Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 23:33
Static task
static1
Behavioral task
behavioral1
Sample
10ec864df8f5a284e1683818451bb926_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
10ec864df8f5a284e1683818451bb926_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
10ec864df8f5a284e1683818451bb926_JaffaCakes118.html
-
Size
6KB
-
MD5
10ec864df8f5a284e1683818451bb926
-
SHA1
002530600efceaf53d08c07053a4f8ada8f8e520
-
SHA256
aea7f7fb847137b5a7c5a134970bfe35e0214264bcfccb3858f7be751f78ffcc
-
SHA512
4af3ef6ae3fb988f11c9ae36f8623148d4f0088ef69e821d98ba7697fe57bbdb7b7b33a068ff8126bc255ef43338323edcb7974abc31c97f7cddbbc5b6108380
-
SSDEEP
96:uzVs+ux7TjLLY1k9o84d12ef7CSTUH96qmJF1vcEZ7ru7f:csz7TjAYS/OmJXb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F7998BE1-81DF-11EF-925C-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40cb9dccec15db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434160307" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000030b622fb115dc2b761a50140b3c6edba20b7cd95013de5792e2b14b7d7735502000000000e80000000020000200000007df95ddd9bdfb24c2cc58e12bbed830327cbf05f4eb4a2ecb3326b2dda3d06c920000000481f0a6279c3a46ddeb3fe019072aaa61933e825770ef6bef111c53e807431034000000080fc43b003636e43cf85a3bec03cb82b8b127acfea40a948dccc592d5e1485ed7468f690757a7ff2ff7c9be3c6452ff2de8334c817b165c82436f3a8ee739f95 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2736 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2736 iexplore.exe 2736 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2524 2736 iexplore.exe 28 PID 2736 wrote to memory of 2524 2736 iexplore.exe 28 PID 2736 wrote to memory of 2524 2736 iexplore.exe 28 PID 2736 wrote to memory of 2524 2736 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\10ec864df8f5a284e1683818451bb926_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2736 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b079323a8a04ffd6df1d3ccc06b862bc
SHA14a5cb2e3a368224de4b15fd489916e4ea8006c24
SHA25633e09fb8b633080608a18df7cc0239a05802d1238d3e4907b9ae3caf8232e660
SHA512ed72616a029038ec588973a1d0f344fc69bc33f81c17de02c6577aaf894934f4862e449f0663a5015b1be2233e15e66dac0ea8be0a1ae415b1ee34664b6049d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2f0445c6e267c6993654df158f340d3
SHA1c7db88d6cd6a431f3dfa425691087c8267895bdf
SHA256a9cc87e53038ee52fc57a41a358a1d03aea0ef3fd38bc064416b9860066762dc
SHA51257dd0afa77e9e12c6259a4645cec965aacc1a5b55e0993a4c1aab2d82df74b6e695af1c118d8aa06cb722ad3af3a61924b6a5f229557aac0a6bf00256ab7dc4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567eaff034688761a73747c53d24fca76
SHA1d4fa31a956fd75300a690f9d6f32f25d3f933348
SHA25676ba95f53b4450608541355854b54d9ea2dfb89cfe9e5e2416c82f4734c3d996
SHA512adea913ab748ad2b28d5f19f1e13801bd62700a287c05d25c110cc690529b93d959b62d39289cf4a4e59df1f47f0ab2b0a9406d2f08e3b5e5b6bfe5cbd1e6fab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529b7baeb084afe4aaec0067f541fd9b6
SHA1b0aea4cf4298856f3d035e7ecc4bd923eff8a730
SHA25689ea355feb6cc84fa27a45a48049054bad7663e1a639882fb4cb7981dc72fdc9
SHA5122445a592fd7bf1a143c4254472607604f2d13de04fa125fa7b8212a264c60b307faf95f91900551898fb8c3efe6d949333fa1dbc9e638e40ef5e6d8ee8cb44b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ccf73ba630bace9c735bb4390bd12da
SHA1fc4e8aabef753c4df670a9e26dd7c87ee63e5065
SHA256c5e9a146d56f2c0ca477b559956aad4fa873b0c98b669fa528620578b4f0b6e8
SHA5121153eef93f47df999b65f75c0bb6627979c41aa632ca8ea751602a361dd552a3ff1ac5b279798cb195cdf333e0eddb93885c0fb84262990abdd64cc47d6a02e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4b5042aa5eca2b0373b56dff6736377
SHA1bf7252772c654c429165551917efd06a12c87c58
SHA25603e57f2c0335535cea7ea44dc134fbff58ebab1949f40b1ff1de23664369729c
SHA5123cd809cae71c610a8494b7e37e99c12e06ec07aa3688076220ab70edae440c850e996699da92240c071e646694874d29132c9ef5e9b2f4c39ed5aeff7ce2bea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7b7e234277999fb42d5172937ed6b08
SHA1c136645ba22ab9b2ed69bea09d423763cad0cd25
SHA25650bf15776f4dab392bbeb61928f0de7498501a6aa1a9c58ef0940a7150de970d
SHA512ddff2b16610ac8cffb13209dcd36c86053a63f6923b1b5bed805cdda2719edcced896acf1e17a329c90c98602203ad2759537c8ce91fde265042534a82c0da1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c877cf0d609c63a7e75560e87bb62feb
SHA1ab4e2208feca6e8500ec095f5f97536a76975f0d
SHA25610b4894447699849b47a5718a29c0063fab605fac9b6f3fc3cf310e5d246ac56
SHA5128335a5b1e0000fb77b4228251d3069ad2388f159d4fedac7ceaa515cc6c1e729870b13de503813e1c39e52176e201d811ddcfca8a9008739cdd6d86ecd517b82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e3da0c8d9e4a6f58ffd6facbbcb7893
SHA1ae3695f75ec3fff50d1a96d0cbd27654c0e91438
SHA2569fd6437f93b86ee9af3b683ecbb1944774c935399ec9bc1627e1b0d8df5e55fe
SHA51271dafad80ef8898a779d48e8135916bea09e075bccd677072b5815ee49cf769aa05fdc8be8f6690334690bb57f3de13ddc47752dd7953e27d021a0cc69490277
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58eb3cbc7b5550aacc1829359ca321d8c
SHA12192331bcec4c24c9ce0047b874c561c466ded70
SHA2560cfa13e43961966b1471ace6511c65ac45b581e4ebd5f18579f3c29e5ccc297e
SHA512425a10dcf18ad18847cae9765aac93d28f847b95602f38537e07effe21ba661b14625465b65629dcd5843751bbfd9ab40b0c4bc2e4395edb0743a0ce37f8ce93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a0acae598903cad5e66a3fd25ee2bba
SHA1a66fcc865e2df3c583e2b23ac13b3331df518cfc
SHA256d3626c8a5bfa1e9f7d6e80a122f7d5ab3dafc6f269c147f4dc17aa70141a443e
SHA512345b5e2feb830506604e11881d419671fe25fa205ee2df99adf6719d8d6fabce3f7f5a1275e6d32792793bcb948d60ee1f9c7b77cafd3a7a0ac6430d571bcf26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562c28aa59014e7d95c935611c5b893cb
SHA1433fca0e4fe96511a9a3bba54f869764982cdf82
SHA256b6d21f87e3e8a026ddf904fae746b0fe535adc0e547c518551d6feb8006e8c05
SHA5120d3483479d80d764a5e733e9b78285dded6b2578f3e541da8f31f63c8c5ea81970cc0d4c5654afbd6d53125bbaaa28ae7853a73e403c972658b6046d1cb6115b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f765fc7c0b93f74579da25e8f04bf9f
SHA19fc0fddc95961421d84953e984f6979de052b5b8
SHA2563fd2947a1dd232fa0a04878ee6bc48d6efcc74e15e89324a0525d46b3730624c
SHA512122902747e82fbe024dc300d4c58c0d14a51c23d7ecdf7097d8f09b4e77cb1435453b38568a87ce86c0689af80996ebc74581163113c0d9f55df5aad56463c7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b7c25b5bddb4d4226c1e9101eaa53cb
SHA1311b64cad7f289249a1af0035cc41d1cf07dfe7e
SHA256ab2edfad7ebfe1330ef54a697fb02b50ff0c98709f1d8b3d6ad0b4ea41499220
SHA5126e3e0ee5d59c5fa01fc0cb9150d19835ddbd87e0f4416addee5ee59ca41a7482760a002735a0fdbdccc4adafb01fb60528edf6544a6aa671ece25884efbaecca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525a4d649cf3d8c1f8004b0a624e2a465
SHA1150ced8e656d9b36f218aa475972fe2d227be9ac
SHA256c516c4f0d00d117090327cf5b28d9983c785d2972a508f37b79f5466deb810a2
SHA512562c80fb5d6933bfc0ea220c863e078f36a1447e2c5ad51dc452cacf5188abdd5e2795550f0e16b30738277d790f559a46c31ad7b83eaa9fe4b5e76b9af9402e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534ac6372cd0937560100ed8cbcc1945b
SHA1b72f339ec7f7eb9ec023f508fbbe725b84548368
SHA256014b804e00efec5f5610955d3490c07ece44841abc9110ac5652ee32f742a9a0
SHA512d496a1bb142e4a650f95ee0609cae90398d7b23b8009c052653fcfb50c905e85991fa6860abe2d633654b54ea525e34e7f33fd1b35031b36abef87cfcec97f2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7ccab755d1ad31341099a40f26cc232
SHA1f5d858f50f0e755a245ebf65a3e67c79ef041cff
SHA25646fdc9eb1374766b186b5fe943fa233b7379b2019535525f990393dcf422d3f0
SHA512d5487e657f078f9ed5d7a47536f49369a834ac96acd96dfdc5a11f86938e5bb83f33d0078f97bc243900d1cdf899a03b0170eedb8c84289037fa98aa89dc75b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b3a91557b7f10fe254abd84dbc3f5c2
SHA1c4be5846ca7ca92688534606ace9f27653458107
SHA2560f7a33d2e33f101256269bb188f6929c6c6457e684862f5febd97825a95563ef
SHA512a337305e3ed18fc4d34fbae0865ccc64d506f478bf4090b985460bd9cf619132712a70905b9573b3fd5c8c119e783efaa7d053a65d235028bb89d1c8a33e7678
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b9e80a27cbf5ccae22d5e9bcc9e52c3
SHA1cfd1d9bda350a6ae2dc506786d64febb7f727c78
SHA256edae7b1119157fa564665d245b4cdf5c8d8d79ad27c0e43f1f57ee23225e22fb
SHA512ed20d4441ddd8d9e607b98446ff54dc538b3236a6cda6b8f9e409e8132acc7714bc6339ffd6fb22bec873594a4c42141add2e80044464c620fa69203ca55e65a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b