Analysis
-
max time kernel
117s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 08:35
Static task
static1
Behavioral task
behavioral1
Sample
09cbee1e7b82256e013f4ea34bd75b72_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
09cbee1e7b82256e013f4ea34bd75b72_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
09cbee1e7b82256e013f4ea34bd75b72_JaffaCakes118.html
-
Size
12KB
-
MD5
09cbee1e7b82256e013f4ea34bd75b72
-
SHA1
ccbbfec588260e7f02e613fe9b391baa33e0a356
-
SHA256
633d2434da4368dd47ad0171a4dc39f78c6d31ed3d33fa53c498f386289a40ee
-
SHA512
4acccbc5934afea69a528b95afd08ed1ced6a06b9acc7c4064171b57d62846552c0c8eafa27124def16f5370356a91df1eedd869cab0c2a10f1c506e7a92ed0e
-
SSDEEP
384:sVlIcPVbjdu/gutBuZOnCnVeF0amzguLZ:rgh0j6xLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434020026" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60cdb958a614db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000fe64fe40ac1f3d7dfa0c51fa26b2093528269a19d5f959088899bd7ca1de6334000000000e80000000020000200000009bf988ebad8982268cd1b37250ebc391e4d208e3a2e6b5007e98f2712d4b45f220000000cbae6b3121deeb73405e534a045a81e488dc3ecb97f4f336c22033859adaec4d400000002f0a6d68b64d37e84185854eec75d44f71d1f2a5d1ce6a550482d060d02fc67831621084b3f00d6d8310ca07cba5c88d4dd5f5b6a252ffa461a25cbae901d92e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{58FFC721-8099-11EF-9C5B-523A95B0E536} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2680 2668 iexplore.exe 30 PID 2668 wrote to memory of 2680 2668 iexplore.exe 30 PID 2668 wrote to memory of 2680 2668 iexplore.exe 30 PID 2668 wrote to memory of 2680 2668 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\09cbee1e7b82256e013f4ea34bd75b72_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59040e2b5f5890194ae2bb8a4806771a4
SHA19d1821c7b3bfec6e3ff1cf85277e11a26d7876bd
SHA25628ad291a72b7fcfd92a00786993982b49b32e2784df4396a3d0ac80cf219d245
SHA512d02e1f1d8afcbc367db13c9afe1739f5e65ac481c91f8680bb13939e273586c9f5cd08deeceb8f4a5121bbb614127debbef19cb51851ff949e13f0925f9b3efb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f371abbe643a7f63087a97fdca123060
SHA1ebba75f9c18eb89f10d1a797e4f4af853be3f6be
SHA256ce492f69286e4e47e8369c94ba36106a62a1817837d4edbc3c3108955ea804c4
SHA51282ea29e43c46f53b1be4eb5eed76eacab5fc7da1b3a1da2a04fdac72a0a97215cb202a0e004bf4718288a98c4b5ebb1dced2814092ca1101c2d4279bf4dfbabc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564ac3d167e2c170f4c797dba77880b08
SHA131a028e0e9ff07a660916ff2531bb88828d36b9c
SHA2565ec341f3dfbbcda239b54f8128a769c8c325ac2b207fdbba2747be60a37cd219
SHA512132ac6ac6096da20c2e996b55e2f7630a4590997da845f0ef58e97678c6c9742d14596e33dcb7682bba5e2e010e227cecadf3368ec016f141c7862e35426fda7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bc266bce5936483a645283ab4d05395
SHA1002cb2f7fb4c75f44432102e5475b29ea1cb1cf6
SHA256971e3b72cd467e77005fe3d59fc2cebabfe24cd2fb5e767afbe82866443c5255
SHA5125a4c018238d105dd56d180151cbb023f812a0b6d90484dacaad0a7565752bd380961e63179e298783450f184d59bf762ffd8a3c3ec34de793b8a8cb33a7ab486
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58992a991da48a525c7e2829d3f678826
SHA1480732fa9e3561f5f0dd4b2ced8b2ffb3ec436f4
SHA256a4c14366182d141fd4faca99349371e7a6ae59315d3df8a8897d70d817a5ca2a
SHA5125298a5d96d82a76e3270a8e6b2f5a159e73e0b0dd2ff49fc53fc223490f38db62760d0d4594a1b3389fbe767f79d3ac878ef40ea793b9ff6a63890490a2d7a0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fa586d24d4ef0a660659e3c96d5c72a
SHA19ee6bd7d3638bcab31d15006ec90592c4ec5c33d
SHA25675a6e1175c1d7c4462e355405cc9be1451c9c42f0728e1683ed024e62b753330
SHA512fd2acaa1dfb91b15a55ec707dc97b82b838274a783bb2697f0ea674720078195c9d3cb558e47563c887b5c7dc8c096ae11ac417c09c0779831b748daa76d0bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0116d6dba661a274c4503890e12c2cb
SHA1db7242fc225a09ab70b67b2c4978f40f21221e1e
SHA25670b5eed7afc9f4eb004257c423037cc294125dd2183e4e6c23be0c6c611f6821
SHA512dddd8265d9c28fc99aa19edea9b3758265f6871718d1867eebe2677a1022214249f85c0a2044012ea27ecaedff5a13991574bfaa7107a41f705999fe4a8bf5f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8ab283c397a2598c08995cab42d0ee5
SHA159ba80d7c1f9bb981feb2b6fcc96517a9478c419
SHA256f4f5c46b3356a5296955ce592116bcc8954509dd16feb2b1e73e4b6a3997e10d
SHA512ffcbe6c9c88c7348e6678a6fa65c65723ab6f29ffa30315c3c01cebcab80ea13733e661fd3e3815310ce326184bb380d9eba1fa1ee76499e5f5cdcfbee62ce11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575f2fbed45a5bcf7828364d06c2a4aee
SHA15ce1ad4c7d6ce89a94b0043c2ad86b96faee9da3
SHA256a9f9c1400e4a6ecb939eab9aea379c594f00f7bf1f9881099f4666b064d753f3
SHA512d3a2dbf4208fae402615599722556c2631532a74c742214fe47c38709a6b40623c07e329251ba3dff85d1999f82292b06f403db24d42fbd52c02990782e160d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50df0ff3868cbd493d529f11ed3a266e3
SHA13d2d90e95edade52498345be4ffdc6b37b1a11f1
SHA2563800bdb404be5d4010086f3262ad58279356756325da2c3b57384df9072aa687
SHA512c7f6525ab83040736f11e7a7a8d5ef9dd5d2c59e5494ed68d59ac5b90812aa35f87fe3ce778cc2053b539d4118784d33e08ed5b28640d370b7be7fb187feacfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558a68aef54f0e3cbe9210ab623df808e
SHA102713e68166dad06c8398d658472c2fa48ecb7d2
SHA25664fa42b4bf74fbc81ff76d99f2e0e87e2cb1deea5ee7c4ca4a74095f29c1b982
SHA512d75ae88f4f31b730f46c858f0d8bff3229b302abcff079aaa0c46dac58f8e565cdfb7125b3531d37c769086c664d44eaa4955795a1c54cf20736ac313e1bd0f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590255a242507f936b7c4d06665139766
SHA1e7298239ac7fa37aa19235bedc128e3c55b1e50c
SHA2568edd33f9df1779978f532b8b81227539b7a1d95b8efb4d45ac167ece378f73f0
SHA51217a4658b0add6f8f240058118d6c4c859c71e2dde0092b24d003606e77c7203685a8f2008d00993583019941c23e4058b4991f754a3f3c6837817a2c35ae777c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552c6a0588968b48cab6a3b8f0a109651
SHA1271174c12498edd2c2777424ee184ba4e39f7d21
SHA25678d1c1917bf6ea0b4436fa9851e79b4121451ad45b03d07ba8b3962afe1f6ed1
SHA5123faeb88f1ddf9cdf1c55f5f0cb384c5b5ab802e6f487356acecd3de90548c0d5ff0c120ee30a6e072a88a52249a5ab3048daafc081a58b4459b775c2e79741f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6983ac4aa48e1a948c9be7b8163b865
SHA11d820302f5d35a4cfc34854bf567b7c8fee268b6
SHA256a4e03c7452bb65aa24aba8731064519e3a06adbf8c46c4e918174c4d4f1c7d07
SHA512db0481797e9883f3a840d3b03368cd4f0c8aa4c6f8a3b4db077e0f3cfd15332c889430dfd27cff11c4323d3c8d40fa77d927a180b60f4a2502912ddb41dca4da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530d128b7cc0255c4015aa2f9e2926376
SHA1b31cd91b035aa41411655e599ffffc64c0192296
SHA2565d6576e1a73c1764a01668191e08f16951cd858b03c7009f2811466947b678b0
SHA512a5d09cb6901b1b644c8d711e969240888547400f7dbd1eb6e6d27e9ffe06b177e91ce0558d920c1ebcb21689385e7b6addea84677c476991357a1bb0a5ee0bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b58c231826aac9cb31a0c920d4fbe1a3
SHA1ce8fc75e646fab872c2f7fd28ebcdde4fe59a1bd
SHA256ad9ad745e5a6f9bc7c8945931c66f3c3acc95faeca61647fc45a7714ffdfcbce
SHA512520240ae1c2d9d3075878a4d369136a9d77621627d6eec2cbd3a5b4c037986fe0461aa834cd80761609fc8eee6faf17b0a887243d6fcce6757a5e8251f02c5e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5403d25f231cd106576de9b7979237d52
SHA1f463b3b869fb5e1935df6c93323fc4fc1265740a
SHA256807a044125a1e624cb39c16b39128f46dbaa98d3bf53cbe40d57a973a534d2b9
SHA512ec7a6376ab2e102523f3a8faf7a2bc5618e049e6bf33c1c15d5e79f73900c172d7d13e8487b084a15e599c7acec6ad59f19a7b26afb8418a73a635e5b3437252
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53907a8bcd26a8507c0afbce8ca3763d8
SHA1b2b9074ce847a90498bff0466d2ca2489641a38b
SHA256933e53737c6b35432857f69d2f1e9dfa1ee0eb9c6c9a93666a0bbbd8e99d65b2
SHA512e33be4f1f4d69a83f1ada791ce7bb53a8d7f71aa4ac79cd7c0c50d022739ef39599b396fca7af87ccadab22d2d6158f9bebab5114e697426e5e056de907b6fd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51523e1e820c4512c8a6d4d675f251729
SHA16fc35b336ac90c24621aaba9b0ab08c4c4f3f268
SHA25641ef074ffa3cd2e6c0f54635c2a9ae26d2933c3fdb310838a2e2c2c2b518d0b8
SHA5121221b545bc2b206950a78cfb338cf307cfb7b33eed6d92695fde0af6e61d06bccae41295bc57c092870332e14f7b916e4573f010a4b215402ee8a9633962aad6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b