Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 11:32
Static task
static1
Behavioral task
behavioral1
Sample
0a713332094141f0b3799d35be08679c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0a713332094141f0b3799d35be08679c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0a713332094141f0b3799d35be08679c_JaffaCakes118.html
-
Size
53KB
-
MD5
0a713332094141f0b3799d35be08679c
-
SHA1
1c44deb7db77930981d56663bf71bd1adeb203eb
-
SHA256
9bff1aabc103b7b2cb542c82541c3dcd3b5e1f12f6b1d84857ded44a858e5b24
-
SHA512
d8677d203245a15be44573cd46bf93c0572542b5480fb3a03ef3443db38bcf6a6957208fc5a44db4d736dc53a39a56aad4632bfa42112f0089ddcaacd14e2c5f
-
SSDEEP
1536:CkgUiIakTqGivi+PyU4runlYG63Nj+q5VyvR0w2AzTICbbpoH/t9M/dNwIUTDmD2:CkgUiIakTqGivi+PyU4runlYG63Nj+qX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000209dff232ada0e91a0b72ab5f7642643d104554c80165f2b90b8777865bd4d39000000000e8000000002000020000000c63841f6507c5a88a77bcfecf0d27136b9795dd3bbd1d793afebec40ec3c21d120000000404d5584a0a201c85febd2ae31d4a43305ab7c2b76fe0d5ef72e5470a33bb4cf4000000098a5b04aaaa773f12c6627664c51b7a29a31ea753a587b2a0dd9bbefc8f547e6c77d4cffbd869397079a1e47dd18542f7a9642120ab4032dd82213570ebe2b31 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434030617" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50d2f2dabe14db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{024DE4C1-80B2-11EF-AD58-7ED3796B1EC0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2820 2280 iexplore.exe 31 PID 2280 wrote to memory of 2820 2280 iexplore.exe 31 PID 2280 wrote to memory of 2820 2280 iexplore.exe 31 PID 2280 wrote to memory of 2820 2280 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0a713332094141f0b3799d35be08679c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba2dc5ad8d35d1c9cf0c989e7dd3f44d
SHA1dec79a94e224e3a94fad2aed828a9fdc3539fddd
SHA2563a224f4eda840a2d50e8414fc359cd97d8cb30637ccd6a3b6d98c93212ec75d5
SHA5124dae706cc36d261b09b3117d2891152d471bc49c37b0bbdd2438fd1086ec08d057b1a2dbcb4f0d74fd93c28fb19ff2ce2164a9812fa05f8c37db3814fc52bd7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b9b2e29d4cdff8c3c361ffe9e290857
SHA16d0b31f1f55552cc6895da07bcba0b274dff752d
SHA256cfc4cec98a38a1705f266206fa3283ed7493947fa02813a67ed3e931cd051c26
SHA512d24f15ae33ccb99f2e4f5ed6c92291ebbaf7fed6226949b2e819fbf884fd966e728034bade7f95dd4541fd540f8eb82587973caab2b522a244cdb732a648ede5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ac208b732135b5205dd05fac13da214
SHA14983822d331aee940e290bee129284056f86f861
SHA256c189da7ebdaf858676ea39131166ee7a5e48c8d4ec58338a57067ce1cf2fb977
SHA51214b01d56bf1df932939bd29223922ebbcceb85a429fd10d684d6fa71c927d8d5f2163a4443bf1d8c51ea04a7115c3a4b2ea86790dde4afcbdeba0348bf12bfac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551aa5863c8f0edfa3967d656133c6193
SHA1905e2c30ccb21f4464ed232779c43b81bdc973f4
SHA256280b85d64134eb04d3724f731a1f7ea527ab5e77ebda05e412c231ac379fc5b3
SHA512c841b82ffe023c7fee034d5abf5e7132df9a4077e822881ddbb23ee43e7f0e2a3179b56d62ea7a9d5ef8daf8248bc31f4f6d92965b0e1cd174377a335f28e22e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1400cd670206270906b304e96dfc7b9
SHA18624d59a686071e628d145c37314df2a420c73c7
SHA2563f9438f5c7fd13bba847f015a5da29183dd4e514355674f6f7a0d0e36c983b82
SHA5123ba58e0452dbd69865274eb30c2ee074f086ef4f80c1f3d6025673def07243b3b553acf2f401c48213712bb1711896d1a0d0718dfaa8edab55d8ccda34bdb57a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c97acf0ec13e557d2e02bf54dc7bd82
SHA161cdcc657de063c218ea33863d9f8323c1e714ac
SHA2561d6704e91c80748ca0e27941765f39da9823a6e40f560e1a3351408cf4e29c4a
SHA512aed905062167e6880c8a2e1a717afe7039a76478b165ef979fd3dece8159a791c8c116e547b96d6bebf69590ac45b6cd7b5945e311bb6a949c6dc0473ff8177c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58042ea4645ebf3522906d0ee9c1f5d58
SHA16649ccf0401af4230a03acb6731a4b159620bb92
SHA2560b806eef1dc3843e3c674fac09e7db7014b0fc760798de2a92f4f6157874dcbc
SHA51282233a296f4edb091007ecb53de1cc16f03134ed5af4d554d0ea02eeffc422a6e5129025f4acb848c49ebfdcaf8752bc7544a87ad980f59c33719d8ea517cb88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5983b776835820aed19df0dcb366484de
SHA11df1a6ed3fe03ee31d15f7a494e741a345651e2e
SHA2568fde1dedf45b051342d9a2b35a5b4ef2f78262d47e53e430455163015d5b555c
SHA512c068c5ec967d4813ca20c116e5b77a629aa18100612535494071b7dcfcb18a86c1ddebb9e63e152b4a14d70934ebe460cb272ba3bbdd8a50076716c71f5dfc77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5415f8772fbf2a09b17d3cb398c56a561
SHA1bcc0a523fb0d05ef7c171f8f629c079f1c0ecfda
SHA256eaadd2d11e9761756dbcd51b49ba5289ce7e05f12ee27d21145331f5f26d5ff6
SHA51222366e62cccbccf7990fb37f83a15798c0d6fce50f8e2817b910155d0cd0f0f72f5bdd7a905dc02a400fbf125875750d4635ab80aff4cc2f39913a6db1838338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503629dd953f09b48bd20b1122fdff547
SHA1f10f836924b56bd0c792a459f0bca19e4384dfc5
SHA2569e052f91166937298c05cc7a5cf435947553166c8f74b84d290ebe8cc6275a6e
SHA512e3330517d30debb29b6e83c3f688687f6936e23a77184e806a9c8904d0167a7a523fb446af2d7c525b2d9a97550976da0c20963a426a66412847a7438b1a7523
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572f9432258f323365940a70a7aa06dfe
SHA12e14448bbeffb6f10c95640a87764765269d90ac
SHA2565895c71380964b285ef7bc2d2d4552b6d22fbcdeabf912125d07599bcf46ff0e
SHA51286772883ce31a23003197ea55e8bb4b03f05862ae7d85b9ec431083de1e9f207f90f1a553d22cea17454c19d2de9520d5dc3fbed8f51a6c016607c3cd899369c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d098929c2d86b21fb41e969dfff63fd9
SHA144b12d797b09caecf0bf243ce6934af4e601e2d7
SHA2560357569217887605f0dcec718da676fbf879c8c9fb7dee153e01b6858435872c
SHA51203ca12322770a7d767fa7bdd7996ce640383a064c6f7ced1a6853d8d5321adb099d14f856997ea81b6d38bb1441f92d8e0b096f3f3e29f6c9d0424592bd77bfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e972dcbdf29f5005d706d0dec66b943
SHA1ca3d7ed15fc80d7070c5836522b2513dc0322630
SHA2563e2b530001dcd9da8bf21cad041cc94c22e094694110bd3da1b214737d57bf49
SHA5121d018cf5357a058114b63211503183fbfc89a03952ceb7d9cacdd491d638b300e48ce6d63038b5c7b79e9fce02754c0112e33eebbfa3b1f54b60ca4ba92f3f1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521a65d2e92aeaf26b63b89687bad1d5d
SHA125e641a4044e436ae8d0e14cd33d491651354cec
SHA25662d79e3b30e8cc981207749af7c1345526fd4fb5fa01ccb2c0503399d7e26034
SHA512c655565c5fbb8a726ff28c6ca6845d69e2ff73c09aa852e19c2e83f94401e3f56c9d1562bcfb865c65c037b8dedf0c4aed8cd052a86d63316240448c44a9ff1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520f1bc0be727b7a46e22fc1afee63fc5
SHA1e008ae88e1d14957247c354421ebed37b2518239
SHA256d28eb6756c70251828c093dab42612655facb02a351e9e825be52d38fffbd615
SHA5122e00c12795ebe49af7c3be9b4ad505484eb89c3b50f9817db3cfa7548f49a82ad4821ad976dd2e307c097bd86d74112a712f2b2d1f3fcd1dbb8be9b8ab0195b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5696f406dcd99eba8058d4ef9b41c1cdd
SHA197403495048ba424dd9d1302933b3c66b239e864
SHA25662360955b43781a4015af3f3979ab03cc8506d452a0d58b0abe73aeb5f6e15d3
SHA512097f2465455e0ff1fe960ebace5a38c4011f64d645fcbd5a3a1d6e61c8d83cfb6dea7be50a98d608146121e581322490d36b5da865b4de273b2b87e91309164d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5558494170c45694e08e769072f30edae
SHA11b5eb27c7f32f43acd10478dd72c81f6887f9ab5
SHA256855ade38d891cb892e27d756d110abccb2d01e4ecceeffafe2a755c605f1a67c
SHA512348fa7f60149b0d84c243d7b97200a87d1edb84766176865a3f2ce40b624538560331a21f9dfd17228fec44441bad4116c5c5e510ff06a1ab45e6b4bb62a1867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509328b53b634b2e8ddf1d3321bef1eef
SHA1bf70d9689c9cbffa7028a9aaeab3d769c57f833a
SHA2562b106e1aab40fc08b68d71e56c4047db74ce7a85ec24f380e3b959d84e868cb0
SHA5129b84b8fd2b5a66258c49b6e8e945290ed2cba0d283226c246ab48a13d05f99021d9459b0058e0e7065ee373c88dfdb3ecaa46ab1c3339f6ff85630376989527c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c03718854c3c5590d8b23f6588d5615
SHA12049c1970d10808a0d63147d1883c5bc32efd9ed
SHA256df3760e97f0ca27ed117b8217e3b2e5c3aa9348fe0491a6479afe33533ca5873
SHA51274a0457e4b8040709a2d2931f088391ec5ee09f3af16f31c7c9a6af2217645538011f234d3df28579f91422b32be28b1841cf2c96a807eb18f2e3085864bd2fd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PLSLTMYI\topic_starter[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b