Analysis
-
max time kernel
139s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 02:04
Static task
static1
Behavioral task
behavioral1
Sample
0d6b86e184835ad58f73238854b4e8c1_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0d6b86e184835ad58f73238854b4e8c1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0d6b86e184835ad58f73238854b4e8c1_JaffaCakes118.html
-
Size
44KB
-
MD5
0d6b86e184835ad58f73238854b4e8c1
-
SHA1
cd1155c04d5e556b5b40eb588dc2147b0c8bcc63
-
SHA256
9ba3270d520dd4ce02adebbe69b2270fef41405a380a2aa692d28c29afc4f310
-
SHA512
3e1b761560e75bcf7dc85ac4139d75b8193945692252e523f9b1a32911414e4649cefca4dc803bd7ddddcff7ce2e7b2013c0987589e1945b2cc2a15a518e4267
-
SSDEEP
768:Zcd9QZBC7mOdMQ9pC5I9nC4pIXYjp6QPd:gQZBCCOdR0IxC0IXLQPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0c55cbc3815db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434082964" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E38A4041-812B-11EF-88C1-C26A93CEF43F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000000f630e64d9e7c7c57b4054128e757f05e1cfcb234a1260f0a28d8bcf709a00a0000000000e800000000200002000000040a651dc80525e327df0546f7ca7394f48782a2b418b43a2c60a35783303a1f720000000abb5a1ab0890927617e5e3c03c60f4c85d07d4d3b72393caafed3dd31f0120b34000000046c03783ca2274b3f616bc01a3102a5a0c8a01fe6ea55db49ab13470bab8a0dcba84f2c7d109db0f040ee2868ca32b689c2f28ec8cd7048e11da9b882ddafb0b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 iexplore.exe 2336 iexplore.exe 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2384 2336 iexplore.exe 30 PID 2336 wrote to memory of 2384 2336 iexplore.exe 30 PID 2336 wrote to memory of 2384 2336 iexplore.exe 30 PID 2336 wrote to memory of 2384 2336 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0d6b86e184835ad58f73238854b4e8c1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b5e94e94e331e1f70a7e5eff720b4b9
SHA125ead6d8428ad2b5ca330dd17dd987a46713983e
SHA256a3ef276e58129948c21fbb9d390afde69afe77e04c8432d62982444da1afdbe0
SHA5120cb32dd1fd1f45397b109409336e49de97b2cf381e2bac2b96e864a14eeddbf7209f473de77156dafb3b166384439458f9a637d895dde3064abc54e03422259f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504c926ed321b7e040ad3acc1a29ab4be
SHA15eb0e0faffc7b43f116ea2cb2de8474822407063
SHA2567802fcb34eae018a422114426e5d5b860d03e5bb1d2a575198aad7658a7d4125
SHA51291054c49b0079289f007c429c157c4ce20cbb9a1e4750f652bf16b42f5528ce5fb2193c5463233c909b5f24d5841c1be684d1b55f40d5a1902b4dcf670f93576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa5932a7fd49a9b6cb46ace0b6751bad
SHA15bd98cebcfbb1469ba67bd7eb363bac80c42fad0
SHA256314c9f5f7f6b963d5ede5b6e611594ebd4aeb594bd93cd1c755fbd3ca08d16f3
SHA51285417c412305aa880325e2ac2f6450041c297f0e092f1ae8a095ac7ba67c2d6e543a2e04e041a58ead41c122afbfa68f353a578520c26f77d8127bcec6d171bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5ae1c2e487d1285ec00294e44a9fae6
SHA1f69413d2d8b3a95f64ff7b34337c9a7b8ed974e0
SHA256bd2e5e2e5b657a26a97c81b38db649e1beca661d7a52e29a15a790f1aef6fb44
SHA512bba116c515add30cad28f68bcc8eeed2d1e0b06ad545802ecdbcfbea1c88202e973ca99b448279b64b8709bbd41f844f7c2038050d0b4286caef92819407ee0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56be800cbd40c6fb1c971e81ffcb47121
SHA1eecfb692ede15bc23cd2a0873b9402fe93280e52
SHA256c58340ba32eeb7925ebb191182d85ef4796309d4093ee6115228fbf7e094b9ea
SHA51298762511ae822f28c4689459251c4f8f9d3bb5430bab67c880a2bb4ef49266e1d7c3d2051cb335caedaab75bdaa41f6818a71b3096decb45c7c8483a03de760f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590e04945d23325ee3022fe61b2b3ff38
SHA176448d0a0abe90e2b7491b1dc077a82449f9704b
SHA256b0b836f7b1c21c357bba4ca050d6659b354d9670496233e33534b7ec9ae0e06d
SHA51207ceecb4822f463a56a6955cd82cee156b1aceaaa49965ff34bd1e2f1a7b7ed6f24d015d3c580db6c6d2d5a385b09cf4effe3d7e40060811883251ede056c62f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8a4f542a75614f0943300dd6394f175
SHA1654f787d6d1dcebc1497564cca156578125d5cde
SHA25609da196097093171575b13eb1fedb440101279a0552d797a48acc0b1a5788e57
SHA5122436a0e5405e1bde166c81f09075725bad2da3dbc613503072141ab29c1f0a4993b4bca4c5d362fbaa40cd9f4bd5e14dba37e86a38f15727d76bdd4937a213cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b60b729fb569321c5861a04afa62e75
SHA14845832f58ecb307313701aff73a3cf159e5e45c
SHA256cc51e29971cb9622544531d4f8bd289702bbf05692174c672a64169e23010567
SHA512106e3b5766910781f0d0a80e2adcc7ea8adc48e1e83f09f123328ae7683dc719401da875e8dc5b441090bcc89b7a81058b6499d3264b633f2b8beaf955e3c629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538bc3728f528b145420b8aac88281cad
SHA1f923eb2aefcc16e5fafe76fcbd96cbe544446fb2
SHA256d00cc7fef1182a0687d4d6834e050fa88f984a094c3b09bfae6024422d4be449
SHA512d370ae06c98324276717f027a4e35a14ed0eea96255de3929261a7045ff4b7a2b07314500f7092c26ba57fcfe52fe1091b88378d49a50e8d4a3b829727bcced7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dfbf9bfc846eedbff3bccd0c0a59cdb
SHA1ff7b6b4eb887cb633d63e550c7ad2bc779800447
SHA25682a9c3139bb639a8a897c289d0ea782a5a6ba46c8bac882c40cf8ba60e406e36
SHA512d130172150b9800d5d9b757c549bb6bb8bc184ea9f5c0062c49b2329163db4d12a61c632e72c8e3ababc7ed5f25e06abbe0495996d19c823b3c19e6d31d8d284
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5378fe06a62641e069a40a71c34b42d82
SHA14c67640eacd6a28ae2ac817ce4b4a2cd4ffee48c
SHA25611d9c723ff4dcf5d5fdc69041f752ffe2a4308fb0f23b2ea2844bf3843610424
SHA5122818a47591bba48f2f309b0230e49a49e8588ad700f21e1351884d0cca0206d8f6930db67039647689128493ee082a87df6f6c1dbe574f04668fbdd32ad5d765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5282bf7841ad0bec188ac3cbeafddc396
SHA1cd7c2594e03f1dd6edabca3b3dc039eff21c50f7
SHA256be3c00995f694eb24d0539f44c87f96fad62d4994c8acbcd903b1e9e9ad0ce36
SHA5126563fa00cc6718043b63ce86461afadc393a35e1d5a79519206fa846e9ee9369cdb978f5ea4b7fe6b2e41f53f8eb0b5563f37f4a48813491bcee3b0f1011b9e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518166f24a40becd9db3849f9fb1527e3
SHA13d1c064c95547e3fc003a4488dfa61441aadbe62
SHA2560033ca897b28bfc7c40f9af08bd1fe260c2ba3d7706281865e534e2e0296dac9
SHA512e589ce75943dea6a72c56aafb5b0758021559bb370d2b981166ca48bf28d3eee68a26f932379d9552a9e20499024b13f6b83e0a23ecf9565ff73dcaf2b36bd06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d053baac4fb21817daf42e83d60d527c
SHA1e04484122077c02ad8f50be6a1f468594c0b8abd
SHA2567b0e2d47a6beb2f188733d74c4293fe9dd5e0c0d55ba558ee11e2b04ac05d9c3
SHA512a0b7ab4effd400d864f2fd04e19475b36f493217d5da96eb0f37783a0ab791808af1e6b65820f21530a745cbe65533549c7787693ebf9e23f596a8b8b46ffda4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574f262dd37e646a479f9a333654079f6
SHA1dca497c93cfad2734341ec2101fca648c0d9910e
SHA2565f97c354a8e260eeef6ae02e9a53f4112950240d8fef7f5c5f1885fda1b83caf
SHA512c90628423c56b5e838a27a66a3c81902ec6e12c1a9552b6bcf06ea9343d4bb3bf5557f62a18364b7c74021a00809af14cf73c235e6e8d642fb5345e142390fb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5789bfc387643c6652e2eb16233249b70
SHA192c944f621369047129012cb0b9ffd35e5e6b6f2
SHA256a415846dd8871f5714577fcbe185b82e070ccc06685e7215cfefca944d06d5ee
SHA5122b93d03931e72a62cbe96afb628b571b7127cc66510c1d2e5460a195eeda7fbe5504f6da2b602df2a634b8c34f4755e583edeca7b49719ef16d392c36cf2e3c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9b12d8985faf5d38ee21f6460e36ff9
SHA13ce41f893377c3f633e0211c0285ae586af9d5f9
SHA25657af0ccda67d779068419ebf3dfa49a93f94b3866bdf1ac4103e2e2855294345
SHA512769a853ca25b889a008af9e3a2b1627523eda09e2f04b91256731e94b25d10327461ccebcb38c50522e4c2ec964d8144cf6a9d33e711fb6b59f9122f0ee3a021
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565ed66920d531c5e6ac1357169e6d10f
SHA1da6f95ef0467c94ba018eef434ce793bb047f290
SHA25652022fda024b5fcc34a2f000e3d37ac3d6823509def56f682962c218628a95c1
SHA512d074efe4c1d1e45cdb1b07af97f7577fdd2ee12894edf9d8ade846254500fc3d052c40fd565111c145f55d86ed5fcf27a6dfa19e6feb88493d869fe774d17eb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523d9e801e9f06d4a6c065fc4e2814821
SHA11383f97170bfdc8107af019174db073ee57b4b79
SHA256fd43e0838d0baac0a2d824f4e8981ce6f0b7eb2404c498c664f56d6ed07b3055
SHA51225d4231fc58504411ac69c848a416b1c132a3b472a174ef201ce02fa85fce4691b46694ea9bcde3df84cd2f5c4c992209e75ab2d1d45ee13e2e6a8e4f3d5c004
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b