Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 12:12
Static task
static1
Behavioral task
behavioral1
Sample
0a97a3de824637dd9acefb5830138efd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0a97a3de824637dd9acefb5830138efd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0a97a3de824637dd9acefb5830138efd_JaffaCakes118.html
-
Size
3KB
-
MD5
0a97a3de824637dd9acefb5830138efd
-
SHA1
ed8414992b1af174386659b0e598caf5d563f09e
-
SHA256
cfda60bf66d3b09451af9972d56b8b17cf22927394dc9f965cbce5723642b7ad
-
SHA512
7a90fd27b84a004f5900dbe64e50363d79766afe8387bf5fe1eaae870c779e8f5b2556e540efd2d163c58d1c7826a86fa5d5bef32f4a629f4b0eebe1fc26bdbe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8819C741-80B7-11EF-B2CD-FE6EB537C9A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434032989" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000631d6c1b187d89936c540b6a285bb44cd74a52e50f27fcc6bcc7da594917f1fe000000000e8000000002000020000000f81ffcee7d19460859474fd3bf42bdb1fdb4d269aae3c4a2028b9052073a17ef2000000049c476f99352ee6d06cbf9f892bed0366b01f7f0f43b0cb3b8d36cf7330ef59a40000000f831f394d6c07c621c6be1fdc739b0a63b27d751d3cbf558532cd8a55aa0f33273ff6b0c54269b457911afdd4b919b221d8db154d682d56ed484b1f3db107f31 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00b49b77c414db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2560 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2560 iexplore.exe 2560 iexplore.exe 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2560 wrote to memory of 2552 2560 iexplore.exe 30 PID 2560 wrote to memory of 2552 2560 iexplore.exe 30 PID 2560 wrote to memory of 2552 2560 iexplore.exe 30 PID 2560 wrote to memory of 2552 2560 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0a97a3de824637dd9acefb5830138efd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2560 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd25127e25f2b06d83a1f0e9b46be41f
SHA1c85171a6fe25d03ae7e109ae45f6998b2a69c49e
SHA256a25dd50fe877b9f969ca09d4316d54d6903f2efbec42a4baf96d6b3a7c873221
SHA512b0d4f0d1ce9f45e4ae5a6298f9c85e7cf00bc847b19d97bd84b794eb76f274bff41e79d4b9206917acf28394e9fa80dea07e4504ac097c44ac5c89fca17148f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f374b73e89de94c8759debabea9131a8
SHA13f8ff5bf2a3072fe357f3145585e31b09e9ed4b8
SHA256419b2950b51bffeca1def044373c38faf3198aa66bf4dc74d40617e7589a8053
SHA51212a7eb6487286433a1d8c485fff19e08b5cc4a87acbb8d14fb2184c12658340d35b42f67710a9e7aea274da326029fee48eef6df84ae7328ab7abb6c1e14262a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aa19a176ba51227a192ac9bba89aa26
SHA156005024b7c5de6f5ec4eee1f46920eab538309a
SHA256896c4ab217cc9cb62d8eebb73566db53838fbe0494433c01c161f31da6e2f171
SHA512e072c1637de8d7b95dac21c06348211f10d09447ba23d3c5efaebae8b3994bee36a6c161ab33ebcf5620f4bbb7231e45682d733b144b1766de65bc9596801708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5356239a374b326217f2e1f0597963d2c
SHA1b969d7c0a52eaf8a81bd8fa8a1bf0556c870800a
SHA2568cbdfd0d3b539e9f38d252fcd4a0b14951135c7530d7a99ca19d1ab5ebf93d1b
SHA5123229837d4a11d8ddb57e63a9b62d39fe2d55c7c3b778aa84499cba9e75aaa9ab87bd2e3097ec014abe1998f9b1b73b35839b34c3973f15b2bb318946d6e213ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517416f339a3eacc6679b1fdfcd1a7060
SHA102ef1d45273f3582a89207b12dfb77a8c38baf3a
SHA256f63e6b0f09cdaf2b6bcb4639e97a9b7a4e8cdca4146a6cafa175a699191afd4c
SHA51210cc3a17268c844f0f2a78738548fc9276671157647850ec3f675f6d05b68991d64fdd2c15c63fea53b70187797edcdaf5dbfeabd12d6c026875d14e4fa9fddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b56b144abc2fa2d7c76cb552152b406
SHA11c0ffe2ee8d1c3a5b2237c5170437fd8e50ddd07
SHA2561bdb5cc8d4a05a3791afbe961cfc2d6fbde6924e12dd88f4b8a2d375c2bc0429
SHA512d081c6a511cd8f0ab3e88432ddb91b2cdf9d6784563dd5adf280df67cba5a2c45863f8ede2e83c3e7e1411bd890e2483e217b1630ad2a0916e156379876dc8a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503e7d8aa228d5a16dd0718ba2aaefb83
SHA12a5fe63b7d05f25cb6364875372f2d0848627e5c
SHA256cb962faf06b395aba8eb5cdbbffefaffcf72bc6a3a27ee0cc522a534dc7a4d89
SHA5124b89072989b6eeab585e9cd4d0aa28746db46739f75a4601473f1352f442b0a7ea4b6ae85563a1769817bf1fffb087ab01699b63f3691ae6250395048610344a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59988c180409e0eec1f76313468714125
SHA18b8a8ea59d1ae0489d79e620e9889c566f3fcfe2
SHA2567a25f29d8fea030c6d125ee9af60db65bfb81ef3a270a6fbc41aee242425befc
SHA512258d7a365a18b03dfc17d80a05129ef15f48e59e38b43dea50ff4b9884e2af2647b5b9cf665db22a2a291b3b27959410d1440efd564eaee9c5641a4d42938823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5675696b4875aa0f240d11d452410d529
SHA1c8865f37ea3508428a46d41780f5f7a165dbfef2
SHA256f03c5610299a127d4f91905f49f625421ebe5a3af6207304a14a0f3632d0626e
SHA51291a3a24af73bcdc031e1c070c7f7316ec6c4fd760a98e161fba5e1100836a28456eb15765c9b78e745f42320f28c3d5e4fd01bfe21fe693b65b745fc59c4eab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd6636a4ca7bd79412b8bccab6c384a4
SHA1a9b100809c21d990efec7dbef61019e66196eeea
SHA256a3f0ae36f245aaa7ac758a002ea916d8f9e58ddce6bbbe78e2946290eac416c7
SHA5120579f0ab8ae9e6851ff224b04c741c38566276148e04db130fe13f6072f156daa235c3f50adaa4a321856c430b281932e5ef5f5c8749e5593d62ab33df95245d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55db0f8f124eb238994e173cc1b6416a1
SHA142ccdd9b9ee631a4b5fb09b9865f595d3baac3cc
SHA25637434406898e7478d6a62d4563ff309a3670c17ea121d239da98139d58b565c8
SHA512b1cd13b47b20f1fcb7ee0a4b65c5d74b7262868dd7e269406228e6dca5e4879ff3de7e1a9dc461766001931eeb13dd11aad5ced569c3e44b77abbe5c2fec6d80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d98a74d9c43633f9030847f1e58f29ec
SHA18be44a6a63e9863a9ac83dc13b433aff1f3b23f5
SHA25652a7f0607d08c2103287ae637b915bb69b089cac3135d7712e9f3b2fdd633fdb
SHA5121a7e9046cdab7359b9fd5acd0fd3078551173cb7a35cd6cc00a2fb96777e8b64c50580eb001428fbdbd298946ba4cd92cb302b75eeedb44c50fdc39c0a99ecc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588762495b8daca79f57dd46df3d76d2a
SHA1effa11b24027826fe7b458eefef00a0a3574cb40
SHA25659cc7b021968a3ab5ecda6bec1de4244c679dc194c4059550e87a880e77139c0
SHA51231bd52d23572c863db6ac2fb2129228e06bd38c4a05403847ab1c5fca0f7aa42a825e5f34fc55e1b99fd5f14b53c58e71c7ebd1419ebbe6053258233fb9749f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df7e770dca5393375e2b10f3e1463a64
SHA1e16fa1b7c9851ea191d10eb92647bfb906438215
SHA2565437e2bd2897093516e625a47f8df2d281530ed7ab3d8a4d559d58f3d77a3490
SHA512b0fe8867f16cc00f46ae092d26cef466679eaebc0b1ac0347b4856dc77e05990bef04eec91c2e9f402da8ce81d7e610f54617d0ef628366926f9be986d63439f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cadfb704fc3422dd87bdadea6b08ede
SHA119a97dedf50ea1089233a6f9167fcf5cd0df9830
SHA2569078f9201973fc05a65fc802b73b9cfe4b5ce68313c6b101fc22287e3b3d659b
SHA512b7befb67fa7d922a98240cb1a20f4ef3542404badca8ce3e12052f55e54be230b5782b83c5fa9db88417bfde738b47ed941428df6674031b2b22ff112cb5e5a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518d87014b109e22bf8df25fdd74ee432
SHA1ae96af2e39719b0843d62b206bcc69fcf7df68d9
SHA256bbd01b2ac9dea67aae68a7cf5ba1206eab9d1028acc8a8519c87bf3edd576367
SHA51201a2f88a45da8a8dbe76af2188847afdf2a77860e2a48a8b6971a229b9eb2735e743d39951a31e0b5559a8e14a755c555b54ee1ad0f53700073eeb6977a5474d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dc87b55426c16d2ba8b34dd1c0a2ccf
SHA178932973d7531c8eda26739e69d2463ef1a4ba28
SHA2565a3e7bfe0ee958165a34da4720558b43bb1dfb06b0ba38b3ab7dc9459efb2071
SHA5122c5ef6b287169327b6cae99bd0e8f6c9ee078a8a8e307ebbd4cec9f588fff6913f1f6fe4f3a66a4ce93ecd511dbd95cc382a648e0bc799fb2bbe0d047be26d86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1416cbb3649f71e983082dafabcc621
SHA1c89df7eb0702f698148834703afe7ae5edd6d7a5
SHA256ec879a2d048d7e8a6c8dcabf4874bcdafebf1c3d4659db85b07e14fad765fb37
SHA5129ad041edc2f460fb4c9415110c0b90281cb0338e58eaff061094230e6d03b857f8cd8afa9617f2c0710e23fb1b644e4ad4f321a0c0cc56150466cd80dacf0db9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bda16b67fa99bd26595228c0637b4c84
SHA10679fbe491eac180f2f448a4d0d47fcb3843687f
SHA256beb0360d678541aaa26168f99d675d7b8b804dace6c5d1c4382f75a0e5c6c39e
SHA512c0c58664f32b9a5dd9635a3c40318fb023b98264670985cb95b90536d674f68bc0e7e2a719c36469c79dab1aac696cbea1c789c0bf85b17d532f81604efcc55f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebcc3b92082a0460fed7e2f98626e17e
SHA1321b9735f318118e0af1b1c3a699fd4960fe9bc2
SHA256b67bacb129e284cbd79546b966db8eddbda8a1ef67844b4d0acb12427a5c7d27
SHA512ffbf8231a7c5b99e0a60411c56bd59cda16d211bc17995b1dc2589cc905aad0b06b0d81dda051c69a7f90f905258367832bf3053c3a632148a4095ea99091194
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b