Analysis
-
max time kernel
121s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:28
Static task
static1
Behavioral task
behavioral1
Sample
0840a06aae336fddfe7b9edd68922f4e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0840a06aae336fddfe7b9edd68922f4e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0840a06aae336fddfe7b9edd68922f4e_JaffaCakes118.html
-
Size
21KB
-
MD5
0840a06aae336fddfe7b9edd68922f4e
-
SHA1
aaf65aa27b3f483a3a03c9e1eeec1f9bad5acaaf
-
SHA256
b5ed9a368e67488fe24d018ed43b491772ca056baf41edd58ca37910bee1a913
-
SHA512
78a17a02764c6bcfb07fa6b54f1c151dce3968fbfad7a42ec578dc86163196869a7646fbf9afd8dd30da643cb74c15b7d3207bcaf3172d84cfb4d7ac7bd8dd39
-
SSDEEP
384:qhlIc8tf4I3nGTHRR0rsQtHxuOn6Z86/gbpLOXguLZ:D/HY8Yg9ExLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000005735d4abe0d3bb90e3f48d87c602160f3c495b8a8fc78a4d0b3668d37f32b6c7000000000e8000000002000020000000c826b3ae1f0f799db643c897162eeaa589492305a699950580ae671643d43b1c20000000d42b91d62053aee6f40ed693bd0f6096cdf5ee928268c5781e3e8c057d8137a04000000017ea41d02b0c2f74b7340a3081c3e0a7a83a51ef93f43080796253538fa3fe27e7be27406ab00328f84e61be68d6e6901990ef6550b784c9117ae531f8c35ae1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{93E59041-805D-11EF-808B-E61828AB23DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0de6f946a14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433994355" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2276 iexplore.exe 2276 iexplore.exe 1900 IEXPLORE.EXE 1900 IEXPLORE.EXE 1900 IEXPLORE.EXE 1900 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2276 wrote to memory of 1900 2276 iexplore.exe 28 PID 2276 wrote to memory of 1900 2276 iexplore.exe 28 PID 2276 wrote to memory of 1900 2276 iexplore.exe 28 PID 2276 wrote to memory of 1900 2276 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0840a06aae336fddfe7b9edd68922f4e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2276 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dd81e87d7cad9dd7523aaa1c676a59d
SHA1e50a216c588834c4ef2d8fc41060116ab1f68b1a
SHA25668d80d3cb6d091edeedf81e148a1cdd1472ccdb57b6d3b40477b51d37b2b6112
SHA51299bc22edaf49535decedfffb3be9c43854de528c89c4efd102ea34f0fa28ff822f8050b7d44ca2eb60f7f14eadaa57ce95a71f4f2b8400ec49e5d6b4d7e52235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5338b0fac7ba2cf558ca5d2f1a5f85812
SHA170b0775a2185066f5ef1373e81f3c96748b64cbb
SHA2566325b2d22354d182e56aff32394f7801626b0e593933c57981c1260a0df7b5a0
SHA512ee5b7a6c6ade66df3dc21d67359269bc67e1f1c4717303f794243c87a44d8f2e83ee607b6c5a2a18997b9867122a50f74994e54b549c8dcf1f6d82ac32195df1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9e515ecfadbaa8fa45143174e9957b2
SHA1259006260c439046417cff15dca6f940963e6689
SHA256b2f51ebb474b53abb05204ce6ca62e2e130c507a3fbe073da58dd867635e02a2
SHA5122c8556c2d45065fe6530689a0d86470ed6db4ca68932a148c44457c97a443a47dd186db3ed1599cc743d2963998bb20702e9e1890e0b2233aa7e8a9e48a1657b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f294ccb1a28600b10ade9d673c34d382
SHA1818393f8f9259475ee84cab3072ec6d04e90ee7e
SHA25612ff8a9db7d50734ff440872209eeefcc18a3038348fec7a5d6697974cd9c9d1
SHA51245a762536063c755d354a2e649d9b957912678fd1c68708922234b7d87d4bd9d4f16bb2c4f2584e742f06b5e0abfc10e255efca6e9bcec4234a4976337d1cb25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5706af801c50f4491dd16cb084de6f968
SHA1c17ddd637fd915c3729a5eba201d988b0428a977
SHA2568219e01c1de8bf4f2e097e74596fceed7be9c1434a1ec44b76b17173319394a0
SHA5128c8592ab54b0c98d556b7dfd1deca16acb643b1e33b860c68bfa9b02574e4fc759356ff70201813bfba0565c821389d446802336517d7dd634506f0cdd72982d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557b93871f0e04b13aef6b4e00a246518
SHA1d8f972160058cb7cd48f5fb59b1c6659d7000ddc
SHA256a2d2e60427bb4ed3288a47ca715b4c34bb8ed561809f8f98ff48422827eb788c
SHA5125c7cc7c06dbe0e89e4bf617f5e85d02eda123958be6f19b0aa8817cc2792db8c24810c25767404f1057c6b06a7022d0d052e102b8ceec02dafeb11da5169fa70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9f3080d7722a0c8e3a65e0d3ce215a0
SHA12b1e05edcfa9aa6c179c57d8c68d57626b53f7d3
SHA25666db30aa56d4120d1de599f66b8ffd2501e3bbbd248dbef286759a95be324e61
SHA51268052511eba4a226862a31c9ea0bca1b8f840b949b097b106e1f1ed4b519fa2c6dd3700367d45e04fa4fa0ef58bd836d1c6b64647a30e8aca1dde6ab1b0ffbe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561ba54b0c33a7ca2422ebf938079e4f4
SHA157703da094ff22aa61d59044e53a2cf778fe14ca
SHA256e6cfa4d2c695b4364863b955b9ae3daadb5a4d11ed036540a2e324b45dcbce22
SHA5125108082fcdec0d1f89a98006e7b9fa1f1f313903dcafbec435d6c6d9354b90ee631cd77e3ac5b17857e515fc1c2ff5d9f94b6dfb4687cdee345aca5766142c90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a9e6c268d04f8e7040cd2f4cb42b233
SHA199dbfe3940c17ff16e0ac7ca453eaee38a219de3
SHA256a86132802066aa5fafac11e91378b4efa7ca191a695a999fd9592d2ff51b0424
SHA5120b12f46efc4340c1998d9ada2c05178f6c5a5419241010a11f5c57889a8453f55b230869a5df8bff6a98e138ff39994c62d70c88e77240e1cd6993d0ba5624cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e0a410dcff9a8abce697635bfa7bacc
SHA1e93b4d834d8d8b1b02ffe26c5a327fcaab5cd2c4
SHA2560b4314f8c0b0d531fb046edc3a8c4c5e1b0cccbf09c75309add3d71ee2a66224
SHA512b7577c336d73d9875b1ea238cdffc2635ba8e24be8fc9b6c23064694447174e582a5fb47e90994e9d30e2c141512d73840f0845988507846a951c105f520bc22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c69e4001af0a42f211bb8dffa8f7e15
SHA15fa4ece15fe707e447a90ce1bd2cf938e4bbcbd5
SHA2561c960dc86313b3dd2a2b1a07a43704c4d3355d8ce892babdd0a17ffcfbef4984
SHA51250191da615d081726b4c5c68e44dc9b76789ca8942a086225bfb190070d739a32c82a7b78ced27d052e26c44374a7bd49da48e0ccf09e2e356beb42c07b72913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523e5adc516a468c276c5ceabbb7e77ad
SHA14be34ac53da97297b0495da2f5eb0a490ecd60c5
SHA256aadd26a6ecf44bf0cbcff08f409c88582438321032ad976e1f206257dbc6634a
SHA51211d2d6abf225fcb392b255d0470dd2eb4ab11715389b13059d69c54bc5b8505cdb8cee0206716769e5c24d38329bceb0f46a973680acee163dad8b1a517e985f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598db56f2e25908a48ccefd3b5ff2a038
SHA1a7dee4401dc7f03e09e7250a205112ba8d9e383a
SHA2568e3b707fcffe58478bef0f8cdc440cfbdfcce50b986da528a192c833e5ff5b33
SHA512dfa9f23ea0786984d4d80f7a3684f1fe9f508040678f18222f051cc79d0423263c5a2801073d7453cce9b2180d86e46e6d1cf1920ecb5683261a666ce073e8e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52114fd731bbcc9206c5fb535a4b708a2
SHA1601fd680d2f7fdee47c3ef5fdc3129d16bca3d00
SHA256e782bf5f305db8d68fc72bc2e0dbd3bbf5af7565427bc4a2c6406662c5a71ea3
SHA51212c3e1b5ca281e71dd1b3f435a884c5aab629e29dc63432715f7af596a7cf65ea63c19ce58b7f16ac4ef132aeb924e55bdd587e52801eb83ecd1f98f03ee52ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541877f75b9663f033db9ecb14fa96792
SHA1fab033aa5745e369a0adc042214d85a88015bba1
SHA256fd8260e51adf43f0b88c5e31653726e2ab9ed6db63fd3a17528be6c5fb0a86c6
SHA5126860117dfba35a08683c133905bea8340efd2a6df85ec843ed98cce5d3872a65e525766db472c86a562cf743fea3b3a12c0106d4fd003bea3a552e837f6ce032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9f1ea1b8662b584e8d92363a31868ac
SHA1d59735e5d7bb01480f221505a9bf93b6430dad0c
SHA2563ddabfded453ff97c4d3383146965c5ae92ecd264814616a538dc7cf0def1a6e
SHA512f7f3bad50de679d3ce02d9d9064205659451b8e5ef64a8d1029e27a818a9c4d71682bad09d756d36c9a6802cbfcbabc0b0b5a7479a10feb1ea17bf6b133ab23f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588c8a1bc832d18dedd17d83e3abbadb5
SHA14ccf2bc20722a27edcb615cd253ebb267157b26b
SHA2565fb355f7b84919a1b7ff6bc1902f27bf028a9f19a6ac794b8092b579b217e84e
SHA512611848b1273eacc00e8f77a0eab25d1c645d3140d75484d0285af6663ada07cdd9d2f6c84d1162f6fbc146408d1241bc829bb8c27291b32e8e0ad62b0a618434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7a2d590635404fab03c495a7cecc4ff
SHA1212255262be6caab92e07bb6c78cf56fe7d6a651
SHA256dfe97b624240028201f0339380327274d865cb852fb9ca97a512d6eb8e851da6
SHA512ad8ede37dc4a346eca180c5b764839b96e2606d490bc87a13414eed1cb74da0131c7a098b035b9d2f13a8c96cfd7d3b321a304e847ff604910d93fecdf9cd7ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd327ef954efc340ace7ced419a6c802
SHA1313e389f28ef1f741d95fc7ab8b9f9f484778eaa
SHA25618b0ffe615b244f232f4909197aa58aa60de7713abe78c1fd58c1d0b7b80fc90
SHA512c99da50f08236e3b45da1e2be6527cdd2d043dac5935396daf2b49c15d587020ad3924f4de5b159e3b3a9ee641e993ca8bec0bfd37a6a6adac149bbce08ea850
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b