Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 13:37
Static task
static1
Behavioral task
behavioral1
Sample
0aeb8d65fd50553bc3b10fdedb661d04_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0aeb8d65fd50553bc3b10fdedb661d04_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0aeb8d65fd50553bc3b10fdedb661d04_JaffaCakes118.html
-
Size
6KB
-
MD5
0aeb8d65fd50553bc3b10fdedb661d04
-
SHA1
8a76111d1da7c34257354e761a9f9cd6ccf33ebb
-
SHA256
9ca2f80a02c36148b4fa35eaadd0371e0baf703d39ca14609237d4e1eadb05d3
-
SHA512
994e9f7bac79be596a214057cdc5a1ddd875c40e6373ffefe6fadce9e306379409d64ead693df2cf1de48701242a4b6507a6bd203d371c60a5d0ce1683997bbf
-
SSDEEP
96:uzVs+ux7QTLLY1k9o84d12ef7CSTUpZcEZ7ru7f:csz7QTAYS/0b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434038112" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{75A3FC51-80C3-11EF-9917-D686196AC2C0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000127d048fbfcdf75cb7bc66d03113b10454db864aaae10fda59a454d79ed89131000000000e8000000002000020000000bb495b8ac5b59584106e57abb9a7897be473970095774127d0a9c182793f1bef20000000d7ae7fa266d5316a71aec70d8899d36779e8a5a4e5069e62df7cfcfe85404a7740000000c67ede421057d410e646aabb9e854b97b97679de9834c0da89bed6cd075d343093d51515611066d01ed90c52025aaa2f21096033530d9c89938e8f1ec3a442ee iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a038a24ad014db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2780 2192 iexplore.exe 30 PID 2192 wrote to memory of 2780 2192 iexplore.exe 30 PID 2192 wrote to memory of 2780 2192 iexplore.exe 30 PID 2192 wrote to memory of 2780 2192 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0aeb8d65fd50553bc3b10fdedb661d04_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed4f9ac1ca7540c9630982b8344ea51e
SHA1dbaa54c4f82d6e17fc11bcb02d3a8cec60448434
SHA25600229c1e2bfbf76d657c9b4edcd85f85c27f728f49234540313cfd669bb85866
SHA51261387d731a8c4fbf816e7249f26700a7a2cdae677599c54ec464de9c9cb6c62325c3725e01cfde8000ba72f4c95983225effb588ca462093d9ab000420e42385
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d156d9e37d41f1e5ae5858a3b171c98
SHA19ac6e81e35429427699418cc273acc9785ab39bd
SHA256733b532bcc4a17f640f47afb8c77676dd350105086baf389ae7f737ea85bc4bb
SHA51296bd15dba05d45a0b1c9b40a937d3ea828d63f3ac249f547f7b336ef1577727d9c6969344b45a825f41ff130b58b12b206c54c4730c70727bb03f4245f5c6428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557ddd7c014a6f6f424f9ed77ed9f7833
SHA1b1d3928c1cf285e761a6050976d36b524d5e7b3a
SHA2562f7e7de863d3b3271405fa2357a21c7ff8cc5ad98e265db7b3a6b58f74ce50bb
SHA5123603feec64fc3e01f0c14bb021a8a748fc4240a3a6ccaf6ece4248700136320053ab491aa65d2fdf42217f01c23d5afc0a93ee201b40e0d984eeaaba43015a25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fad9291f8e6d6b727573e4c1364a0fe3
SHA1d130adec7f9b5e633ad99778696eb9251ceb279f
SHA256eec7478f02754e28ca82c5fc1af63e11454d8f5d1499da28bf7f135da61ae98e
SHA5120b31ad52e15d51adcc4723bb9f9bf71519605f5ab2285b344cf7648655e43d92b6dfdc6d2c3d54b3fa73578dfca145930ff73f7090db74726e7f32c046cc5e56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd15fbf7d2bda73cd9d6732be2522acc
SHA176256ef931b0e5e8c4779391bb893e6aeb95a3da
SHA256f406ff614bb260fa60719382af6afcc528aa83066783fa0000c2bcb9466183f8
SHA512a9a8c25d897e6401a8d3a5991da9ea5e8143f73a07d417d33867bab6ca01596bf18cb7e30bb216321ea38dd1cc5cf7faddfaa15704461192c1f181e9d663ebaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54996f85921d508d47e459d08310fc562
SHA1e2d97c1297566924703daa239124fc2ddf75f0c9
SHA25639d9cff71f83175ae0daf1a2a115ac020b04cf9a1d68fe2fa9e2404bb6f358d6
SHA51282fb815476aa79c3476bcfc91177f6fabc75692377e71ba4f11775483451d001812616dabde2573ce96d79dfa9d913719dda298f2ee0c17ff10a68dbd65c949a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a258f6441c20471ca328cc66b25f836
SHA1ce425efc47bc2327280023297d35ea864fc3ee68
SHA256e50769de0f293c42258969269198945ca14dc81890c243097aacb2bdf1b894c4
SHA51250b7f6e7092bfd46d567736647e9821f0098f057a1f2fd04bdebdebc31c8cceede6ed70f527a4ce19145a4c026626a98f2685e79099a91a818d092c652d48a85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6c88908d8f6d28bde51362c49ba472d
SHA1306ccf2eb7116ade26291fb526ff9fda47294ae9
SHA256e5505ad6c087d23307afb0da622acd558a913c39970f8d15b2df8af238153dec
SHA512ede92d99f4caeeb3d9aebc406f6e0064f0cbb8dd0c824473df7c5c3202e494a02fb054fcc90df12e3e69a42c15e53ee03951957a72ad9aa48fbcf65f89f40263
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56157786a6671d5c8536fc7e02bf8df05
SHA1d454adfa27a524bcad055d8455a1257472f89de1
SHA256ce2ab05a77d74cb2b585877e34ee437fde61f51487b8d480eb670b9f0ae8a1ac
SHA5121710f687e23e3675f83cd84208ef86b631d178bc383aabc96628df356720d737f1b55a5bd95f25eab2f6bf8c8481ec0a26ca507059547965e5e4d810a7341609
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb93a82fd3d640494a661b559a03c546
SHA1a6357046d53fb8843e08cbd47f95ad40d90962c0
SHA256ab710011d0b4cc696ba3b270d9ab5ad26be26c96ba13058826f38296e19176fc
SHA512144615547833ede305da53f9348bdad10b5329610f6c1c9624ae787f1650c28eba351183cee9df9cb6aff41cbd571748d242565d4bc957d416935e14633b488b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac0e7fa7dc0b0cb32700195f4adffc59
SHA18abd827cc5573051f7575c1ca21c78c62871b239
SHA2564431c13f3c774f3da5e076b8a4f20244bc94abc555d966afceec31e55b3bb352
SHA512f8c094e167bc22d85967c4c67dfa2fba3f1396df7e5d5ebe586e4f2c19e382eb7713b1378fad8d534a2efb2a4269306d86eb0677e84fa91a687c56952b72cf21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519772b908a67ac50ebea97553996f2dc
SHA1b8da97a17fbaad0c905c283c91bbc5fed0a9081b
SHA25621cd4cc10fae042da1677a35c902a1c635cbf0e0f0c02192423cc38e780e1e07
SHA512aee32a9ad4b0a831ca7c80ab3c64b833e070eb5f7b487ee8eb8b9f2da1b6b30036954d4a633fcf15350e789fb93a9e0145bff2b4a3a4d0661f7e59215ebd9b9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbb5a0b6b1e2d07f7bd3826a5b4edc8a
SHA1264a4fd6429945e7d562a1e31f0af5e9608d74f1
SHA2569dcbc95d1c4d7c8214ddadb4ae51ae88ad811f67b5406cc3d8c2b318824ea45a
SHA512aad87d0ae1ecb9a129e4a6ac8f63dac01abffde3c8096dfb767a357f37888e81c619c49202b3d964d7ea2b3c9c7c4a92ee5e9fc8089a2392c21435e59e75bee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c48c36cbf1534c92d04af5fc4184eb9e
SHA10aad14a8239e2b6d4ccc37ce859833def3be7b5f
SHA256f3c3abc5faff2c4eb29a2927690386a97be4b2dba47a890b0f48b6ae82fb00d8
SHA512f8d609de0681cd728bf64b07d5f23cd0206c59635da1857bd0ba4589bb660ae05782bc4dd4be3f2f5c1f1fe730b3cc0f5214c85c111da90a551b65899cf45444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f364800aab3d85a38475c04206c92241
SHA1005feb12d37892771312609930b878ee1190b1f2
SHA2562f8bd2f7dd8fe0f59f37e6d83381d30edbd2ebc396abbe51286d77f8bf404fec
SHA512904d0e9cdd8f86ccee52cfe9de8f93465de6cbf16b7fee665fd340540022eb7acfe2ef55fad5734732252710e93165f7def41fb699e3a05ff27312198df2d869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565f8038a7a4e5b886ed232ced3e3fc45
SHA13a51b20b29300e62d97339dc9b8f512fa4808682
SHA2569e26fca03ed4051a89c8827a3cbfbb6c87eec7c819b0e541fd11a9550c771c8a
SHA5124caa18591ab23c16d0c89e6b145037cb198d220782372c02880c38748b677e5448b89bac474ab27837917b53d25cc9702f489d8f564e3cbc123869852ab733d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a57e115d48f659188f03b28ce612787
SHA105ed45c8cb5421faeed39fd92ae98e79d4057b07
SHA256f7a226fd5271cb93013e9bf5cd29d69b171eb2b6047f63e46eab844a846a7852
SHA512d27cc93852e44d24b5777503123bc555b05e40b61a5bdf818b4b135c2935c62f0093b5c98a29c1b4f8d5ed0cc7df6aae2f26b406f2d1bf5e08c8d7e5db3bc2bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4c1b811258ceb019ff50b108eb60218
SHA1919b6fbfdec8d991f023fe579a07d1643cc25832
SHA256647ab9f45d858373970538618615dd9ae8a07b0de8f2a74974dce696fea9cf43
SHA51236976c1cb0729df6908df7998af542d6d9365e83b069e7a522b1fcd994917921578d993cc85bc2511cdc7af0489010a0a55873543a888d0ed56882bee9d5e81b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abc242be95fe5ce76a5b7099856c3946
SHA17753858fdc6de1eb548cbcdf113b72af3d7a96f5
SHA2562a769846a91fccf6b65e7390835244785e5e28e2c7d6229b2f2bf6423ac24213
SHA5122e39df91ef811fcddd5d5a0b7dfc118d891a663d1d8b70eda9d9ac77895ced9ff7af6177e6f00256e4ef5c1ab435962f64df5f64d9365f0bdfe18642618318d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57afe5054090a31402a1752b71fe29125
SHA17f5eb344bd011d0c175e0e79047004757009e223
SHA2562e04ba32dbb927886a12a30ec08543ade408ca6e07c7084d179afceec0ffa266
SHA512dc1864f33f1ef7e0ecf8bee347db1b20550c4332074b9d1d7d07dee500f258f1ba491b8a569a7d5a1c77d9ae73d276dd9f91107c8645bf17b2ba35488fbfc5f6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b