Analysis
-
max time kernel
117s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 01:47
Static task
static1
Behavioral task
behavioral1
Sample
0d5c51fde1e2005b5cff919da9b74556_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0d5c51fde1e2005b5cff919da9b74556_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0d5c51fde1e2005b5cff919da9b74556_JaffaCakes118.html
-
Size
148KB
-
MD5
0d5c51fde1e2005b5cff919da9b74556
-
SHA1
aac315beb5a2c158bf6dca1578aa23b727f351ad
-
SHA256
2439396f9d7b4d91e1852077fd38c604d39cd5559c20ec32d198d658598030c0
-
SHA512
db4fcdd67e7e20c43eaa92b63bf7d2afe609925a9b763c3943d7424b660f9cbba1d7b8dc1e0de87855516a68fc9af3e47bc2e8d0255f1e8f55b393306c9cf2d4
-
SSDEEP
3072:rOnSjXBWQTbkyBbT447wwN3J3SYzC8/0XmXscdChth8ZUZXkCEdtMC:KnSjXBWQTbkyBbT447wwNoMsc5e0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7C6A82A1-8129-11EF-9CBD-4625F4E6DDF6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000fbe839769195f34e44d8a67f018f3d2520a9a4c22d9d15a8564fe49a9cfc862f000000000e8000000002000020000000e18aff6390892c4eac9513b71713316dccb70ef53c39c9f4f93e0e707fa80597200000006c759633b88772bdcb987c171757da4f59e0f5b98f7096661802127be8c50d6e4000000077671310bb08a35a05cdcb4c4fdff87bfcb18d79bf1b1e6cb18656f884e152d6334f343f589efa36a4a749fdb098622440b7854390856cf9524143dd8fbc7571 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 108e0f523615db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434081945" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2564 2420 iexplore.exe 30 PID 2420 wrote to memory of 2564 2420 iexplore.exe 30 PID 2420 wrote to memory of 2564 2420 iexplore.exe 30 PID 2420 wrote to memory of 2564 2420 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0d5c51fde1e2005b5cff919da9b74556_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5ab81e07cdc1acf6471922f5c6e5b2cf4
SHA129290722fda616fda381e793e1a34c6787f08732
SHA256fe3c19d41fdde349825f9b74a68e27e81285fdd1ba8d9f0651517acac915bbdc
SHA51233d3c86f9ff3d9839a2d980bcac10399acd13b9571f6b982c4449b4b28fb11d721067991e98b4435f484e968ee65e53a2350301b0583e27e061932fcf0f3ffcc
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_77964E4FC4DC274F06AF7EDBC2BBAF09
Filesize471B
MD5815b19025a35e93af05222f40419a079
SHA1b2f16a6a1eb023b73def74cfaecd60a5573fa7de
SHA2566b8189d3869f227658589e3d9d07de13f9ee2af47091f4fe2dc1e97bffb4e6b8
SHA512d471588a64455ae535bc7a6dd6e5863e2861d49d443a30113beab1a8ed05b7613ec69c7a5c5aec15248581d9f56966572a1037ef48ff8cf1f9091422365f51b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C02877841121CC45139CB51404116B25_0BE30C8E6128C0BC8455FF6A9904D7CF
Filesize471B
MD5a58254637f9eb2454b7ea2917f3fc125
SHA1ba50d0808649c32ec1b623c5868a50370d2e1aa7
SHA25695a232caf80bc3a5ef23ac4bed1bb631baa28739956bbff80be33bb025e039c1
SHA5124e4864e7cf16abf8ef12319c433afd138c7c8bb4837b0a9b73eb5324333db6dd79855ab8b458ff3401544910271aee98f68569e74cea99953208b5029590c606
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD5b1fb8fe21379bf0fb8f6974d230051ea
SHA1a1754c805592237fd62b561e82ba74764ce4749b
SHA256f53e0de2b25c3eb1d6fb83834e1e6cd722a9e6c2c74662f501d536e4a180ea3b
SHA512e1141adcea4d0f289ba14dcdfb9c18376c65c3fb3e1919b66d69c5981126812719b7e1d4058943558ef7156448499f4ebe10ec9baa593ae2d11f5ec5ebc37c85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD583d4d1e42b57faf0d3c8732bad9ce0bc
SHA195925959d317f606418d561dfcf5f3421eeacdf2
SHA256e0e4ec609c8a0f3891e52c9b43ce36b3820964b8c10ea52097c016f533c922cf
SHA5127e25ef121e32f53465982337e4b96d14cd77385972c8e0c879602f8ca6ce8d17cd3cb252dcc466c5b9ee9f0ca5042f55a3e531ce1fa71427d3bf22c50cbe88df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5098ff6623d6b8c10be229bf06f606fee
SHA1781ee753c78702d12f815ebbd790411c152fa4f6
SHA256d29be7a127ec80524a0de3cb10f98c59a40dbdd316922803d5942276baa551a0
SHA51250910c9faa127befe88a60d751d09a04127ac2b1428223cdde5392e0416b78568593f680526c454015716b3c4e92c2214a3a3b588bcf39615fe14c22278af554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5dedb8cf52d5b8bbd8647827965317401
SHA14975fd95b4f0f9e965a227f07659abddc3d9ec3b
SHA2563e0af5e9115082d03eb5c5e2e007b7cbe0012757c65c7a8d51899523ad9618ac
SHA512bd9cba0c27f0f69fba929c9f47bae8389f9cfe80764f2f49e28e52feb162c7e86a9314be5c705ea0d755eba31e87aecdfceb9c886f9724d529e8270166014bdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9a3cafc61b129a1ae50cc20178f234e
SHA1517ad5131989aed8a19cda93810c71e66b7962f2
SHA2560499f543324559db051499dc38676da38372647638fce854cb1993deac5b643d
SHA512f61f9a89f53ca35c588aa461dc52d0eb82ee6372008d7818c133b5597f699ebd3a227edafa13bff03334073d2ff0850076c60bf7eccdafad01dc348c8496b855
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd2c13b77594674421f7740ede8ccfb6
SHA1791786d052786f218afaaf0b3bb84c498d9743f4
SHA256b760e895d2dfb3618206e7e741a8fb9c63e29fd045eeaf1f7134946c1d0e9d27
SHA512f8442e5b8d019f3063063d34670951e40a3d05b9fadf4f3abe0d8434ee4f142096162c1e07dfb0319ef514339ad8de24e94155fac3b37cd9db71bb7b88a17a7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58634e34f7bd5e2d5bc1a8a26998e664b
SHA120bafc0ba43c55af8acbdf28f22d725970f9b364
SHA256b8b382e0a6c9ff46a9705b11723d5dde208ad2ab2d78d47d6d258bd21ae49e45
SHA512b58f42d5e3067a5e6609d94739c21b10d247997ed1d9518c6f9aabe317e40e187346e655d831134de12cdb1e39ea482ff2f4de16504b11e78cee6aabd93adae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e046c20eb38dd7d4a66e600d64d6a396
SHA1ef2c18dcf396458b4f9a1c2c152a2d8f52d06982
SHA256572231524ed78eaf340bea0dd9b90fb616d1a4bef9974eb2700de7301bc5462c
SHA512ae3b639820dc1b6eb6a9136c3739f10ae17ad7fbac19e3c1e27a6dad30ad00469078fa60162c6476652d9289c59bd4bef159759eab8fc678b34bb36ca2fcaef5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_77964E4FC4DC274F06AF7EDBC2BBAF09
Filesize402B
MD540b88da5a9dcee8cbaf997e2f515b97b
SHA178002bf26d635c7836d8c6bff144bdc7ce3649a5
SHA256b5ee9a91af2fc2b6c8fc2996c2abcca25c26020cb9471488ce2572b1b9ecf779
SHA512aea5321c5d7f40a2b6ddeca9aa910b349aaa5cefa93068c17001f8696bcc52effac51e17bca0c517ee35891a7fa7778665cb73c5868d5d6c77a9cbd3ce658274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_77964E4FC4DC274F06AF7EDBC2BBAF09
Filesize402B
MD5f505ecae8c607fe1fe0f375617618005
SHA1b58698169d8244e7dcc4cfe34288fff8c00a5094
SHA256a3f9e3e2bac0b8698e2a00731407e4a58657e2f128e5f930ef4758d84b9907e6
SHA51286fed96f7e6f7033944cf34ce88d3f2c6950eeacfbfa839b2d91beeaa4592329ac0e53e8b26d2766781df8330f6152fa0ab12a89f39194aed3b553df171032ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5807c92d2621424425e21fdbc01d62574
SHA1b27037497514d1a63a5a583d45de6aa228866436
SHA256bd9fbb4ab67f82e4c346aca207fe95396afaf9c3d62dfc5e8c23c7e91aca8389
SHA512b6d6fcc7d6cda21fc3784a3ae5923f202b696033295be0566a8617765af7105cfeb961eb5e4b902cbf059749c1d17e6b61724606946d398fde6a626d9cf8c4db
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b