Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:32
Static task
static1
Behavioral task
behavioral1
Sample
0843b4c8d84151bb0c870a43bd9f895c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0843b4c8d84151bb0c870a43bd9f895c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0843b4c8d84151bb0c870a43bd9f895c_JaffaCakes118.html
-
Size
8KB
-
MD5
0843b4c8d84151bb0c870a43bd9f895c
-
SHA1
c73751fc82f749d7ae56a8ccbeb1f12fce0b2fb3
-
SHA256
6a9e7c8cdca0361fd1f5119778039772800929fc848bcc821b1081ad3205e4bb
-
SHA512
e2c69eed6bc225000f12e6b2ef01f415157811f799a0412968a04e2b39e82e45267ae29130346065ff58b103a93eceef39413fc76d7fcb853a4fbdf3ae46bead
-
SSDEEP
96:uzVs+ux7ydLLY1k9o84d12ef7CSTUIzfIOFu89lyaIsjMiIhO5IUFIDiL1I1xDRS:csz7ydAYS/+OEtthbPPRb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60ec37016b14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2AA26E41-805E-11EF-80CF-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000006c849839dcbb5d63d35a8f134602307b76f64c3b68a5dffcb7e430ab9abe5b22000000000e8000000002000020000000bffa9c6e446ecbc8e069e8f31938dc5e53889eb5a873c149fc7092730928945e20000000d0152be305d6b5c26af11e253efa185baa7f81e16ac667da7d9df59070a9931f40000000871c6307294c778d21dfb4f5540bb768e8f3f2aa50732606d9742406581532d16c9f121494a286eb997682f3db05fb0493cfdeb0369ca35519378d8507693f26 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433994608" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2832 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2832 iexplore.exe 2832 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2832 wrote to memory of 2332 2832 iexplore.exe 31 PID 2832 wrote to memory of 2332 2832 iexplore.exe 31 PID 2832 wrote to memory of 2332 2832 iexplore.exe 31 PID 2832 wrote to memory of 2332 2832 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0843b4c8d84151bb0c870a43bd9f895c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2832 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d44568ee440c781c77c65ab41e3157a9
SHA1773a93e30f4c5d26db17f4071c016d1e08ef23db
SHA25646ddd04d9ea514210d67f6568c37eef9a7b793e9339f8e6081572faa8f3319c4
SHA51216e986ad0bf5771965354a6b0e3a7ec09cb7cc9c1e865d61f2a1e647ef742bed9687e2488575b8ad0d2ff042170922d91b5d2d6133386be3633cc3cb3a2d3493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d8ab397e874b37495579b5460531e5e
SHA12aea099b1d57e62d269c0f79e78da7d4aae37c93
SHA256dad1e9b7c6c00c821f390efa76b4516abc0578cdb01220a565ea950937f6dca9
SHA512c3d87e96001b42b51fdcd38592987a497c7732a6a07913b8e819f7c4bb65c88500eaa64d9a991658cbe3f2711dea116cb06c9a2ebd4c8fe3b12e36c586fa69e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d1b702bcf931540d0548cf7e4a90d46
SHA1f68e19e98e5c30531c850a8a87fe779718d49228
SHA25602638fce2f02b1588670238b48fe6ac385eb03c724a2f5a9568a63d2b7e04140
SHA5120efbf2b2fc47b6213b2fab3321c85c011b2d598b0a4b075bc06e60e6fcf973f1125cc406cd26f31ef4a9f9b098666853e5343d180557932041bf1a303dfe6172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5840fce74103a3e7e91d49b35f1c95d58
SHA18678d2f3fb85b1085e6ddd235ea69b3f3630b01a
SHA256afc511b9527f1c11c0bace61277149c9342f2bb12f2d729fbd0338a9239c9f42
SHA512bdbe2eb77730aed4c67b0141c9cf619f814c254972ab36f368a4c6577e656ca45a53049303becfd3adb2d31b3046382848ddf6fb97f8c2fed3acf8a7b01c5ff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545c77f65f5690727c50e4442c3c7b6bc
SHA15b8d5407c4c6ac7ac054f41f3228c5d4a55a98d8
SHA2560ddc983db9d733eeef10df00ee2dab64144885a6e902c62e120f2838ee0ca075
SHA512635c560748412c2ff03191c56d23793de1a8457af8e9cfbe7f5ea165052ab4f4dbaa4070d8cc3dd23123b94b8f066728f1b0b90424d17cd0f86eef644ccb7532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a396e4f64c22788556d7192ccebb671
SHA12569a47252fe851187428e02c0d3398bf33191cc
SHA2564e19806ca9c67c3fd8783676b86f2b43112a2d468c934de0ed9500c3fa2f475e
SHA51257a28c6d7ed327819f26f583af2c20c249c9ab4150564f0586743c1c48d1a4d23b2f6330e1e7abc467d4639b5eee4f5db6afe9a62e7b6e37a7ad6eeb02a6ba49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557f87ce8e8fe65f9959d6702e1af4780
SHA176993407a877b75fb49f9fc11fde616ca7861115
SHA2569db5fc4a9d47779a71ff8490591447b17ca426bc0649f3a77dd5933916c0c7d6
SHA5128b3f025707238a35e5e89ad8cd9700123e68563536b65de8a6a44282998e93b42a0eac98b17abb41b83260b8ce767b9527d62fb03c06eac2f2646c7367c7bab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fbdc0df5e6437248d49d76afe4c28c8
SHA117f6b29a513b7a914c9d4fee8a6f051c9af0df24
SHA2563e45bd1eb06a65763e13b0b296b757ad7140ce77d8d44756e9dd6797cc43143b
SHA512dd631051b5e19625d5c5acb98479417de83bb94e5b1403d3ed2000f831daedc356d35f62600ef0a9fe7538fd9a353dbe24c193e761a1886b8729a22a71b62dea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc32ceedce37fc825af058293e795b47
SHA13c6b513835a9f7f64625b47352a8c5b898dc107a
SHA25618f471d518ec0e705f70ec0af219fe5e3f88db93aa81ade6fb8c911907ed887c
SHA512ab099c0344ec98149ebbefd2715cca6fd1e22901408b791417fe238ac36a9f9386836f2ec8ac67a145f29c16aa86636ea2ee183f13b0948e96028749912ee4e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc6f237af23e8e4a17e2f198992dff6e
SHA1a0c6d38432d82f4d5d9d61eca33ffb213e828992
SHA2564eb4ec11ca0e5ff598a1cfcbc570f0051db637c24ebfa815db2ecbe8354c0d5a
SHA51234b403f6844e341e29b301596999d742d51e6cdff45e63c71d7688ae05e8a6f2558c1efadb31583c1f71b216b6697965872c482a6fd2512d66f6bb31e7e41da3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bc78f6e55bee09bfec31b9fe3175869
SHA1994aa59b41af1a03457caee97d41491d56e76c89
SHA25656bf7037930e689111365248ebb2d4e74b5711f9ef0645d13b2f1435efaa4f84
SHA51232f22a45575f14409d187c1417fe04da6af3e468e48fc9fdda31e2bd411edb145bb13254140226b20a3544381cfd886e5bbf724e2842dede420a1d273b1c97f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4300b4c1e3f79b62049580a73fbb504
SHA1447a2e2b9bcc259d714a8eda6cb0e11692544d72
SHA256959d8a3dbe3eba645a6feb1696d56b9ca49d02b79e3e38af68f2c4809fe26d1d
SHA5129a258a9486ea3b1039d7d1cdd743c6bda157f096a7f6caf7f6c1ac6e8a87d00b53e182c5bb4061ab5c3902c63d4d97d7b32e5aef10a8e23acd9524ee101befcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580e961b7dd8ad96baf6145ba63c03c99
SHA1e4957b317f25d9312251cf233c3c7e8f41b7f6ad
SHA256fc4e67e344c08f125d4050f4beb86b4c2d74d62bb21bfc779bd679cc6181480f
SHA512c204ea1a487974ecc3becdaa8746123ac8c79135631758409695cc433b41363f85ab1fadecec506a8916dbd0ff8bc314b6703a44526ecf5da158ed58c107374f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f857fe226d021e14222ca95211e07a50
SHA1ffe0377fe59121ab7096c1a8e6049a6b2f068fe8
SHA256e8b08a69338aa164ae7bbdf7fb7519dcd3a86f4dad9ccc8e40f82c7a2695e085
SHA512fb8443df482ca41fdff0137aaba554d9c38da12b5e8fb8a4c80c2a1577abe8c9ce78a07068041ca2846698daa0cb81a944f13a7b7e4864c77fe196b67679f244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d17c6f8218df0861cf34f360a1320a2
SHA1fb5c35ac77d82f98d826a940cbbb48bf3b425b11
SHA256e1f4f251b22ad4af02466debb96a123b42f1099a8084a296629441df2c547795
SHA51272076ad3bb92b08805e6b721eb383021c826f4f106ebc840da8182dd996fe9368959aae821d3cbb58320487eda1109965abf87b5e23f89e9a39a1bb996dbffc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d1d5ca91436a4241ef80ca535e841cd
SHA111bc499d9abd535d8e19c09e4732edab4b238498
SHA256e28e6311a5f979cc3389de2ec58b5d47782ae9d621b6c5dfc949b2fdf64f0be6
SHA5125bedce30e4fadbc5633cce8620e08f4b0664b31c010d527907f1559089cc95caf0c05635e08b788f9d1d6620c68ef578ebf15f6d04d0047d002fc3a4f56c74d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5286e1c0c650ffbcca08937bbe76314b4
SHA174904f0c09face513e6aa7db3a8430639fc759c2
SHA2565c2937b7054fd6d51c7f69dc91141e38eb6603410d5054611a557efd9f1bd74e
SHA512ca6b318a82a6b54f60bc4622fd113e7b71278b00f996f1ee3eed79ded8fdef17a001e9258c584dd1cf4cd385e3417e31627da60779b00c6dcca11ee6f12fe709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53caac4e6ab53335b356ec9c63fe8a79b
SHA1fdeb29ada0e2cdd8c931643f55c167bf55388c5f
SHA256a76e0fcc18fb5fae63619c6a6edf00a47141b6482e3d8a17dc629b99ab80e06a
SHA512343a83e32f040a475ed4c17d1ec2e21083f6384bd1e19793ed20dc6709ce27308490e2a4de3d761088ee5ef92a1dfafed55fa3cabd1fcc72c1d98a0a3481f9b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575b3a4f4f46931be7166df3d669188a7
SHA17ee15b32084b25ed97ef50574e9beda8739fbadb
SHA2568c1de90d7b58e62e40079db45b245786dec5a5c078774014d09cc54be02be34e
SHA512d5e85f5e1951e2a067d742ac375c97f04b2c4c88a4a19641549de22f3d1ace1577c41dcf9d5b571e2bbfc2e471fa85d418abec4edf4ae9ee3cb067074ffcc920
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b