449e8cff4bfcaee2
SHA256419f0b2dc743ba2eb8896afd5b1c586f01a86b4e40abb3807fcf8f0b111836ff
SHA512b4349a2c839294185c6d519da9d5e0034752adacc324ed1ee1203ee691476d987c50657961aade8cd22c2ab306623bd0384ce44747d20a718cc366f91167c6f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519132f2c71727c506e94e2e3c1c34e13
SHA1a5da71fa7f5395e7642623877df7bee11d16868f
SHA256ecd9a2dabe43a9ef361be6d2a90f367e9c89745ce0a018ddc76739efd41d6bbc
SHA512fb64d6e5a95ae9c2fe6990b45c37b51cfe2c3dabf9341f29e839cbba400fa427de5249a214f06486dccd12139b9c6d6919b8b6265348f639a4ae705fc7afb82c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbbcc911259d6224d3f9b55728677f09
SHA14def0f9883ea8133ada705128db19c6e4ead0e5a
SHA256b7b5088299a2206cb7e7996f1101174799e1d3a90a60096b01d0bf5fbad0b5ef
SHA51284fcbeb8601195e17a8f7e6e44cdb8b3ae94ccdced30499433f0957aa45b98322fc5f2677f81be23645fc9be42c02b1b71e0a3ddbad81928997caa4fb27264da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d21152aeebe71753fed331cc21700579
SHA1e78d45e6690d263fe05463a55ad0e7578a1b4dbb
SHA256d06eebdabee206246df0bf52a5727ed3866875c1fb170c94d37862a24da51bfa
SHA512c2d9b67692430555ad7143a595dab9330696e818ef2f64ed5b7e24b9ac8801a69fefaffccdfea4210ef7c268a717c7d659ebb96a8dc2df72cbdcbdcf400fa0d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52af27de6dc39bb0f989d7544c1430286
SHA156fb2baa5797df126e8e4685ad71c1eaf508a252
SHA256c15a694ef6cf3998b75bcc6b817a4ec70b20e1da43fc115fc60cf6c6b1c3caaa
SHA5129d9db9277236cbad1ac00b626a8e2bb2d5f819316189b511abd9c0833e019427e50bd074e26e35a984ed531b05384199f65f79efd2ec41d173e9283e567a569b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569252249eefc21b50b2a783460bb8087
SHA180d8e3fa30390e90c2f6ce57c723662e4c42b088
SHA2561bf14271978d47679e15b56b63209947f39dfb9b112e52193c75eb0b967088d0
SHA5122750507bf9070e2ae3393e62fef1568af5b92ce20f838445249b9ecd9a9a4692b18f7b0f3fa1ed2a61977f0b9dea35cb12d10cc1787b7693c1a7bc11ae274f90
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b