Analysis
-
max time kernel
143s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 10:38
Static task
static1
Behavioral task
behavioral1
Sample
0a3fd2105902fbd00e6668ad924c61a4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0a3fd2105902fbd00e6668ad924c61a4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0a3fd2105902fbd00e6668ad924c61a4_JaffaCakes118.html
-
Size
139KB
-
MD5
0a3fd2105902fbd00e6668ad924c61a4
-
SHA1
15e64b2804ce58a57c8ea4f1ffe4a56ed9c42650
-
SHA256
1b20c4f8e19d9e01db86ee810deeef2b46ad8a442c4bb08ceda7db22051eebaa
-
SHA512
78e794b65e45fd2afb621e324626196abb8ffe744d07c7c26e0a164a7db2e7c8a70c8f67e69cd2e10553767cc031202c0685511e44eb8f887ce83dd05a571739
-
SSDEEP
1536:SvpFxT4fEWmtfdm32olZCF9yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP06:SvP9yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70d31995b714db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434027388" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000000b36282eb8d170a2de989c715c0d29988fee4c9b14f981b15d127a9cc3e0f8000000000e800000000200002000000091d1505bd72a5e797e9737f03cbb862d57c180622f351cd37163d54897e08e8d90000000ed5abc124377c84583197ca7bd8d0c4718f25fc92d83d880c0177812aa11353b5aef8d3211616e60331d9ff49f8fa0bff98f485e230de0ee31b8a9ba580e141aefa0e1caf46620a13cc3e327370da3cbb75f4012b90a41704c9675405e4453c74c9e225224ba5dc842a4521e9d8a21f5cd28f87396a036e60dc8dce746fdd6d9409d7931a38997bc5a07b4c038563d894000000050d548de974d007fb584d5c489fac1758c614d038045d7d3d093a0ba5a6f6ae0abccdc4773be069e9ba784095fbbf889b1387408fbf368c95dc577cced05004d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7D0CA0F1-80AA-11EF-9C49-4E0B11BE40FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000472898910d9068c7564ae1cd2d2db037d346283885dcf953584b61b6619f15c1000000000e8000000002000020000000f793e87dfe9e5afdb7b2324b3b364fa22473f723abc8837f28460f46f3a8f032200000004b07a7aba53f346f9564c825ffa03ec5db065c9554e898236a6e22b9f405fa17400000005837c6ffecac9c5695a8b2267b78c5e7bf180e2808d755e4be671399b7ea799b7def4f1eb692faebc35b7a018f1a5341e03d3d957b6d5de38391430987715199 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1680 iexplore.exe 1680 iexplore.exe 1924 IEXPLORE.EXE 1924 IEXPLORE.EXE 1924 IEXPLORE.EXE 1924 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 1924 1680 iexplore.exe 30 PID 1680 wrote to memory of 1924 1680 iexplore.exe 30 PID 1680 wrote to memory of 1924 1680 iexplore.exe 30 PID 1680 wrote to memory of 1924 1680 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0a3fd2105902fbd00e6668ad924c61a4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5630b7836859db9d938162d9279c2d321
SHA1be0277c976b18ef64209873ee4dd139781980d55
SHA2561ee017721aee87bc0419e368194b434c477350cf75b389b1c19a59f9ac5d94d4
SHA512c69a469dc60970334a268d8d51079de0b79503d5d65b5e33ac76574cf970d23e662a766307658c03970e551cac83491af1bfed87f2e3e26e10cbe253453d2031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c07c5d3b0f992a263b902be7632e7e93
SHA1b92578a139d76041a19822525fad1e3c933e12cb
SHA256d3d3c2e5c4c9c2fa6776acd3080fc625ac7a21ac8a334967405a2108ec1bfce4
SHA5128f3da388a514952efc96373d12e143946a03f5c91c7c1a00581faa1f1a145e2a2d73681fdc7d5a6ecbab65782ed2acf9e522f05b38eb456e04e533cf2456cb27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a93c028152b462ff09246320fb8d2d70
SHA1f46999350c72a2bc565b858e3c74e5b4f00aa703
SHA256ccc444056343740f608e392becb0b07ceab38428d8cf2f0060700abba6a6712d
SHA512cec6ec78eb8483d2732b9c0f4c7b8c7f084297eb2cfa80cc5579ca004a315691ea9e217e2ac13bd851ab842ded4304bd662bf76bcd62170104f36aaf82008f4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d1d89bb2847aa2155f2aa1e4f946fbe
SHA1f4ed320f3a72ab54fde7fcc9dcf7bea30f227dfc
SHA256c9d997559487fa737489eb3801b9f354acf9c7a27b8b2212655f5318431a8d84
SHA51297e20c09040ced5c27d1e94a4eb199b49258bbf929edb4c557f6fafaba6eae5360b045a9479573903973916e2660b8ef4423a2a10441b62dad7284d812e482f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5339568ff36059552b3f66f4f21bd6b29
SHA1866f7927aa71f77aa3ee3bc1e171a9567289a786
SHA2565a6cc53db868267bacef5ad3c6a06f0fdd2a4042e58d0514639bbdd17ce5f71d
SHA51219e5049750133271afeae6eb70ccfb6acfdbf1b1567a4d439d9842f53d1ed6872e989e9efa6186de9c3b167b9869a63747cec9116f5154ebbe7350acc737f403
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539bac982e67445190c48fdd2f8cc3c45
SHA1ed413e017f7ac6cde73500d67d15400549741ab3
SHA2562a863915e84918d42bff7ab388eb2bb3644e12c0c94d28b093aef1197665a64f
SHA5120214529acba18bd0e411e17b79fa317f5680864dd9d3a2c06aaf11fefa24d04108871939e03623436eaa0f89a8d685be7714d9cd277539f204218ab5b5390636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3130f8ce3389cf5f4efb91b95e21ff0
SHA11db2d65439eb5de5ac269a709046fd7618fdd932
SHA256968d4e47ba0326b4d56e6545c768b69541dd8c12a23809ab06025cffa6730b26
SHA51213e2c16a46551c2b54d50768e29e526583d61c422894960ef649fb96b31a0beeea5a3e55f67634f4235e69e7b123e693a76c06842332eb62ccf38ac96909acdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b4d05f5755ebce617f10738c4a72b7e
SHA122f5f4fc121abd33c1cd23878ac2bb82a4333098
SHA256a9b672c925bbd4d26254e04757cc20ce1790d979fcf0bd88cf66677a6a88466f
SHA512b5c5992271611e67e6796854e20bdbc471c9a2956d8b62138c28783ef8b3321bf8247cb188cbc6431fc65819be3aca437f0aa1ef48863701a60ed382c3f50aa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512713daa582114b3639b23d9fdc1c2c9
SHA1b32e8a87525b55ffe16ffcb1e2a42afe9e5bca9a
SHA256e39069b7c6db98dcbe7e0ecfbfe0dce451b8cb926b6b528d5adb5aa4888f44ca
SHA512f6efdc928be98e6868b7c91f10344906897d01d1c5824f17772cb57830286ef884e041952bda4f12ea1871f5301679c7245d158059e325e0c974b37b354ccd5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579bfef233c97a808cb820b95a0ade4f2
SHA16f42edceb9e0dc8945be25793e562bf5e561de61
SHA2565c2b11faab127a9db739a8f3b06873af4cca69f04d78efdefcf788b7e711da0f
SHA512abe576d17bbc0ad7db469549da3cf80c02010aee390d133e07ef0461da92a8bf7ab98bd656f532256ad16291f6e1183594f6d11faf878da7240c92d71f10447d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e65b0391de41ed06ccf5dba29122f7e3
SHA1732c7606a93bfd2405250e568ccd64c4ad5b6c51
SHA25643e4dc7576f40a65581ed00aca54ad965a280a04850dd66a9d8643d4cf45bf06
SHA512a889096cacfbf8ecf20e02b51128ec1eae609aeb4809ae697d6778cd8ed79b6a35a84be67bd09d60bf22640a0bf1cdd45ef9417f112fedf0340510fffb5efb4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599fcf0c8a282eefdf9cb60a8459920c5
SHA197e15335670096d0c87e80415bffbd92a80c8024
SHA256f23cd0c47d999b5b6479d802677d027c545d9a73e874ccb6570b5007ef19a9fa
SHA51299a835519153a87ad0f7fe3c5dcfb251833a2da0a87c871b53d4ab661f9809ccee75e8b2658b7d63f36b3318cbde4f3500d25e7430c37fc2b1b7099eda53bf8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b52eba021e73128bbb4777ae7d9273d
SHA1edd581217810d063cacfbba29c2ba1eb85cb7605
SHA25695524215b850506883ba7722011412f3797c53bb81a3e4e540f168557501e895
SHA512d98fa956db26d4c1af51806e65077a4ac3908026a03c1106f34bc4babf06a84288b470c9b1894e7ab8a6e3a0223a30db8a308fc604049162987ec1810953a722
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c014ff5b48b006ffae9fd38d8675c33
SHA16d6a8df4b0aeae6c5f6951883b7da9f56ff28a6c
SHA256960a8814b4030bdc1e7b6f72fc85d5eb2b933a5a1f83965f73c77446a297b8f4
SHA51230776f5ee16a3ec5ae1610a44c66e2edc3096f8debf5a4b29a8cec4e42fe4d2936b99971bde996f61837097659143b9b7ebbf06801a561e49baa09fe8d722f48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561d6d8ccd8eeae45dc91925fce3d8f3e
SHA10ae8b11520900d54dd878124dae6ede18a483f7e
SHA256ac23a8997a99bfb9778a22b8d62c6bd357bdf6d833f829ca6475fcdc79967d14
SHA512cafb1ea201890a3a8961f0fa48e1c47b95b675ec889728366f557e755c6c032d8e252d6dd3e228378c1a3645e6ec0736edf0b066f4c9fb7ccb44e5c18c67aa58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57914141316b9ee20cde2157bf8424e67
SHA178394bd2344aac9a37dc8a57db59aa6af670f13d
SHA2567f9d108c2c4ac0ebc8631647de18994bffef4d3f6549b68766fe58ff4d765873
SHA512b838dcc2841558a010742afe82ce19e99165ddaca21a09e6c985edf0879ea913e2eb85db33752bb41e1c3d647af871f9321d1a289fe1d613b135a26f3993d7a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520c9befc8021d50dbc982d8f439359c3
SHA1dbe5f327a7fac2f4e95a3e7b1d4b94ed47097fbc
SHA25651f4254cfc4d1f935d01a355a0887210ef1c4423911773eb5a3d15a26ea7d2ff
SHA5123874834cda699ccc40f71a2b022cd602e3667f1063a944b7eadc138425032671bb3073e27138e61682ff033d3aed0eb417671c1632100ce8247e357628c77d0a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b