Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 00:34
Static task
static1
Behavioral task
behavioral1
Sample
0d1de7b8c1e98d65b52cfb99f7b00b73_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0d1de7b8c1e98d65b52cfb99f7b00b73_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0d1de7b8c1e98d65b52cfb99f7b00b73_JaffaCakes118.html
-
Size
7KB
-
MD5
0d1de7b8c1e98d65b52cfb99f7b00b73
-
SHA1
ecb414f24dd2417db649040d02e4b855f8ad4d13
-
SHA256
4745089af871c07b52e633942b2194752222576ede5a40936f88a1adb94159ca
-
SHA512
8c0979ed67556673e08c639552235f7851a7d36f807bd10b3c5b658730e70907250e65a75099c9afbc04a651add980c5f956402614d5d72eb2915b6a47b20db3
-
SSDEEP
192:F7YwXz02mm7WmZZ32m7E+7vJkYwtwREDS8QwI6xQtACn:FDjtqmhE+7vY2REDS8ZIEmA4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0f70f1a2c15db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434077542" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000f51e68d1da2ea9e28a92fd8e15ab9ae3c448563030b435d22cd32dadad6dd4e5000000000e8000000002000020000000b6f091ab1dc38545254b8c01e0eab81c80afc0e60794e5001d89cf9475fdd60c2000000013f50f614d9070618ae7e37b275db6d606fed2ffded27cccc9a7effef39b262440000000603f28be540625a2ba94b937baa80ec757ea1ff2ba23d81e4747faadf046954ba8039073c6393dbcc61ac6e51759e86913ba9230e6ff43ae960d1ced87dc3b2b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{43C1AC31-811F-11EF-AF9A-46D787DB8171} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1820 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1820 iexplore.exe 1820 iexplore.exe 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2116 1820 iexplore.exe 30 PID 1820 wrote to memory of 2116 1820 iexplore.exe 30 PID 1820 wrote to memory of 2116 1820 iexplore.exe 30 PID 1820 wrote to memory of 2116 1820 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0d1de7b8c1e98d65b52cfb99f7b00b73_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1820 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd4fe1a2e58bd59dfbfc97ed6c4b1526
SHA1718c0b7ba71a5e657858c4c2b78480430650d09f
SHA256cf09e200b2d2e608ebc5acfc8132f000d44569f4cc945cd2f4cfb835b24b1f15
SHA51224d41c384bee2f8d951738bcc1c1cfdd0238a295d49b07afd95a7f697ef6f40d624822562a1534ae1545208b7f4785a2c6693a82ebda1685f98f289d2625f87d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c706e83fba526f7ae91e51aaaa70baf1
SHA112a0ddce69f2dd3f6c2f59e00303393431a10e20
SHA2563be7ee35a7b1c02feb09aa0cef3f8e3b4e467e7ea7d49440ead22cb579d33dac
SHA512eaf543ea523730c4a3deecbac05e42ef0bec38b5ba57d473fd60a4fc8e68abab70e3ac4c2511c77c4171fce08d291c66010cc4dedf9f2e4a84feb1624a55b06c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ea71a18505acf1ea7c06643a78f9e79
SHA1632e0c75dae746bbebbe117790c742e6831322ca
SHA256b609ff055c7960eb9cf31802d2130bc5610d72dab9d7e9929b4de464fd73b434
SHA51255796e47f0ee5ea74bdce10948cafc0c4bc79cf9724b8a686572bc91ac90fed7d78c3fc767eab12c3b68b13919fcb940e201ed9049e8ab0d5cb8765a805c05e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f30d73d33908065c818f0fe85b854f6f
SHA15503e387f23c090855dc668023521fbbfd452733
SHA25609f1103d64f2d8042c5c0c074f78c97c9450576ef03a2e1ba1ad747c2fd178ed
SHA5124824b88c12ace2c9e5bdc718621f1c599a178e3023bf4c8b79bff3f4f220c183bbf7f571c5007b81747e5bdab291907c77f09d045d03d15d5b8e2319b9643685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb4b3496a83d8f3ed3ad811c5267a686
SHA1f555e8c94d4f4bdb37706af7641324b310534232
SHA2567801bab218248b68f673e785e0b956bcdb2fa68ac67b846aa1db5f4b5d680a08
SHA512a15dd71ea10d4f7af0e2a6ca2ccbde355d25f063ac552e1f3053c6db82cce0cd9134b3962172f3064d481230a9cc972a89c9ba29155334a8ce82d09832ea79fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51664ab3b628623f23c79f40339f16d48
SHA1011dda8c0f4cefeae1fc010cb5b8278e3ed5f92e
SHA256b06ab6e4710755363f45648ee37c25de1c068aa7f4dff21d74f0f0283f600d94
SHA512ae312505e46a57781b595665f75b9e4c3d9a63ba4df2239f923d6dc24567e15d37121806208d91ba44a71819769c54ad9e65b6f032183cbffd7714e86458a7fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567a6fc76f23960735d983d6f9431485a
SHA19bfc45c56d82a232ac20ae1bcd5647c728dc557b
SHA2564fc070785762dbeaf4dcf35413995d185fc975a6dbfb142d8db171e88fe3280f
SHA512eaea7560cc51d9d2451d8d5a2fb897a3fe43adc044370c8da629e779dcde219fb7ddfccf98604c4c78fe043a2348df3f0af3bbdc9443711c8e690580a5b8c27e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8037dce207fc94357412ced0c4746e6
SHA15ca009ee5d0e0d90d787a76983dbcf7fadd41855
SHA256c7fd0c39fb9d92fd5e3731fa00817a0a0de4444d96e04cdab71a1b2f36bbcb09
SHA51204e716251079b1656537782c118955d36705d23751d725af0a748c75268070cc914504902f78b6735bb187ed0704a32fa833fd6818c5e7d4b9ee09ba26b9edce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d532de1660923ca05fb4b9cfbe27b81c
SHA1f1d2136e89ee73c5007ea5fdb2c499234233b151
SHA2562af501f323a4bec35373360ce94c619b42acbea231ea15359d956bf8c0d28ce8
SHA512a9ff9ede8e5dec90b82703e5686e7edadc23ac39f566105d3fa274d466292c0d525ccb2482a75740b3fe2c6c30f4bc95a9f61da509754c5f47ccc5356448a63f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be8a1b71c253ce6699e860a30b0630ad
SHA1f139b5d100548142cd1ad892602f260114555557
SHA256c63b3c82a1edfa4bd36b73e367ddee9722d7498bd094b97ca0616b2314c8ed24
SHA5129d7b2ab17cfe0b4de632a1391ffd91af57a37694eaf4b625f450e1dac266b4d1a136ff70b13efb1f8c189a5f37d5dac231433cb4d31285921f93f88eb4c8c490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d94eae562a12600953b27b8e7b532675
SHA1d76201388a5bdc730a23f61dd3a5df16db8a2a90
SHA2561bd23a44db0b7254003a805e22713d47d197bb794386255edefd5054cd66ce3a
SHA5124c33a37cbfc69cca6c2758e5e02762f3bec7b52fa0b7077db9c3bfbfd0df54dc1c1c42fac9e6ddf4e01ce79ab58ba62379865af1822a2da095e097d5a27669fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52013880a2d9c8de82f14044b511cead8
SHA13e77e026b59917a6014d45352b41897190c891ff
SHA256d90c8053310a3cf65038824ad6bc88a68078a158aaf0121ebcf4d8e83d89f3f4
SHA5129bb3215b24a69de22b7f7dd1cd610b1044289a3eb9aad0d8366b331af1b4075ac651e53d6e6901eaeb6aa9b274b9f08d0aa1802dc1e47b3651c02f19cced8d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aecbe17dc4fe5791f882fbdf017c2507
SHA12f5cbca9b138529e54fbe1b1ad3711f6fce8bff3
SHA256377950ed86bbd816f4f7c94d2e6d4cdae81f3c91de78c05571fb2307b0b87a60
SHA51271b0d3aaa289e0a4d741dc108db54876b57599025dc63bc6af3afc79cf3c15497201650b1ce18112f77c588a10f341082cd865ced3797ff06f65d6f38d35f895
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a354cf0d0f8ada9c17569fd61a567338
SHA1d6637fdb10dc7e68a6292839c5e604165a8cc433
SHA256e96de93af30ff9419152e7587b41accedc44096ccc48fa97aa333f1295fc13a5
SHA512b9ef772d279c2528ef2a4d67d63234b7d778dab1186d0dae30fda2af41124d4864928dfbe10ab174356ba04b9aba2a28f621a66b3a4904c09ed96bb6aa4a8629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b39daf5c915223b1a72edeb6c3d3b2ac
SHA1acf2d665bc059defbc855185b63beccffe0783ec
SHA25694ef3ebe4d15398bf19ee03132c74844f9f51bb9dca2f0db48ce16c3b65d6c62
SHA51240baf3e39224a0aaf9dd1d09c5ab19af0067af4e952ced3881a792833325e8725097e239bd08ed562d3b6a6a5304cc03040cb21bcd041380cbf3728938688562
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5a2b67d20e9a823ea05c79bb75e5661
SHA1f4818bf7c507257c896880ee3bbfa0c4ef412a7a
SHA256efdb8fec816909ae385ec055ae4a7c9bba835b08539caeedb29f94e0ad99c664
SHA512e0aa635e4c7ea13e23535923d169d7252d700abce16708f63eb74152c2a89c534294bca7d629c0fd04ad13860dd3f9e08640895d6097d590275f266b733e7167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1edcc194499a3051bc712f593511548
SHA1fcdd47ffb6d4074e118805d87a48c1021748ae42
SHA256bbbf71fcf44c1bcd9eca2d14b34f5b8632b3d8b729f24e49d28281638df16d8a
SHA5120f5926bf6308f8ee1bf33884784d5bf0dc406e4acf187b6f414c8a1606b85c6b5c159781deffd06516ca3069cf91874e7cb27b738661e10104e1971dd12a23f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3a2ecf43732d7a191612564991e83ef
SHA11adb5b729fc6577d850a10a5cbc6056188410705
SHA256b496a62a2a5431bd8553043b6d8c07a2b1d9a2e393fc14df8d55af8afd8fdf7f
SHA5123f9cc17c2cc47d7ae953aceb070332b4bc75f612af027932e65f95efa1b0eb81f807cc36c12934bc0729e41cbda76091ad686154113c103f764a7522d9884b23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ef602db463ccc42236ebce4eeeadd77
SHA1bb8c1648d82196f6ae0d38ed8f1cc021b70c9311
SHA25636098a60256837bd6a4d60d8e33fa5bfc47d32088ab3c3db2943e05d61f8409e
SHA51272adf3b3a3a7b52312331a5fa38b30238530934668b0e4ee06f4ffdc731b3e6472b72be023eb69241a823519cf8fbf0c46a5030ecf4fba2cfd8bc57ed7506ba6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b