Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 02:25
Static task
static1
Behavioral task
behavioral1
Sample
086fd0ce7553660347878d187c43204a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
086fd0ce7553660347878d187c43204a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
086fd0ce7553660347878d187c43204a_JaffaCakes118.html
-
Size
4KB
-
MD5
086fd0ce7553660347878d187c43204a
-
SHA1
8f4daf97c1d47e6b7b2b7e7e0e402d759142523d
-
SHA256
f84ab862c7875a9a21d2f3411c27c77281253c5cf06baca5e7fabed531e8cfe6
-
SHA512
eea036fba490e92021d4068ecf29d2e4d3d6d9d5f05bbd18f0e09e8f9bd93f28731c22b29eb09bb48444d385a8eb12a9ceeed42ae012b734d48a295622b03784
-
SSDEEP
96:BfEYifWL/NISwyg74OmEif3OQiCoISU7f/OmEiC+wM6MfUKffKSf0NV:ZhlItQewoIrWHqHfUKffKSf+V
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433997823" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A78DF7B1-8065-11EF-AA3C-F2BBDB1F0DCB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00da1d7c7214db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000006fa19d98331888dc8e67808c6cf190f0bf2ad7cdd5fd77c56c138e552f7313ef000000000e8000000002000020000000a3c0936fdcacecea1710e93858f73841bcee12dded7c26882dcf9c4404bf77f620000000f05bd5d740625a5e92bba96b3189356e393a1f9283eaef34ef35e0425ad4935840000000a9cd50b5847b637e4485e45f67a77cd9b6722fe924b70ad32caecac9d2ad7bc9b118db024ee4ecc41dacf8d920931f2b8696ba83757399ebb610a7eeb7a22832 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2312 2084 iexplore.exe 31 PID 2084 wrote to memory of 2312 2084 iexplore.exe 31 PID 2084 wrote to memory of 2312 2084 iexplore.exe 31 PID 2084 wrote to memory of 2312 2084 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\086fd0ce7553660347878d187c43204a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5ed072779bf6565f11774b5abee42d7
SHA1adce20049f8a281abe15f8cc181cf8eccbebfb7e
SHA2569ee6f83db2d9076036251794f5b3ec7e1e24cf012df69796e5b3a9deddd73a3e
SHA5127c95b60e9503c2fad4aba416a3ea4697b0113e082b4774fa8b4e8260b464ab0da8e503089a41e82021abc28d54c27d24827d205398383964fc9bc6cc2fd7772f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555bfa0f864a90194b19b32efb4d6d5da
SHA192c38bed47a6c190fa226b13319ae26e585e711d
SHA2563516d8ca046a25c4345f04f76184a081d68a6337185849317de2ca049b43debf
SHA5124a804de0b03a44f887685380c75bbcdb51d7ee20c6c1924c5a27f4b6473254fe71285d6e5fe82a90b3145edf5256729ed42926b0d555a1881dc266fe250ba89f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aae2002308e0db4ef3b2529f499c8bf0
SHA180a317db4c20fcbbc843326d1436892e43f02a3a
SHA256ebd2b1227261e0bc7d600b85dae7a84839fb421a05af387c5c9f62db83c4b458
SHA51252695157c8796fdae6d55c629a7c72a33c62bb82de95c3a38adbcca1578d6e26fec7dcf75d4a15568e6820fbd8ed53ac658dbb65eadec594bb1f386cce4e516d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550fd5a35022ea8e061cbb90b66b371a8
SHA16647d27b0caef628ab64294c655605f27b3abccd
SHA256fed895cee23737bbb320220c55352294384fa1dcb083c15dacfe38f3b475dec7
SHA512ea802a85ddc3b167b76075e530a7fdb0dc3a0743a9722da9dc0a3d13d55431909995fc7b0b5ad7f1040fe14edddb9e551939079edb41197773323cf5e488e67f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db656fe1e24d145803053d9abfc9cea9
SHA1afbebf1eacf1d2570e76584ae9a645420da966b1
SHA2568fcde6b404859f6465803f21dc6d7aa4f96aa4a80c84ace70d8c6a39a77ccbba
SHA512c278b98d4b65da1d429481e51ddf4b45b0fffc28170a114c5f2c34d938d6bedef2354a2eb85110e45ac898e3850a1bedd1834f78740f01ff9b5c3fa8f3c49b39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5428c29967ef0d09444e0ec436d0f42fd
SHA12cb1057a1a6539630b05460f28ed7c71b88b5bee
SHA256e0822b0e0e695ec9943f18aa4eca35dceb4bfc67182ddbbd89942bfa208bcf9d
SHA512efe18ae268d4d4ba586ee4c2c1b6081ba26f6c289337f8464164fb1e810bb6d981f01e8074cd6bb03383fde5706bd6dfaef07e6e2460a2dd28d89d158da064b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543ddd81d0d83eadf41d2383b999db46c
SHA109839a7c3993f643301097ed07a6775a3e4d7459
SHA2563ab6c9735972e91846b582c015181d84395431081f309e162c8200de20f32f4e
SHA512745b4467d9516a255b83e64ace736d7a83c974e25303128dc607b9ed4acf75b55b77b0b94586fd2ec4ac84590458a5f29c00a867144185d83869180323ecca01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1ab9d660f83f5081c01c4f38a4e1605
SHA18eaa028b7c7392e6d31b748ffd434aba171a656d
SHA256acdd5741bf29cd2e4a89d789495e0dcef93d671281164c778fc7bc54ec7a719e
SHA512d5882bd863f655d100cd1ddccd965a80c0d73216a8f4f9268d10ed076a393b1fc5d061b7f6a4e5e1dfba8be82c824049642f5d2f0989ecbc2bee66f0efe4cfdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b01f90d3cc00b10958f2c2abae235014
SHA1789ad04a7abb1c3694bbf5d70a45564ca2de98ef
SHA256340e7e3ced791ffdd0439a73864c8e8000b56881be3a4afff4a8799fb2cf89d4
SHA5121107d930045677eef12e7f5a284f6535ac1bc9eb50184ae134de3fbd3c175fda451b548b624c764b726ea20a6e115bd5c46b716a28ed08a843d08940cdf92ac0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5983bbf9f86cab419e75245bb953c6297
SHA161cc703bad426f658d9dff5780f0042d8b65363b
SHA256e39bb7522684d30ef00aba4b5d7bb6117bf7c8662f1614e89dbc6c7963786276
SHA512e76e69e69172d1299c87b3ece966dd59aea785ed9c81452cdcfd6cd841adf4b080ad1eb3c847e2790142d727f05eaf14e11e8fd948002a72fcb762600b1b8467
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd03775fb7798653aa3d7f2dfe49da0a
SHA1af577e7b678ae35e424a9c1dcda1faf874179d36
SHA256088011559eee86c8628c33462973dcd111f82423eba3e037c4b0809e824b149c
SHA512ef960baee254909f5945eb6c780e363b112872fa85db254eb57db8c3ee66f29bf7f7632ed9062581d1541a0608af0e1b6075525f3d0c0ead721eac965b973025
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1cd21722e68d50297f8b538b3df1d62
SHA1f84adbc1c672dd89f7d5aac2dc95126ca575aa12
SHA25614abe7cf843ef8d4f4a37da036fc903b566e5b69bd0d71e5138321bf14a63cd0
SHA5124d6e556b81437dc7a1fb828f5bc1bfa35712f6b4df66a8e379a34da94268bca79e0b72174f4af1c133796977e79716c8856c6dfc6ed6ece495a45c6bd68880ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efc75fdb77603acc63c4bda11d425e6a
SHA1de334ffe39af641f3630d474fb780a001f20390e
SHA256cad70fd0e1a8a77eb4ebf50b913f0c300aea60d2d474e28bd11ae437b133f744
SHA51281a92a483dd01d6e159c7b1be7c9446e3794f093155b5fc4764a75377bdf49051aaa677ad357e89ac7528c54f18f11530646d47a8980ce2e54d8f6e189350331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502b21ae3284f794e8afd640a9e12291b
SHA1e947e30eef33ccd488b8a6b6e452d1d5dbf79a57
SHA2566a2c7c1af21a3aa71993e197d03fd7a34a6e5e74b1771086b139a2864716dc45
SHA512e19fd9268c043036c0c38ae864839f210ac9cfcad7539e5278476cc57e4c8d00180c1d6f013f6c957cf34e19942a7ebf5815c03f8a83fb201b46cf36631cbdda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5418e359750847d7ee158a63be97b7154
SHA1e3d94a74269eb2c98e6568490155504f4dc56374
SHA256f0771cdaef3be36221bbf95b245f5d3ba53b8c9dc5cff9fe4ad19c8f9942b09c
SHA512c350c818733037ff8ce69e6c41447cfd586057521119d72ae8929d596f7103b10e2c9f05645112e6ba2fc48878bc324b631b5c9cf8cd3e6ba65e52ca73090ebc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52781d266ad55b7342789e2b07831d200
SHA121006f14d20a010971ebdbb8edfa1b9a5dc3a1f1
SHA256b1683f0e7add71c90022b37109c2061f9141a047a7146f15ab20e2cbcc24d6b2
SHA5129ea7c0392e8aeea2a5e61cb9f23c5501e883963542474a72a2d78a8a36826da811f247f1a4d26c50e9d87ebf04b637dec803a9a01a01864c8aa4ae8626169224
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b16b39a004b23761a9d6bd26a3f05e9
SHA16d4a316e5e419fd954c71c686bbc6a5812f28e92
SHA2567c832d067587245dd43f690a7d2e4ea91e0f4e3a95a69c77495745366f34e6e2
SHA51251ab65751db250ca61c79c554a412378f6502d9070419e7f401023843a07558bdb42081fabe481d7cfb1daf89acaefd9de9e6c47d571f2251aee577aa98d2690
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8335256a94b4fc8cc4867a9ef3d861a
SHA1297068e04a8c2d08b5864402a259ea7fec3d843c
SHA256f78a714a25e2e2d5fac5b28b85689ce2411bd13bbe230fb10ab8fe7be6d74cba
SHA5121cafefcd5761a7ae88b185141f1d001b34feefde5ab1e4619c03d5215fa0cdcb28ec40024fe4974edbfe416f2ade612f304e5801a994524d62a47f44396638c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5480454587c4e0d91da0ec5f8616edde9
SHA193eb24c3366c1a82bc05976d414a59b35f942b6a
SHA25687a4a1f19f0dc76f38a297d57dc4488b324d1bf5212e6b1b970eb7fb0441e958
SHA5121455bd84514040d9b592e21918f82691442dd95f2b037cb5c27b61b8990153aed8bae5152b23c415ab9813c75bc180939003b50e914dd5440ea6ff3aae1c5d0e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b