Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 10:56
Static task
static1
Behavioral task
behavioral1
Sample
0a5062ea469d382e2107a848ae5c1d85_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0a5062ea469d382e2107a848ae5c1d85_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0a5062ea469d382e2107a848ae5c1d85_JaffaCakes118.html
-
Size
8KB
-
MD5
0a5062ea469d382e2107a848ae5c1d85
-
SHA1
63ee37d5f76299418dad35901610619e5982d9fa
-
SHA256
ef84b78f11e4525ebc9c5e175b8fe0509b0269c4696d0f3751804c277cf9ecce
-
SHA512
cd71cfd10f515e686622f1c33f6a85276eaa6befeb4c1d6c2719c829e33839e0c80944cad6ebaccef9489826b5df3b33d20bcfbd2e4b2c10b0c25259658d909c
-
SSDEEP
96:K99vBfNE8ENydjzxiJne/JMYuGt8KKVHMnApGvGNWMpZwuDBGxZ:m9he8xYne/JMjGEVDDZuX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9084cec6b914db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000004a7e964691e7e79c55f04b8cf6cf7aa963a88847ab6335e26933e41785b54093000000000e8000000002000020000000064ae1c5b6ecfc7d13c60472006a64f537b75e90a8080b3421fdc184b4d2d538200000004071e336506bf7493b011a9cf86c896c68a75352e7b237ef5854a65ced623b5e40000000cf9655dd8544b3c3a04ddb22d6fc08ca567c00193eddee2055020ea87b9261c39fad94b43b29f69b9792449f3ff5ea6a8ee704626dacdc968b8c9e4dcd511cc0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000008a698dec1ca24c204e4e7032f3cdbe034a536db7c43eba3d567df5bd89117ed2000000000e80000000020000200000000c2105050e0faa422c2ed84414f43114cc2928bab6de58b1dae2cae9d2ea329a900000007381f25eee5de53b93527fbbe38ced3587a5335d9210c95cb93a5b8e6e5fa11fe78a9cffda24643886fdaab33cb7a99260e5a67253e7e661b23dce5f7a72307b209e7e002c9e2e2184bd147aa8cb867d54a5e40f3589c5ffd2d75a23718dfd4839e439d27abc5d3b495598e031b5c5861df995006a1e4a4491c97a3dd61c7222896c385bfe184d2c0172cd051fe1fdee40000000a0a3295ec129728830927beecb97a666340c2339e8c8b9f5a7a6f130c985e59d0dc80e51f9c8203681e3815c27630ad6398bc79f425fab4de017d23415fe1dba iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F0B13411-80AC-11EF-A087-5EE01BAFE073} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434028441" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2532 iexplore.exe 2532 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 3068 2532 iexplore.exe 30 PID 2532 wrote to memory of 3068 2532 iexplore.exe 30 PID 2532 wrote to memory of 3068 2532 iexplore.exe 30 PID 2532 wrote to memory of 3068 2532 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0a5062ea469d382e2107a848ae5c1d85_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5307977a7ecffd746c58ede191d9f2b57
SHA1ad68422f17709969e41b20adbc16d81eaafe8a95
SHA2567b7e8c37405832f920743adc39f09c7436319e83962f0a558aba0a82a28ccaf2
SHA512046742216f1e6c26cdef39cc498f8fbd7c65b8bb5088b9bc3afc5205f85d454f0a3f43dd67b1d0ea80fcfa1d50937e4ccc53374eb9660d5cbaac2032b53be604
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edd3a969c98a95c3766b15aa323558b7
SHA1a11e443145a2acf50f45e8bc89bd4f6e6d3dfe5c
SHA256065252835ea46fa8e72ce2633f9106866b10fcfeea02384172e36a70ec1e1019
SHA5122fe6da701fa6ed482dd922c74bfe96c82acd773edeaf6a47d52ceae922c9ad9aa11b80947b592439b5b342cede9d67afe44e1606d6fde30f14ec6a7d2beb9c53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd7e5d91b322e68cf2f4899d08840179
SHA1735807394de5572d6de7e48dc2a82ed2630f9036
SHA25669d34a50d3e129d78c56a2680bfc1b68c124bc1b207bc8ea592183a96014a0b5
SHA51286a8e40d6004e7a3feba9d638a1a7c60084fabe4eb48555cdcc19be21bed7c52a64a0420d3be1151934c18999523f2195d2072f54322476243530ae6302a04cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7b0d59a4f0ee088601051098a805a4c
SHA1a120c507988bc3697f1b08b87fe0ce8fc5028361
SHA256ab6981e1e8bb6ee07dcc3e4549ba9ff012813c59e1c408bd013b9b5b7573f004
SHA51239a5b88421d98f6412a3c9a08fae4d7c2d7d1661e314c4dace6a06630257318821afb4b8b5d70a7ccf9e4332f2358910bf8dd23aeff159e8cd3daae025ab0954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8e20edbf3780e86ad3fd84f5276b120
SHA186755f3c745f2d8629a85384585b2b108728c17d
SHA25637a271e16504f17a51092b0dbdffb71266dbc99af3b6842b77937f2796d51bc8
SHA51223739bf577364c6e574041d6fde740e13e9c009592380f62db68c4814f5ba4b9cb822bd2346cfda19730870d4ed188a155e6ce559adae56ee183448c6b21ea23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3b8ae240a35f979f5e4d736cae6b1c0
SHA1aecdfe119cf4c478094589af672a1a1cf524dfd6
SHA25622839b15eae5c8fe3a58be511f3385e9f3dffa92fb67ebe6f48c1371fc9335ee
SHA5121f7f14da873c65dc2ef7701bf108a9f1be623efb1a2071380180d3675394ebb23b0015531f603d395315045cd4184df2c6ea74f5ceb72d57e238ff4353c0ca58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573c52aa20c05200ce269797ed88691e1
SHA1c1d08c2183a90be52fafa6f144ce3e2507f81c4c
SHA2563724cc51366a0defd161fe501d2f357c893a36e29dacf0ada2d62bee3154485a
SHA5120c92ff09713f572d535d92c051b5cb8a736e0f2dfffb50da1f5fed1dac440010118e39a952e06fc0fef23ed96e36d09f94f6c99590a5773b1ccc54c5b83b9f85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af5fec89b3cfed43002a217a3009c6b0
SHA1883857567a841d9d905c97c3be92345b8462c32e
SHA256f25f0000d50bac1409950fed14431211de72fc785b6fbdff32fe120deb8ca3da
SHA51256084fcc6b8a2873a3b93b14b4d3a3c68fa797f6c5425e67395f312e9426ff6626f8c152dc7fdbe7b8042d08d8f977549d4dac8ba28aaeb704a5af10d87c761d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4e9caea0114a626bbe75891ba1fe3d5
SHA1b2cfa60d76634d293b96a32b9e667bf5c8b1ade0
SHA256a208c35e35a652bdd339eb6f9d5ee8f38b178ca7bec10cca61fe2b366a11ee84
SHA512ca7976506646dcfe312f98f82ff945a6567adb86c3db1ed6e9f50e35ea421e6733ab536939851b7ebedfb67f8a256f940f574c323902990fa2bdbbf0079d9265
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56176a773df557cb310cc582a7b68aca2
SHA1e397b4f8b8e9abd314cdb005ccfe996dee7fd4e0
SHA256ff60a275be8ffdab620a456e2988a6bca3f9077b6f78343b4febcabd0aeca76a
SHA5121430d07771eb9d9d60ebb1d43f51c1fe0ed1e434f75843d57fdedcd98310b8813b3b99eae3a9b157baffd26badfb1446791899763a27d1cef120b7d96ebc5411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff8926500f1c3517f22fa0cff4fe2ac0
SHA111b3e458e46add936fb1be501332bcd10784c633
SHA256e95fda99041b293cf309296937e0806544b1a876c8f5528bb5d0dbbb30a1e6de
SHA5124e3abb7b45c7f05b8ef4e948cf7a783cd09cf6b098fd91f6302d1f59672d0e94d4d048d3da21be0c785dd6ac6b9d73b8d67172ab8f9fcba4dcfbb6ee5a21893d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582272ccc71bf7534225386b72051408d
SHA188dd653bd62f7e4bac142df0b27a0d86d2b1ecc8
SHA2564a126e97aa00b6506a219a01dec67cc7e898006a23359708f3111518544b6cbb
SHA51228bd1b2a974bc44ac1f7eac9e9e18f003591b23f9ed7643df775eaae5a645485754ba439650231c169257edd63e07ea680c069d39f6658af5fba95c25f577e78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bb24e143f24af9be6b6a0ec54e8fd5d
SHA15f413e055b4ba8445598510799973079dc07f201
SHA256cce3dc99e8d8e34b7d2a3f6137522e87a2539e2ca48890530d578d290b090657
SHA512ab02e66467d83e03ad4ad45f85552e43b17f039bf58a260e9561193d0be325962b4c2d5a655f657e189692078230def928aab414ad20b8e502993d69246bc49a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d724ca2bd9d5671e6a6081ed44d92ab
SHA153c285799118ef0cd0c513450a548adc40736c4f
SHA256be977acf62ce4f687a804d59e77f23d583b0558ffb51e20642af0c6cf7d6e904
SHA5120b0fbd7e5849783aa9ddc2b8b47c1824c332da29fec4db97e930c73f6ee0bc6471b83183abbf1f2aca142fc71f49eeb783a523dee1d359efd06ed0d449cfe119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590c9064e2827ffeaf3c0708c5d44bc32
SHA19e3a79076e5dd9fa744e81f5cf212131784bad8f
SHA256d5d4113cddcaa88852480cfbafcf3b5efdd24b56a3ae5a8f3457a45dd11c93ee
SHA512b85c376a420f94ba52e4cd732c3b6d28681c98b8c003eab1c9779c112df96fdc5158b5559dfb5d30b67c46c86a5d9f01181a48d4e45be4e6b9a4c1c3610ec08b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a330b0ac39f7b7948700e5baf47201c3
SHA1d4a0e7f948ce64e8f3e3e6d7fc2b8e1a9e8ca763
SHA256241f4baf6dbd4d8b24555f83ca3e4b98f894fd837516220101ce56ab1f606b55
SHA51248ea57954f75d299e900a6e065ddca8cb3a00117194271c87e4d5775248734dea1a465f028b18e4ef01ed46f08176751c0d6b240c8b9c2ef31fb395efd3686c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595e8b1e21672a4719680ef98e044f2db
SHA1b79bf37d006d9e20ac4915ef0bb2df15f2cb5446
SHA2569e5944150d165caa13897ddecb7257f2a1aa586e7fe37c992ea729850712cb43
SHA512cc3b5e4cb505307df1b68f9f07c9bfb3b4d33d193256b83e61d9f4016b894243ab000862806a0de64375ff745bef2b56fcc06dfbb177f7f7a972a0ee9253e7ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc86b57c888bb0252b0984ec1f0cfb10
SHA12530feead2bfa5ca9e4068dd02400b4260aa00d0
SHA256f1dc44b0597e119b56acf8df14fd58f8bdbf2ba845a1b959b3225ab491f51024
SHA5121101d7df794e0323db056fa8f652606d97a250ec37e087d254b16a26d60f03fc447f49eb314cf5dc067cb0b6a7d3774538cac103eb2e429707a0db2215cfdabc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b