Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 22:52
Static task
static1
Behavioral task
behavioral1
Sample
10ce997a74901e5ea43dda96a4a9d590_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
10ce997a74901e5ea43dda96a4a9d590_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
10ce997a74901e5ea43dda96a4a9d590_JaffaCakes118.html
-
Size
11KB
-
MD5
10ce997a74901e5ea43dda96a4a9d590
-
SHA1
f18172cde0e390dc53de811e861b348fd0434be9
-
SHA256
bbbb2b96445c68504d0630f1e8be436c720837a71e4bdc43a0ffd6303e479cf8
-
SHA512
e5d0362b8edf9e84c0fad05163b154fc268abbe28b4571f1f3bc44d0f36e45b66677678e12f2d8c096475ea18bd394cef4f2eeef82c63e107d742b4c43cb7668
-
SSDEEP
96:uzVs+ux7rjLLY1k9o84d12ef7CSTURGT/kZ6pzeekwgKLR/ZGYhLd7Z3hlVHcEZe:csz7rjAYS/4mSnKLRRGYhLdXPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000c1738287c1febcd345bba00d4e127432b80c93cbf5faca74e12d45d9b41c23c3000000000e8000000002000020000000d27d056db6dbbeed4280e93b3be94a14e4c3edba0532070f5e91ddcb75e8011120000000d2d6cb9dd023dfa54926427a22ce60cf630f7a41c038e9e4fd2fa6c9c058fae8400000008ee3968dcb995d78acad9111a557f82ea63cd6f7e00a83c74534f0a447d71080857d0961f7a2b78a8f2e42f3bb1c5e2402fc9833d95a684c5cf2792bf574a1a9 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434157801" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2148BF21-81DA-11EF-925C-5EE01BAFE073} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0b542f6e615db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2032 iexplore.exe 2032 iexplore.exe 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE 2628 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2628 2032 iexplore.exe 28 PID 2032 wrote to memory of 2628 2032 iexplore.exe 28 PID 2032 wrote to memory of 2628 2032 iexplore.exe 28 PID 2032 wrote to memory of 2628 2032 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\10ce997a74901e5ea43dda96a4a9d590_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2032 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d74e99f91a5c34d37bcda9741fcf9dc
SHA1d4e0b2e751f01c85d7a137ba01ab3816763bbc40
SHA2562734013cd3946b3b0e326574d90320d8aa13ce729583beae90a992d122f2c947
SHA512c1792930080cdecf1da51fce93ef026058322d2b7af2a213bc1fd9fe5e575fdf829d027b507962edf0252b2141f02bd7791d9e9d911b4eca9ef1f39f2eae2d22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a43da5a09991c13d96837d51b3424755
SHA1a53ad78931fd55e8919c3bd4478ed8e34164cd7b
SHA25647370e8132635c8e0c32307b41fdef244916fc0032e4ea598f110291d5397f65
SHA5129c13eae05f423e041584c5e6e94438c1611e82474ca953eb3af9fde3e4ad90ef429a36ab5d237ffe13656dd8897a40628390409aade9f78ef99925dbe1c99cd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a7b660f798e85403db92759f5e10208
SHA15cb981ab31b5ef3918d0bf2947382a4b0d6ab6c6
SHA256539fb25e9ca828e18ef413bc70c219ff607dfaafa777fd8e107062b9c30cbaee
SHA5120670af388d2d7f95447b1bb14207539fa2e3a8df1e3ea0bbf8433598f65d43e263b3337b3602e83506df28b31fe28a836f5a2a8e84bb8fbf8c330c8ca7b3ae8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566af75cfb1c1ee893b667b6dd4194e3f
SHA1c840d08cd6f887e5d3d5f63949f4e275c9a9e514
SHA25663854ded4867b1846842a3e656a489752bb6bc6fbced09ca715ea972d3002860
SHA512c7158361f9873ddff76d5d055d92179d765387a24b3d9eba8ab33b81134b9dad93c24cb45f79441ec83cef854a23e37ff33c3890b916275ac80abda3d014e612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bd24953ba8eb7d847a75068d1a9a14d
SHA1b5c70f4da046ead3a42f66cf5686f03c0eeb7fa4
SHA256df862a9bfd94add9e5d2e5a6fc19161f4782e8a0db6912a24b01780a2b2b9262
SHA51229b2d552283474c6105e3ab90c82b87d5c63f243e2a708eeeab20eeffbdb5ed2fabed4a8403129ab1628d3eace91248c743014d71652be92dfa124af1fc5fc92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5add01b9d87e118c999d9ab8ea2f14619
SHA1e3ca54dd60465cabb5d0b3d393fe3be9c3b4ad30
SHA2565b70fbc62380ae2e8fb46f41c4091a417e782a9fef495aa1e6c1ac055c6b4484
SHA5121e8e2cadffa74872712501b2997382750af0f59afc353b7c5b38b0526b48f1876ae3c209ec4500bfdd00cd66ccd49c3784ac9f0b9f40d649b8387b8b730e5ba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ff6a5a5bc66d1e8a4af66205b128ca3
SHA10c9e38d87bd0cd735fb8299bfec81f64987d2e90
SHA2566c3df64f85ffdcbe6984d7bbbf5ec1d46bc7e7b5315e6711c54d682f645c47e0
SHA51213d514728d0d0a2b73a50773dbf75c5f09ba662f336ec14c1e3ac0ffd53632c41b965e5b159f8eafac612af3efb9e7084ae2973b5c09e9db005fa2be4bc924f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3e81b2b4a1acb08c6b7d27a1d6bb423
SHA1e6df1f69c141e06cb3e401d1713f76ce47c0b3b6
SHA25666337a5053c4afe20562ae07f32a419471900de3c8a15e62f60a0bc9356d4e14
SHA5126227b43b9e776b955918c417415dddab8dd41d2f81a2cf8df48f95698cd1fb485db943af5523e56eb71cbf6ad384f070ed1f268af481faf1d4a659e02d4038a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce84e3eb62cbae182fc9b254887c4f02
SHA19f7276fbd2995a0eae0c0a8f9f3c593a13994e6d
SHA25694e2d7223ae32812e760301e0f11053055f25623d95e4ec7a1c8403c3bff86b6
SHA51249dc3e9cdfbc4e7627a80dac2a4ad61697d78aef00708cfc521be2d29decdb46ed5a2a2b9046a585cb7f5e4e94ffe6814abdcf262f87b1e19a5d2e2b453da7ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5def6248d438b219a13a5c2bca049f374
SHA1edb9b08b2eb5d868732387532bebcabccda1d3c5
SHA256493842b4678c8e9d4a20b0563c79ae5b4b4dfac79e64dc3b219e3f3b013065ee
SHA51256b8be8e1cc53d49ee2d3e22ccc2acfad0f18356693c7a4e0e1d8c3caae1fbcacc31c978f8317603f492afa1cbaca37bf51c0f5e9c70de3f9bea2b4d3d9fed08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528b022c38240d121d455652fd986efb3
SHA130863ba9a3add5bdcc90d3667ae629b8ea56fa39
SHA2560114e54cd030052cc5d18c4ebc128e63788a4f6edffd344d817633236b610e1c
SHA5121660bdb4926d3a8bf160eeb37aac005baeb8f7d324a06f3864f0a9807e2bd6eec333064ec049d8c5e7158d8321cb861ae11c3dd73d35bceb064fbaa772715926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b8b31c88938937ebef9ebcadd729e9b
SHA185e03f91cae57f2bc8cc56e7e87f3393747db2a7
SHA2569bc8d73d446a8c3b0db5870f6fd783628cd954f6d9762773b9cbadd3c0f30cd5
SHA5122dbd1aeae998d27a579945c91dc89dbb79c1482ccf6201a8ac48a4605dd4d4ad093bb480ccbf57e240b5f6adf9034991727a79461e29315281e2bfa26e81b76e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a36d50856a29c6e05a40e92717943da4
SHA17fec03cb095cc81edd1665145edec8fae76e86c7
SHA256c4e65f9e7161b956ed7576a9adb8e0690d1efd574aba1088bf480a46b9229e67
SHA5121f69ef5566b21a915bac45478dc8e085935f6ff59eaf557099879220674a5b80827ba5f9497ac1b35f4fe2e1c0adf805949d68e4a9a21f90e7eae92dd9ec01d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d815ba65fdc6f735ec524d7b7a4446ff
SHA16654e77f4fbed19eac332848a4d4a083c984766b
SHA256542263b0118cfbde1a5e43473cc01329441e615a5e2893c0a36290df78c5dbf8
SHA512388e2ce2bc8d7e428d3ed3518334bc45386db4db707fe3d7522742f233e836a29dd22874e60118552989ef55125bbc6d5cc05a0546daeb992bd48c99168159dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5645a3d24e1c23ba98f3d6d6d9a0f5c2d
SHA1f362abed064e3657b5d1344b57a9b9f463ca0674
SHA2566e3d5111a42d7e225c88debfbfd943bf8006eb98238f9edf9c9d02e2511a5c7b
SHA512fc557143719f18666de7582848d606ebe6910002573c8ee40d449c349a7cbe948f6b799a9eb1a93e518b37ea7548c3ec5d0df7477be615e7c385adec5f8b8e08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6c04cf500dc63ae442c5f28cc675e45
SHA16e2e1b7aa43042d2f39cb6eaea999a16ddd50243
SHA2567df0e6a0b2d086c7a219d102dee59f97beecf848c80075aa87b0ebc29a4538c7
SHA51253b57376e1bd750b239990312a994e513d7529952d4cab4a54d764606ff507b96f48ec1db3ecd49b886ccf3b9a122ed63e617797bd2352911fa7ee6b199cb93f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51afd1253eb822683fe317f7f9aea0bb2
SHA1d9120c17c559e753afcbb507a2519d51a258c391
SHA25682172f35d288908dd962608eddd7165498f2c4cd14df882489208129e2697f49
SHA5128473704f8a1000690b122cd057970be7275146c677b45dff33eaddfa585245c94e2b391a8a1bd489a0334dfb12ead305b953e987f03f75c4a139644100a09448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a2caf66c7d0a95e5626d2aecc65c372
SHA1b106f1088f42abc6564caa4baae99dba5670ce15
SHA25680458067a936140e105f009d8a90b85427c055a98cb082d69e8910e73cd5ae7c
SHA512bf79c45ecf6aec9f58df211dd3c198235294a995858a71efffc26c319ca97874bfb15d71b980c2dde54f09197e296e2d209368dc76524fd64cbe8711a6a7cfa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf5376269c0ad6a24bfa9a914e863e45
SHA1ffd585b6756dbe0caebb7918e0cf3ec18b3c0b2f
SHA2566c158cdbab2a17ae545e926ec3cb5c79827b99b097fb70fe9c2ee001c652c5fa
SHA512d8b2eec5d12d9be3e4cfd3cd5ad78edcac61982f759d876d08db6fe1a285d36a5911ec30793778ba083cb06406c512a48bca77b9dfe66c3a1c39884eb574e783
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b