Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 22:49
Static task
static1
Behavioral task
behavioral1
Sample
10cc9769d5ec8bea7f753ec341e676c0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
10cc9769d5ec8bea7f753ec341e676c0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
10cc9769d5ec8bea7f753ec341e676c0_JaffaCakes118.html
-
Size
9KB
-
MD5
10cc9769d5ec8bea7f753ec341e676c0
-
SHA1
9125cd5d6670803bb8de54fdce965e7429b0fcd7
-
SHA256
6fb95455d3a777913dbdd60a73c7ded6bcc89136c7bbe58ac5e0423386f8cafe
-
SHA512
f744f32002524c7d65754555881783716a9fbcb39da873fdf0587d0fad155e465912ef5565f6764c8fa07d395c6755bfddb3af091f6d68997a421a48aafe799b
-
SSDEEP
96:uzVs+ux7pMLLY1k9o84d12ef7CSTUVzfzx57FBcM/Nd/QeuupJxv+yUGyY+eCxYp:csz7pMAYS/TkjYFTXb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434157661" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000007792246e9c0ca001dc6e39411167fe97eebec153b77a485a38b478601921f6d9000000000e8000000002000020000000987ab4bcda7c9f05f67d54d404663d30b39303eee3c5e92e5f32d1b97ce48f1a200000009e852e9b62cfbb98ddba358c7877bf32f71a20fd359efe4b9578cfe7e9b4d07b4000000030177bf673ff1d56820e9f7b98746a2fcb947661314fb09699d3b5bcde778f8f9663f8ea691af81bcd38219e28771f599e3e95bb6a9fdc4231a67da756ec1a41 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CDDFB821-81D9-11EF-A073-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 407e69a4e615db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3052 iexplore.exe 3052 iexplore.exe 356 IEXPLORE.EXE 356 IEXPLORE.EXE 356 IEXPLORE.EXE 356 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3052 wrote to memory of 356 3052 iexplore.exe 30 PID 3052 wrote to memory of 356 3052 iexplore.exe 30 PID 3052 wrote to memory of 356 3052 iexplore.exe 30 PID 3052 wrote to memory of 356 3052 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\10cc9769d5ec8bea7f753ec341e676c0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3052 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f1de4ffd0a622044950fca4904683b8
SHA145d49c5896a440e0057f7831371608579412c7fa
SHA256fe29348ba99bec9ec22dbb382f41e47382836f4d557204fb903c77a8e520f8c4
SHA51299f8da580e3f0329720e24f61273f72878b7a03a47ce650e0aab12de08266f7095572e68abd624cfa84afcb16e6dd2937a21185af9f3e2ba568ea0c324c04e68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f8ea62bf11b237264dac809196aa23e
SHA1d343d9858cd164a64ab2744a8af23d206bcdc841
SHA256d626ddea19ea4e1b5dc9840bfc38dc7139e454f2f2ede6f379607c6915ada553
SHA5120da0768c6f9fc18a7b000b947deaaeab0e6b693bb90f065b2e86aa05dd92d2def3aeee7e0f66563a51936536a87b0787b47d5c9ecd198890beaab3dd5392e2b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594e5ad802e51af1fcc8f456c3c2bd11c
SHA19683903d83bb28aa9cd3a81c6ac2e9e3d934b51f
SHA25628264213f3371a5d3ede0981102b6151926ced50b20f1845717585d84a1a5f85
SHA5122dffd3400ab3b6b963eb153719b7978e8197ae9af4879143ca222e07f9e7e5e2734876f7e95e49c24bccd2d2a8f49995118a9009b71383bccb722eb07ff3e4d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5029892d62c7ab5a8cb492e880d16cba3
SHA19bec1aee9fd9f29aaf262c3f676b93aa029265e7
SHA256858401970ca9526a9e5cce7ae4c25f8bb3afe7b0bfca7a45db0c3c07f657185e
SHA5126e2b7e335d433d32147c00204a40f7619c2c7eb215376a9b624dcbdea06ce60282c2fef3b688c8c348340b201021c11cd60cc477aec15fbc3b5b4056f8ce645c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6cfb9f2cf8baa3a0ba8765ce4096e85
SHA1b8f15ae21367c13ef8e896196907baf289aaeedb
SHA2561434e7d3be568e64c80c30ff8865726a3992e4192fcb085c6d7d082ddfe735ea
SHA512f5d2cc6b96e993576e710f8866549e4dd92a00230ee961145ceb8fb3b5df25e0ff4f1d5f6ade4dc75a7e011dba0d2e424e8f8b24be3b190bfb17e26f884ce552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee3f69ec39bb610e7e5d9235b29107fd
SHA1f69a8696d7eca2669444c2d1d816f095ef383ff7
SHA256e69948d96a6bb66852d6989a8822838abbdd5b0ce22790849e3d14ed7df0e9ab
SHA512ae2fb4c08e7e8419e8b6a7c64db741b1e1716ae9457d6b743b1632baa58afef32a22a40cbf44c1d1c4217105b0141769b836b9c9c01a87d9b93c5306f6df4a21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c6c63534fbc6eb63685a920ef45ba0b
SHA12b43526b488a17f2a45ce9cd40d1efe3fff42c51
SHA256e673411f4bdfb725c4c85972a4cba827da6f592ada581fa74eaed8e0e59ca5b2
SHA5127354315d7c4d44f351cc6c3ed8087941303cd7d609243065c5823399b31690fa206cd0afcd80aa2f0f69d9cdee4d3088c0be53e0cc82999db5b1918c65965094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b0c60d030a697fa652fe652e2a7d43a
SHA1aaac1e461bf36bd56e117c3830f565154e7c4bec
SHA2568c9ac965eee4e50d56a489d4a69583a42d5ba3834564147a036d9a111da513d1
SHA512421a8918fda8d529f1329d85dbe1cf7ab57d8261df4935ee5470433008e65c0ff8909b4332913fd75f98ff023996c704e3c979ae82e48daf02a80b33cf44d0e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c441501ae4a13879579b890948141799
SHA1777ebe843d4d1a1168eb76a0e2b0b1f15fedfe19
SHA2563990f8f5ac9ce819ff220e9e44dec9cffe222518db6d8ea3ced3a871978dcc67
SHA5124dd9500f8fe4f68627e58815da5aab26ab6db8399ef55c5004d11bb4eadc9c6d3056b7de7d44c344371a849c3e3937add2eebdf73de8c3a35050c0f6fac6efd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6545595c1e7e5e54f03d2ad5b00ed30
SHA130bda338655d360c31517e525fa7f8b07c74a43b
SHA25609e17ed509344373dfe40b763bd8c760acc171bff8414b0f7c103d81c237dd3b
SHA5121a8fea1957c9f42624639f73d4bc44efa13dccdded1a6d1a0f9e85d492d81d53719253ea389be58482ff0c130a03127ed44d5ae2cc293da343c00dbf1e1b7c89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bdaa18c5cbf84c022cdd66c51e64c23
SHA110ee994426da4056b2d29209ea983fd70e27a513
SHA2562421f5e7fea11347396990e0ba936e033334b275e5be2b7676e3a5f07a3784d5
SHA512fc81245d62fba8c4e01f901f64c941dae27a588322ca967ccacf68ee2e085fce6821e6f848905064e929e0ee80ade64945fbd1f38998737ce16b6ca01bb8188a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca521a4aacaa0782e77981f1c680edcd
SHA167dfbc2dc9eac4865cb9522d55fe74897d7e6156
SHA2564e785f6d52e91d026e8e6c2b3597b95948cfe5b59185fc03882da799c94dac66
SHA5123419b1501a9f42aa4c0d4cf79bf608c5becb1a7ec6928c10b8b18f7b8c88d93f8c21e7dd83558f1b6f5e62053c59fae96d8fe8a549634587b245dadfc5bc7975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d4532fa43d25c49ba57126df84c378a
SHA1c9df4d9e98c67f1f6f63f7ea7814849a94230cbe
SHA256a2903fa33e8c06d93b52179f467ba66112a7718657c1c68a216ffa6899a77613
SHA512f9be2d52ac71ff6d239bff72928f9448148251442d35767affdc0f78aa3cadce443a087561cb9f1cac6728992da5e77ef6521ec17d006b8342e3ee7fcf485f54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c60280685540af7dbed89f95d3abfe01
SHA19a4e8f544238d409bd5229911a4c83ff0e352ddc
SHA256603c94745cfeac162f0f592970423a2b12213e4045adb1971ec3d02c3d370d98
SHA512571d0a81a451c09404ea09e2726cdd65bf10555cfd2a7663b3b423fc5dec1958607343e77c552658c0ad3c81638f86a421f808697eec8751d99300917c623116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553156e0a1ee31f798b4b2b96d401987f
SHA1801dd0838a0c39f9622ecd9b8a3ed07768cb4229
SHA256c0c03a180c03e0cfb66d14a1c7e10cd680f631fac41ebaf067494cfcb8897250
SHA512a2dc46106cfed91da8c67ef71ca12d9f1bc46cfd04451465b15896d5b8ae9ce939d83a0002fcd9e74a8544e9ae2866472539a1345e70da7726d53545893f830e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5695c781607e2816ba455b812e84c67de
SHA140d738d4a287c559fbb6e06a2b8cb6cf81e88585
SHA2562c825c3b57f5560a4291733b97de48914a50385a76b12185a5ffe9c66d22fe60
SHA512442be9ba0faee37527d3c61c7f265741dea989f9b8c95861868ecb7286c76d6d2df2e7d7b962a0cd509326bae4d399a1d9bdd5217c5564e976b5db42170a3f65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a90227a394fc3b6bdcc61b083b1ebbe6
SHA16cda5f286910a8d8190485335943675285ffee56
SHA2563ca643a2a4313d25ea087e365a4aa4467cb19d21034c8636f01390e290b95b11
SHA5127af2079cf3acbe22f66be90942378bb7713a543e2e31ea534434b18a3213f75cc04de08b8742f259dd09d3fba293003a783dd921bda2c0a2deeca9596621da6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8bc49f72dd98fb1671fef37f31855a0
SHA144fac9656339de71c3934c7af42ff23a28b5904e
SHA256c7a6547bcdf13b0bde48df1bdb609a9486f1f6365c89cc771d3f0325deb4ab25
SHA5120a428553324d0cf1e667fdc17e38694c571b8a852660809efe5f9763a88295d61a2c616863e32e9595a71b6727554761cc1eff62a7a01b4cfe43e62513ebe49e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53580e164784cb8b54fb0502616ca2f3b
SHA13c256cfa856148d70d320a0421b729e6623eb7c8
SHA25627ec5705826b6e3f31de65a7d6be71b01a90c7584e90e61eaad80cd14e90d3fa
SHA5129e0267238e51214ecb724de2cda77aac02350ca2c594014e21c6240abf94c2c7e9b968ea2d4851c6e0673c8ace6348497139d052b34f5434249ea461dc0e5fa7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b