Analysis
-
max time kernel
143s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 15:37
Static task
static1
Behavioral task
behavioral1
Sample
0b63512f0b2e5981caca5164aff49fed_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0b63512f0b2e5981caca5164aff49fed_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0b63512f0b2e5981caca5164aff49fed_JaffaCakes118.html
-
Size
139KB
-
MD5
0b63512f0b2e5981caca5164aff49fed
-
SHA1
1fa788972646ef8be559c501c7c2ea8ffb0bb39c
-
SHA256
c333c51f5186482b8a77eb41c7b8f2939a884b9416469a54e634b0da906dc74b
-
SHA512
97c44e3713d5703614b907c354428b5fbfa3b878c269534182ac59cf35b52cf656cf558b9b34d36e7732ec3e27142ec70bbb5ec0174111cb9f9e6a2a5133fc55
-
SSDEEP
1536:SGhQW0ycRWlO+yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:SGV2N+yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{43F0F671-80D4-11EF-B5A6-7A9F8CACAEA3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000bfe00773af4f13b805c2baac316b9db9ddaf6deb6f769e576a6730906ef5bb79000000000e80000000020000200000001e2fa297a1efd758e6c803f3be8f7c249ed5117d4b854cdf5531c1b5e9e0f87920000000eba608301912229678443541df205d0d7d9b84e9ca3f64290d30d5ecd3431464400000003a51f8b1a7bb1004e66be0f4de0d1820882910abb1b25a0a50502d550d850e02ac9f34c83f9fb13203c87acf324f20a91e35394fd76a064feb4f5538037656dc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00acc55be114db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434045330" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2392 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2392 iexplore.exe 2392 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2560 2392 iexplore.exe 30 PID 2392 wrote to memory of 2560 2392 iexplore.exe 30 PID 2392 wrote to memory of 2560 2392 iexplore.exe 30 PID 2392 wrote to memory of 2560 2392 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0b63512f0b2e5981caca5164aff49fed_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2392 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b744850cd997645c7d340bdd3f60a069
SHA14c719b53704599bb877b0c8c61371f4350ea2ef1
SHA25661b25efe0e7146f1125e3cbc892d3c64ba76f42d39948135c54bb94c370d5e81
SHA5123ce4f3f0103187627670b562e2103d73e79f4d7bcc06d45ea7e0c9551c4f6e31eb2eeaf8a4282994c2d81f6388f5fd357fdc752b0413e2b315e23c496fcf0ca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac02c541cb00a59d2bc83dbf7c17ba52
SHA1e3f02893dbec558ed3127cb61fbdd3d45d51ca3b
SHA2567913c229cb88b530ad80c24847b5e7c855d7dfaf96e7ce75d11c69b8aa2089a6
SHA5127659fbc6940e9707017c25d18d8cbc62eaf9f4255832eab219e737ba0dfc33db8e45e993ab2c8993bda6abec6a756ac86aa148080c89f3f16b0530727d6eba95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cab52e2461a6f43bd9e01ffc72a96d6c
SHA1a593dcac5ee14aa6e2483e58904b40ec4d04299c
SHA256998082af2c6dc8a3031a71cfd4a98fa4d7c2a0bab3bbe365cf31cb404830b0ca
SHA512e80f4effa834ab44c36f68186245a46bf8501f142ba5238bdb19f45e6b9d714743f498d0944e3db54069d242766f1dae34768306bff8e290a9c1249a6e2e58ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541e2667f05f5d90d09d0c04fd93a9dca
SHA1510f427e1dbc6de075d93762cbea45d7cf9b94bc
SHA256263b2478603dadce9839a1fa6db18b894e0d186983a69e580e34a893df2a8ceb
SHA5127d55890e87176da4260448ca992a999a9cf58db68a45f7d7c39aff0add225b802bd7e97c36a4a0efe1a10b6c3b3300efa559e93f1039aa830ad0faa2bb0d610b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585b881a8656f73d9a1e5c96dd4fcec11
SHA14c019e1f5d33e75a1c516e47b4e785e8845646ec
SHA256a62cbf7db4a61b62a7eef04a651c08503bf74de873041f57d293b9f65300fc6b
SHA512b08e2791c95b460f3e0b376837d01ff3d347b8a655663a1764b2c76822298a29f7b44259fad46bed5f8f4b81750e4105f97606c669fa5d14aa46f2fe2eb690bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5264be21f1fe919925e8427b4f4d88349
SHA169fec9f4e59f4e99932711b27a9ef14f79a1ad54
SHA256dc1332c2a6ed72001fd2048935b7047131df86911874d5ba46fb805c66f64abf
SHA512b4bbb9ae74da9a9dee17bcc3d136c06fc0c5ba9d613892b265649d25101d8d830c2cea3d96e9abbb137c1fd10a5cbad9e15dbed7f4cc1cd44c616e5baf1e8c98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3c208a2f796513c5faa2d41c5412a10
SHA17580e4ad5f46367b014f94848041eef1a9bd673c
SHA256f49ee5fe9b7e3a95f734c58648066f870c06ce7ae38a6ddbf119df8424d99bf0
SHA5126dc2cc91fc44af87e733861848852ff3e093f436ccad2f85d280f1b6f3b9a400976e96fba35be5792729a6fab1f771c6285e98ad828a3864f1aebe89366d9832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549df38c1d1d431d86cbb8daed6b134fa
SHA1eb195765024cd90f31ee7d59fe4297d17381e8e4
SHA256ef29ce9d5aa60c3c1dbcfed887de64d7530b897b5b8234d66cdc5d6f6c585fe2
SHA512902aca553caefaf3d1475ceec41747bb06076573e0ce7d81f2f72da2956235d2d56a8eaa0ee4a601ce2cb9c35d005aa7171feddcf26f9a90c9737b57dd80329f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566e8d0138082aa68daa1fa8386dec8d5
SHA1ff6a788d8d99075ac59fd938b218a097a636d4d3
SHA2569eb9452926ce560284fcd7dd43fd6e7819eba80608144ad9638c6a361601bd0f
SHA5120f51c13d9801895dc5150016fcf777028c12ca5037c71018dcecf72af28bf08daa4864b963b036a8437ea7af4a3d50753159f48bd3c0e21834b867d2b66fee3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa3710cc19e500dea5c19fcbd63917e4
SHA190584ad169efafcbafb580f21114e4019af4517f
SHA2566efcfaf4ee8d1539d71f1b2daecd0aaeddf89b41b45e19026a748d7ea73c1165
SHA5127966996f4b7ae675241d35b3aa3c11637a46fcadb9c8662aa4700b342d114cd73204bfc6d7eee3cdc057054b029aae9c449f074149898eec35a29293b44cad2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51efeb34392460743bb42a3f4df0b0ee5
SHA17fd8f9b7fbc432af19cfa2ac93d360bb3ef0f221
SHA2565c36e5cc843394a3e23d8b74e1ab58ccdb4d8fa74267f872bbc6f28d19546bce
SHA512e8d00e314ad6c4d4e2ccc64d8013fd9677005b93b87c7a0bcf11960ed74f5a9fad84c6b5c3a5d99de4e0f9a095cebcca53ef8d2fe527fe79a58ca97e02053b2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5027f76b2bde67f1da642978d8509edc3
SHA1134d98efcc27da7ef8ba9380ed840ae3b557d7ab
SHA2560b42c2e64f5b2052e328a65e0d1088c0f303445b459ae9df0394e2d316771e53
SHA5123dcaf95058adfd815531d67c2057ab7d93b3cf5616a786d2e4f7005964d844479392579d2b7af05375fa0840a2b7e1df1ebf08b49b0cbe1f39067479ee8842d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be9354db9dd4051f8f589af9f1ba24df
SHA1c8c7ae0e15103a273b24d192066cde698d16b529
SHA2568c981075b143b28563051823f63f66d233dd8a5dcd67411b23009fc36dd2c6ff
SHA512fd864c46e61e46d6296dcad0d1d9dfbf08c2b7a51c026d179a29503ebfb04d184266e66168d758fea699a8677b107552516fa1dcd8bb92a99b4f5c8187907b1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c830015816cd564faddd0bf5aa9a041f
SHA11bd426a67536ed4feec75440bbfdd7f69c84b640
SHA25616c41f42d10aed13f75201085980aa1810f26319c78d0b18775c642d70d0c02d
SHA51293766786d0991ad90b970fb0cb3655c5a5a052e81934805b91506c81e2646bd32e81661fc260a32b5a49863744392ece14203c26ebe1f66e20aa6eddc2509e41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc13c2987e24df7e3870321ea7e651fe
SHA17d03695a636171ef94cccf9c21bd7f6488a148b4
SHA256a025cd3f9d14573384869a2da4a1f2051b17eaa16c259f8e2c2fce0ddbc6a5a9
SHA5128d43e498113959a76c3737d80a8d4320b8e0af0047bc8319ff71ce915901dc8a00c4e34f943d4edb163d0982db837d1b958a5717cc92d5e88b4157cf032d53d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb3e0b813acc9ffe1d0c3b172719bc18
SHA163c11550b61400a3ffd037fd99fa8803d19bbdb0
SHA256578aafc82e4d11c078e47bd234ade056bd435499047d2af027884eef16311c7b
SHA5128d6728091ede42606f23bee98f34d6644cc622b8d6b436006054d623b6071eea8ed1198fe8a6c7ba3f7db0d7cd67d71ce51635ea061d388163d64612c2f6069d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53614019b19911f23a900d51b48e66fc8
SHA18b7d9e4d38ae53b2f473fdc05f5dfa0eb1314421
SHA256839be67586837281ec0fa905bbc3835350d0481dd3dc199ca28acaa491ca46d0
SHA512fa959e23925e83ba01d0aed9a868e7088d3e89bc387f204a1ea1867acae9311239f9a790c2cb06cca27386ed5fe4337053e732c1c4c1f38e036bc7e659a0f0d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a744610b12e52e2e8685270dbb322e6
SHA1785a64e6fcd5806d4cc944d4b44fd48e5c9fa3a5
SHA256e7d27894c807896795ab7a5971e42dddda3ff1e077e859b1aaf0dc2b1df2d161
SHA512c005dac54436e5e46879afa476817918250f2af3cb52df1b6c74d38129718c1dffc4b24fdb2928b94f4fcb3143d3504d45381952ff6138f0d8c4942997a0f1e9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b