Analysis
-
max time kernel
139s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 07:40
Static task
static1
Behavioral task
behavioral1
Sample
0996931134d1fe9e9f0e021a028e351f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0996931134d1fe9e9f0e021a028e351f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0996931134d1fe9e9f0e021a028e351f_JaffaCakes118.html
-
Size
139KB
-
MD5
0996931134d1fe9e9f0e021a028e351f
-
SHA1
0e7b95ff8e065c2c5d0c8cf62564f3de7b70aaee
-
SHA256
cd276251b0c6820d8bac3f4b3642c117ae1966a03eefaf843583aae5d380b8b3
-
SHA512
9881553f8221b87e07564a2cc995ee0077c1724d265c277815aa720e37d5ac41115d6fc1b6b911b25fb3928ba45fe9147a6ee399de6cf4000f66d3afb49b7a39
-
SSDEEP
1536:SkL9HZWgWjt3muCvstlnZyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wd:SkLCZyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434016675" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f05871a19e14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8C473991-8091-11EF-A045-62CAC36041A9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000df11b7cc965dbdf4ef3f1476e9dc1d9c9f87dcc7835a250b2fa80eb188c81a4e000000000e8000000002000020000000526a722dc23a3c699b8cba2930d17dba08a53366923d56c2fb7c758e66faf4b120000000364f5b7992b74e20f33d39f0990a601403e71cd39524e13679ec9a388283746e40000000822dd1baa41ea886edbb78b8cf94f8d728f12d44346ffcd98ab6545e89b0fd3e317c62341ab5c6b7da2eb93a1a2310ec2dea43c6b62e42039428c7577089aa24 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 268 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 268 iexplore.exe 268 iexplore.exe 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 268 wrote to memory of 2432 268 iexplore.exe 31 PID 268 wrote to memory of 2432 268 iexplore.exe 31 PID 268 wrote to memory of 2432 268 iexplore.exe 31 PID 268 wrote to memory of 2432 268 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0996931134d1fe9e9f0e021a028e351f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:268 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f866697027ec18bf7f35e8f0c67e422d
SHA15ba22f90bcb0dd7f78101944b11a9cbdae8b4faf
SHA25692c9c88b4db6892b15acfe67bb533a536318f2b5330fe20276e7dbb1ee2d1622
SHA512d48d1724ad64374311f8eaf21cbc144221d8768f2e28653d047c9dcea0703b7117ac4d95407d1ec8db5f58bb418053595829681d33b91cc0f04d2456d82c59fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b61381d617f9603575b5012a5b8816dd
SHA10034261f2909dffaf0ce407c04b018fa2be2f109
SHA256dfe1d889856f84454e37f01df7f3462c899113d99f8c11c607f266aed2d97392
SHA5127f78c06fae129e3da7f97796c875f073640df0e06210028d834e524cf27db5817f2b46c6a76ee5658793239e7a5df47b5bd0dbe8f4ddb5f7e634e794ddc2f961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536e0c1b2c031ca44452302e7d362c212
SHA14aa5f448a3ce4bf8fca0784b1be7f4c41b0f0020
SHA256b87104b3da42be167cc144bbd9863fad8ab1d6e7245d7178e1388277eea8e72c
SHA51216deabfef0d217c07da2a3b47c729f6a03b31af080cd3c05d44c8b9d0ba35550e1154ba20d42e5f5904523fde5f576f26c793a630dea9269aa2316068e29c860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504b2a14eed9c72f1a5c6d32dc81106ab
SHA1f5906fee8784e9730ca6557d6886a60d4fd314e3
SHA25690ab382a4a8a1c3907b30229e11445d19e20f3e77547b5e6e53dbe8691c1a48e
SHA5125109a67be043746b6e585b5588159165c9825de8632daec50696e10e8d24d0a5ef81abbd6e45c45442d18bd03ca2b75eb340a3f75427302c13c51ad9149eaab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5391e28e1ff62b98659f3fc711afc9c11
SHA1b3bb1607dc15ba75841179e48b7d89fa0d6ac5bb
SHA25690de403d11d13747a5c485dd8424780af150e8b58817dc5aaff2517dcf9c9bd1
SHA512fdce934edd391d065fb9f8831498d007a31dd88d2d7906b26e031760192cacee59831641c65524003fa154751dca391c978f459d5d3a8847594bc63b7389c999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59095bb51b591e4ca326b64574e6a9318
SHA1f970603703013ec053ae9483e33bcbe7f0f82769
SHA25678cd2517fa7a611fea7e3027cfe4d014d8489cf60d2cb57d7c7438b48cfc50a2
SHA51234459f24b310101f9261245826d14eb4a0a4f952d27cb6b39f0f13e7536e60d8943ac6e3770b1d14d5a50e94a28778328e4027aaa3bd86470761e48b3373071b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530c5ab0a0772d1503e40116a243aa269
SHA18f4bf935bc291aa741a868bb0ddc26653065e2d2
SHA256f4a94a535f353d2b79c8b7f7a2fae8d4cf694fab82f546e561f1bd3db0dcecc2
SHA512e28b7318ebc7342501f49df3f1ae972d548752e9c29e7967155fc180e3909cbd6e15b4baea94bc450aba2ca53c6b83b8d2cacfb11a34b5adc2eb8206ece931a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4ad586154c5ff2bd67e46dde0aba126
SHA11ee94f17f67a4debd10d792ff870105c803af4b0
SHA2567d779dd21080b0f8b9663198f37936d05b8366ad604b9187b1f6e2b54a648867
SHA5122025d19b4e57db800feee4ee39d4a20e189c95cdc99ac2e4efd6dbd6223cb5cd5430965efa0b063a8267a2a2c3909747ad8e72445a4e24d7881197fb518d38bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e8c5d4f2d78859fecd734d72817d0fb
SHA1b094df1a798efcbc29c66ca678b2c9d885672818
SHA256e87870169e323520f294d34064ba1d9eb0232f7866aba234ed66dd6fe8382186
SHA5122bf65c92c42607b1ee81a7881f62b44d7546c1c1b27e67bf00725064c82916998d39854578bcdd5ed99157afcff043fec86d6ea37d96d73921122f2d5fabf8e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e29fb858c129a10c79a722e27a6d23e
SHA105d7aa6cf6599dfdcf3497aeb4b2dbb423bbb968
SHA256bf2feb3db57db6a66252c481dbc4c972e97dc33ddfe53bf444a5b9d6570899d5
SHA5126350f51895a20f7620a713cf900ed80a1259919c0d8ad6e71f2e0f3cdc15745c5b9b550bdad108ee1fcf6db786d4084cdc179a78c4a79ad1764896c8f3d93a60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0dd67fc58186be4dfa2a6ea24c8b9ae
SHA1fa7f1d5ee9a2057a69ef4ebf749077a159a0fdce
SHA2569a8a8f1e86863c197e894e2080a393a217a14b70bedc4d1da7de30e43f298415
SHA51279fe5ba08d7fd2ce35a1e6992a9e2c2faa5c1368685838ff9c6268b116605d879838490157680f643aceb9b681645303c170e318b4f5c8c646f1bea699c0a98e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b