Analysis
-
max time kernel
118s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:33
Static task
static1
Behavioral task
behavioral1
Sample
084459405908582829809236d613ec0e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
084459405908582829809236d613ec0e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
084459405908582829809236d613ec0e_JaffaCakes118.html
-
Size
21KB
-
MD5
084459405908582829809236d613ec0e
-
SHA1
053ea89a28c6aef9d2efe1d23111ede3e3bb19c4
-
SHA256
61d7ecd60230c3481b48c983a0e7f90c3ada00880b697418ee226d2b84436f45
-
SHA512
d158ffbf81e5465cfea750b4d75082b54b982d4915261161106092bee419a0f2657970a8e774593e349ccb3357d49b0671e149b74c86a743c6e39af7263a2214
-
SSDEEP
384:LMoagxlXZJcIpZY/RQGEBFygFPgMgZgeEg4gzUP2I8O+jE8lr/sKf:jRbXZhVLyg5gMgZgeEg4gzTo+7Jf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{48EB73B1-805E-11EF-AA6F-523A95B0E536} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433994660" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000001b59cff36b6cb720147c8cef2699e6fa06573e527497d20ba27c889c84cdc765000000000e800000000200002000000076f8679c36541f0f9a5ff5a13e676f368821def881b588ca9e301e308147e01120000000d8cb228ea4611614811e7ddb89e2a4dfbf9dd17573f8872d2d4718aa4f7a900b40000000eb54b668fd4c829970571fa2be2670ac16969856f4fea125def4aec96bdc111fce0c33f8fd4be2b4f1742981e2525580c268287333928bf193d9a6bfff8f54a1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 001e0d236b14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 948 iexplore.exe 948 iexplore.exe 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 948 wrote to memory of 2848 948 iexplore.exe 31 PID 948 wrote to memory of 2848 948 iexplore.exe 31 PID 948 wrote to memory of 2848 948 iexplore.exe 31 PID 948 wrote to memory of 2848 948 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\084459405908582829809236d613ec0e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:948 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e31e2b23f285c51dcdc94f955c310edc
SHA1793f66174491a0d6d12bccb5206369b4490b4d9d
SHA25649efe84c4fa869692a6e10b860a796ec1e89fb73a640ccab58ad6c15a8d3f938
SHA51263daa739a5232a58ea77f8c0726235dcd26b490088a5a77b5e8fbd5e6373e3b2396c91147f224792b9c9a7f40e069935f787724668a1542e1e2aea7047ce2d0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fbaf886e16058b09996a1a151fd655d
SHA1053679b9be5ba0d4b82ebf3c0940a78b7d939aa1
SHA2568a637517f5d739dd799edb632485ced15f76e0bac8c86dd9efcce44a35f92fc8
SHA51236eeb280d3857d4feda25771c0b388115ad4b35c423c1af39fd821da7e83c7f9933ecf5aab7b861924bee8218a17176695863e4f6d4beaec21dea204fa7065cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533a1d0d8bf6950951c8c9d9c1977a78e
SHA1281b30198ce36162fbbd51f5a4e51f106ab72e4e
SHA2567e1356ab53bfaf2e35080c1768d3599796a627e2c3a7dc2f992adc77707953e4
SHA512045ade9da8e1b8e340093d887c17c9069604417fcd1939a9b3aa13f2112cd50215c007a66088504e3e4cee37227ebc67b5150b5a383fc8ec433676ee534e7e0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57956dd536356e9a14be2b9fb031655c7
SHA155fcb7dd253ef7bf929b3d0fff24ade99ae3c0fc
SHA256ed1f17537a18f3a9c0985d828af78d5ba0bc62ce3985abc646d4319f1aaaa0f1
SHA512f215e2922c3b543fc0c56de07619738b0a63023e21ed62e01102313f668d3c6e191b307f37ced039466487d47457b70aa71f1c223be1d981225edbf4c5ef405a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537e0a44d1d1bc8261ddaf84ffa6b08dc
SHA194b6020d7f1221c4c0a35840ff8a793c21aa0fea
SHA256795244607bf2d516340571c74d019a2702e0af5d95213dcad15298dd3759627d
SHA5125ea0316d1cace2f64158edd0a5aa8145e3f6f8acfbfd37696ba4f43d526a29a4231fa749c38465bc1285f6e1787331e07ddedabcf49c8c878354d07021afb50b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1412be980b8fcffb21d11ff6d2a4ba5
SHA1f23a82c91bee01d73381bdc3c7193a3271989e0a
SHA256eb66616c57855d1c3a8ccb3894cf09485f7dbe3ec4fe2a2efd864023042b2ff2
SHA51291095c2b24996917ca7129413cf333d16afbb63e12a4c7a6a4f7100ab32602ba38fd52926fc69462b0d2479387d3c6207f0498b111789a3c108864dfabfba777
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5829dc543a6edf4fbc4f4eb2a05ee70d2
SHA1b2311355e090901dcb263e4618ad53b624a8c437
SHA2562f58f4944955f0d89d0788c362e788f92db472c59f7b45364f1bc38aaf6a3c12
SHA512b5c02be6427b692be2a97d9228d118c6314082da3afe6c3aa323e5261818af28912239cb7b26e32e5491114a32b2b2c2f4301270454149ebcfab3ce816f470cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ffe66b34b81e021d185c69401d3b3e7
SHA1c97fdc5e637e18190b8e2417e05fe5ea288ac40a
SHA25696362707750c1d13cc4ba0c1d138e7b9a97d00f523a4117dd010272181929172
SHA512c86e8d7850b04604196d631b9e17c129c55baf821b7f31d3619870fc0b6464e6ee64b03ba3fd0d8b0bcaa88fe50abb28e9272c4b2581abc85db76c5c1ecaddde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edaf75bcf6187a87c918902c3c44f6ff
SHA1261f5d6138e153b8224cd3cfce14b95eff785eed
SHA256308aada0f6d89206b4ae2bc1ee43a7530d99ebf38285a4e8d87318f8432461d2
SHA51268b6636939aeecdb65bacacbe6ccc75fe6cbbb4ff9243d56f3ec006e794e17a391bd9ba8019fac558a0ec002e11201171636159214c0b17e092f0450f988b4c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57afda49af97dbfb4f4067ab2174f967d
SHA124125e7b7312aa7580369786e8a680f31b33795f
SHA256548930423e85fca7d619002869c0b624fed8a61e85792c2a952ea1b87dd13431
SHA512723b35616db7a006e53c15050673b6fec85ef16aaa9c6e20235ae4d415b0acf22d8549355456065539d69ebecffb2893ad078de4007a5bf6501ad3b903fb95ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ddf166cf7e6fdc80aa23788556dfec8
SHA1fdd91157bf75e4d2aa3b68a9268b4ad7d13438bb
SHA2562e22b909dd05bab1f678ec42046e908b39d1a34c62cae00881f94309ba34b730
SHA5124c93ded83543aab2a44b119d1cc7df9247c5e2228d586d83960a3133f19268d830b45269c8ff32884ccd6645cf3596b7d7821290b215a8dda069ba262b06dc46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0ced9eb5b2e20268297916fa583f21f
SHA112386616665c108a504a16fc87a309363b5f729b
SHA25694d86dd246ba5006ef5289cf017be9a9c43f113a878da00b3166cb673ad417a1
SHA5120548635a0eabd582c89cca2074ed233e8b15e3931123961dd7833a97a365dfe73fc44db1cfe8e4a56f7d5da0afc42a3e18fb6374d725f6d17f6dbdfaa4461330
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaba4c55ebbcdc5ea1614f4c6ef1c646
SHA108da6c40cffc993c21a41a5f7dbb332863bb1bb4
SHA256d3f07a8f5dfd7cc2cc301390a6eaee927c30e3e9f17683b09b65018a1a860d55
SHA512a8849cb1769e5aa7c087714cba24c612a8fe0e0d9ffd7130fb16f111eb6849790bc7ea760e5358c41458604dd90ad7aa35da67611ed8f2046e44557434fa9c65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb488e25e6574a9ca86e7b9624c19c76
SHA19e1637cb2c7bb956ca0cae409936c23a69eb3e48
SHA2568d7a99ea0282688f15ef8bedf214340031d042b83a7bf0f647efead0ea5a8a04
SHA512a67f3e74b2828ee333ed3958985e2a1c5e79ca6d768609d02dc6a19f232bba2136252346193f7ef3daaa18e1e0e2c53b5b7071b55f70e82051e68f0945a8fef3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56444cfda7a301e0f024e6e42183931e6
SHA19dbb3d0399d28e625ec5c472be484041f648c7eb
SHA25690a47aba44a42ba04cd998fd534ffa30642a3f27ac037a09c695cdc1e4e63aa3
SHA51272589c1dceda9dc224f218575175396ad8e5c8efc94694be47abe5ebe4a49eee1875171f6b01bf1e7b90270648742ca0eff6ca96a6d91bd526e90aafdfc2c030
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0e694e2059f1a485747eef26800047e
SHA145b375cd486946cae6b1e0c6513e6e434c190ebe
SHA256ec71fb733996f36fec1e88ca7025b067aa9ac9a187c7330c9cfbe9b493b1866b
SHA512e20264b05caa622861f6fa4b0d253839beaef3906e8243b1fa12df9f7471adc42dbbbffe7da18b7d30695b55371e647944eb1b7dfd09aed3d92619bee3ca622d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7413f65db02e3d59206aca3f4998fb5
SHA1259b93865d6adcace6052a358b2e63eacccd3c73
SHA256754715db2ae0f73921ce70515d8a72b937a753931e2005df60292ae97d62040e
SHA512146e2965e4b11ef04baaa44d9b2d34790f9b66d15c1263397c6ec9d06a8a65791970bdf53c126cc7c189804282dbcff6476250aa5aa6775ba02e4015524d6ed3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\56KJ964X\style[1].htm
Filesize114B
MD5e89f75f918dbdcee28604d4e09dd71d7
SHA1f9d9055e9878723a12063b47d4a1a5f58c3eb1e9
SHA2566dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023
SHA5128df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8H7UVK5L\display[1].htm
Filesize125B
MD531464d0024f8a9c0d7f7df94fce0931f
SHA11c24cb19b09b4fab1ddad8fc1a96a5f2d2607828
SHA256170f30574b2e9227beda1f4a37c439889ec0825d56fecfa73da3ac2b7732da2a
SHA512e523af1241b08723a40dd3b3a589bd9df9a398f0f99e1d5f95f7928c0a102c1bc1ea28a84f588ec23a0fbd70f1aeb9d8c99363796bff7d4098d1632dbfc514b7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NQU8S4LJ\jquery.ui.datepicker.min[1].htm
Filesize125B
MD5dfde862a0a567de66e3c6c006c9e64a3
SHA198d95bc4b83412ef2ce744d2135c659caabe6b29
SHA256e718c5d2d4a7196ee641682dc0bf4bf0ce9ecc80e508cd7e9ff8c784649690de
SHA512ccd9da72774513964f1d4443304f106f34608d3c58f8c7333839a7c752a8b34901a215c809b4764cd3bac6e67540e53d50636295b3e2768f24245ed20687ae3a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b