Analysis
-
max time kernel
139s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 18:19
Static task
static1
Behavioral task
behavioral1
Sample
0bf3bb1433c5cba38388d68e4fcdbc72_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0bf3bb1433c5cba38388d68e4fcdbc72_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0bf3bb1433c5cba38388d68e4fcdbc72_JaffaCakes118.html
-
Size
14KB
-
MD5
0bf3bb1433c5cba38388d68e4fcdbc72
-
SHA1
1f7d6a47acddb9bddc604c439de9b2f0b1061538
-
SHA256
2a9f0f604861d89b25e14ad25a2b66d5e329a76e96b88682cbc5f79184603aed
-
SHA512
b270c36b200f8aff165938bd16644b5b06c1bda2914509919c719eb34f50a2b4b07c5f7c9a9df68d3744689631b571a05000636010b51647e29769471124eb36
-
SSDEEP
384:DObDz4au/UF+YCzP3u6bqp5EeuVimkC5TUyky:SQbugAqbTky
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000fac7b49f250b708d312276a869afe63a866564a5d9ec1d920bcc7e7730f1ec50000000000e800000000200002000000020c195e896603067c0dde7ad5d673c53a9dacbc03fcab44f924a36096d6cebfb200000002436783c7bc8178c3c4346ff8f1b3eb717f0919adabbcd736187fe68191093174000000024bf31aa5f4e84efe8a00f2c1eed2a9468aac66f31a618d78678031f62a1531061a4b3fe60d5f09b1b3f1adab2a8e91f703d2133a6892dfbea8bc6511e61d800 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 206f16b7f714db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DE546471-80EA-11EF-AD2E-6E295C7D81A3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434055038" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2076 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2076 iexplore.exe 2076 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2556 2076 iexplore.exe 30 PID 2076 wrote to memory of 2556 2076 iexplore.exe 30 PID 2076 wrote to memory of 2556 2076 iexplore.exe 30 PID 2076 wrote to memory of 2556 2076 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0bf3bb1433c5cba38388d68e4fcdbc72_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cad2c58117640934dedd30118ac2e0bc
SHA14800c1363dc166171d39c4e43094d03e9fdf62a8
SHA256743b18c761462ef6f75d4ab3daffb20e76340722a670c8f563ed3065eaf5c5e8
SHA512ba17083c9ae4db300e122344dd58f3d7b3d9b5362785b9b59e37f885b26fb9f9bf532d67028d2918b1fc7b63f5d43f6d2b491a8235f2098d1ecdd6a69502a751
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51241e420d94915f7608cc99cc4a36478
SHA11e138ca0ca443d4f6a6c17521aca618af14b3c93
SHA256398fb07499a6d81d46505ff33fbae06af3d466578b3bb7fb56296ce0bbd2b89c
SHA5121ea1a96ae8a78f7bf4f50219997129d1ebdd4f0cce35ad59ab2e904bb7d6fc777b4bc2374ef3af425b3ea6dc40fd61aa5d5c1251dbf3cede91ce25756691f18b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56035286a1374e8c2840cd2c1a540f079
SHA1e8a374e6a0bf3721db1c915328b57cc39fee69ef
SHA256e6b7b9456c890c08abf8772194ff44845cdd0c91c85eeff816bae2c89ce4a1c7
SHA51257db9922f8d1a001ff8a104f4d312c3d381fba1d448c706212a41bd6eebd1acb11c6c9b46c514ded563d3a1bd4f4d1f8e5cc0c7164050ea4e8a32b6a0a2d643b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5104ac67bee0d780902e63d37b8d26dba
SHA1d2bfa03616a4050f4fbebe4781efb28db3cbb8d9
SHA256803e1f654c5549b70f0dc075243f868dae145234b556728c4182faa433e9e42f
SHA51214a8ffa245120101d2f69b0907342221da3eb0884646b0364fbba27f31fdb56531204c85a1634eb656d83b22772c511a5b9a80cdc8ac12d7ede853103ab64b43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7b49a88e54129796d90613105f415da
SHA131b8c66c75d93c38f9b2a41690355f69efdef24c
SHA25656aea07c149ea53278f482043cfc5ad56ca2c144f364b0196c331290f5345f60
SHA512f7e1a4add5f0846bbccab6fc81babbe2daf9ad7dc6d70d4da639da66a4d59f7a085911df185d63e9b991f38ba77ce6d42b60accdadcd4a13bea8035ccb49f79a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3f8418ec9bc8713eaf1e7023526eb80
SHA13c3c3aadeb8a7382bb0ec422bef05e73a0ca1fe6
SHA256104c137d677c77a2a37821ebdaa3f5757a0de7d5985bbdfbc6d399451a184778
SHA512d0d41dacb13299aa3e4afa23750c88b4b0721fd11ffade6160323d54024dc25de4164b81d377c611020de25a8903786b3952f4f5f2e2a5cc35db54ecea77b90f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eddaa203c348fd39e7633b21908f48d
SHA177208599a975bbed40edac406be9108b254073d5
SHA256734c83531869237fc2662fbbf00e7c6a88eba4ce41eb7abd1b5c3a57c8762eaa
SHA5129be81594bbd9ee342ab75402f7229314b8958509450db0d54e59190e89e0b52cee8d5d470c3f2810718361f81dfe3aa8f6c936b93c0644361e7cbc84f319b5a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d02db049acd94774ba6d04fdca7bcc7
SHA1e807f88076c437fa9c08d04bf9b60a24f2c40cc5
SHA2567d07516b128edfa8c8778653ccf1d8d1f2b579b4c660314c2b679759f5d56b91
SHA512543dc2da7cc8664563bee6809508c71fca7424b454cb4410591a45e69e93531430a31aa8fb25a3dee1b358f52f8698a08e8b3de891b5f70036e397ba82f433ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cbc1277d3fce291d19cf69385049e1f
SHA1229b13d25da434249e0746ea9530a999ff96952e
SHA2565f78ce785d9131e4e87370ca45cd7eb3028fac385e49827ad230889813def9fb
SHA512b667e8bef89ebc31feaa76f0a323a9438a7918395f1914f6f085fec9315e702945151ea963a9ed8d7893a46b036ecc1fd2528789a4e3a76c5f18997bf7c55109
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510f63405a89afdb99d55e1b895a20512
SHA1882abd8adf6159d73f2a2f83ec37df03e119a69e
SHA256563b0f64d67ccd1b147980715ee8ad7fbb7d106a0df579b333cf917ec30fdb11
SHA51205df628d55981fba19a15625b8b0ba635f4f3259397eb3c6d4f857cc1b2f27a147cef3fc3235c7b492c7cc0be0f54869eeb6e901185f4422cb8acd1684a08d80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50799b572056ba7726b847d0fd5372d2d
SHA1da6ba30dfca498d4c3893e9807f7d04564b8e727
SHA2569c3961f8991d3579a568c7c36b7f4ca366773267878aec4cdc31d965c7ff6dce
SHA512141a2ac05b91b59dd6ee79f21f1213a60763a67476844bee50074f8e91a5eb6a9f8c268c103b19d66d391c71a3aba6092bf85c322d6f9690cd8e4335b15e112e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b4af63e0ffdf66f6fe7db53e5a27a87
SHA163d329c26ed621b846d2c76b25308ee091096474
SHA256d576e0260025c7e5231214579365307ad27ad9c9db90581ee62faa6b8bdb091d
SHA5121803cd03e3891bcd17112a28b4db01f7482cc8171a6f08bf4172800617a4402b87ebbcb8c48ec9fd84072a7d9e7a96051af529ba8d912b029bc541cf64c07476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54567ca6eb870ce140e5ce4ce4a3bbf0f
SHA1b3703e1d4261ba81699f9993e41cbb644095f89b
SHA256b59d46c4d705d8570046a0c50b5174983be40abbef013f3f70428813363e5053
SHA512ffe0cb3a1de54d6eaee9e89fb0aa2a506dc828f0ae92ab65b24f1a84d363d96db290ba394d42f04c1d4092ad5fed71cdfb4fbfff2418d85e9a462bb8661cae72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f577db459d7909dafc7fd1161238c97
SHA15dfa3c5125788c28fc921d921fc0e82faee2e088
SHA25636dbb15f3648f97f2f5622a5b507926258c10a073e2767202c3bcc6078c650c6
SHA512ba64ece866b7c5b620aab09787c0da1df17c74aed0332a76b9882fa780cc2e2b52a70f3fcef05fd90d295342041709f202bd30db56cfc33cea0ab0116465395b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3059538f4b9b37cde835f72069f6bba
SHA1203522ee7dd30ac80cbc03b645437aaa01b3fe18
SHA256d0069ab2bcf37302e616e093f2450dbb281e8fbeaa4f0f1367f03c3f44451b5d
SHA51299de5abcb359ff4c547544af8166a6de37c2faa6b41b1c522645fd1bcb924774900e84afbbef08c3827a6fcdfeccd57ea5569e1fbe1403c3955c9e763ef4a2a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544e3e1eec268301b3e0e05e1a2e0a96e
SHA1404b3c3aee20cc9867b5a569e6a4f3680b0e4bd4
SHA2567871ea3755eacb66dca6746f1420d19e66c901610138da76a8f8c53c7142ef2b
SHA5124eb95ad7d6135f486fc4c65094ca1f3a23f99fdaeb96c3c7c8657145d7e9fd13234a023fbf7e788c670414ed18b332c5c0cb83a166db799298826c900db6bab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500cf9a311a047ca11ac32dc33954ccff
SHA1851a4f16a1f04428ee70b0360dad863b7c457239
SHA256af780ad59cae7edbb1684adcfba810cd14e02bed948d15584f7802fada0d26f6
SHA5123d895dcb6956470b0179222f2b66126df98c1d21c489c2bdf03e7a8b02d1a4d0567b51ef7b7f79c4350255b8e0fa79abb2d043883d059c7f529de9a93441b726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5060cf4afac53c46ea07b50a50c459046
SHA1ba95d393eb95dc69274fc7e77d4da61ba8c17bb2
SHA256ab2f069d7f32540cdb8160f815bc95367d0caaeb468ab91bcc2e703abeec316a
SHA512e29d2453ea69af49dd1062d3c1c9515b5a608a1af1c0261660d6c498e2abfd9c94e24d58a6879404c6fb31f08e65280f6b12664aad62cc705ec2a5a312b3c7f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2c1d7b079f83f5e1fc79af2d4553d9c
SHA115aa852e27ac8f9aba6eabccfae9e3920622b4b0
SHA256e66b1779b3e708e5fab0cd1cb62debcfa0bcf74c5a83fd1144b09b64c72c68bd
SHA512e98c8af1aa3a6ef743f7999f0eb2317d3b2a972a9d768399b6fdf0bc8d3caac3731849b25a8440fda683208f46429548db99c30c821a23467918bded0b0aa91b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b