Analysis
-
max time kernel
121s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 02:06
Static task
static1
Behavioral task
behavioral1
Sample
0d6ce7f0bb46cac3d5a2db4f25252cd5_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0d6ce7f0bb46cac3d5a2db4f25252cd5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0d6ce7f0bb46cac3d5a2db4f25252cd5_JaffaCakes118.html
-
Size
21KB
-
MD5
0d6ce7f0bb46cac3d5a2db4f25252cd5
-
SHA1
0c5a76156bdba3feff865b3bbd01143dbb369bf5
-
SHA256
7d7ae7e44ef4dded1c34034fcdfcad7c77ee52aba7d5049a4f7a6790b54f9bc0
-
SHA512
a33799db223d78519f63e720018b2eb6ed2f7f7fcda4b680c872bdfd90561a6c73b91984e7fd566fcade3802780e4f9394e4a21b78ab738c5c57ba7165202040
-
SSDEEP
384:TXDlIcut34DsGTH4Ybu1OtqzTXn6Z8R/gbpgOXguLZ:5S08hg9dxLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50c010273915db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{264E3351-812C-11EF-8334-424588269AE0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000004a71dd21e5b31d8a51262db03b987220c520c4e433f05f21763af0f49f8fe726000000000e8000000002000020000000997f915d1e9db5d0532398a01e80c81467147b199add9bed74d1eaa11e903a5820000000b0c14d1790bbcb3288ff94001c6168d364bb0354aae44b10f1cd5d5209c0885140000000297c1563c3b4dffae34d3f97c39695ca118fc477c3b948d2534d6cb05b540cd7c765277a9d13b39eb6d64465a77575b28d2ba8b68dcf8697e99d83da40e3530c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434083077" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2984 iexplore.exe 2984 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2832 2984 iexplore.exe 30 PID 2984 wrote to memory of 2832 2984 iexplore.exe 30 PID 2984 wrote to memory of 2832 2984 iexplore.exe 30 PID 2984 wrote to memory of 2832 2984 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0d6ce7f0bb46cac3d5a2db4f25252cd5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2984 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eb2c7fb4c75912b58cb5af1444daf2a
SHA1b23180d881744266ab949f78ac21a82cadcb2762
SHA256b0626be925157334865af839c859dfbd65bbb12855b97e336a2fddc7c867182d
SHA512a7d60b29be70f23b899be23ca02393df09c72f9cb9c5cb66e188d2e5f22a0d90e933d70e4cf25c354df345eceaa66ac6bd6f13a20ea66e9f442b349e83d6537a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581eb68fabccf3f52b0b233869145e55d
SHA1668366a734dd9480af77b84ff4ca217bdf6119e2
SHA25627793dfc70adbd52d45e700b585de0ac67bb41ef18040c8af664c4843b755a65
SHA51207fb91e44013798ceb95d0481d19657f795e34fdd83714d7e672aa9d21e446a7728af0b97504535dab78d8128b55c19bcaae6be21b196f44377febb043043bd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c643c33fbb35d415e191df27b1e4267
SHA1175398758a725d5d85789a94f56682b63a7d9565
SHA2567f1165b8c7f7a11f5ee72ec3ea24dbe3c84ed4a7e8315a620deb2e12ca05a3a9
SHA5127a0b0828b215db2be6590f369d873c3ac4bcbf1eb1395c3bb1f6a020bcf9ed9a64c9cac1606f2a5b2628646f64b168c8fcd57512bf573c7b0742b41d14087d3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cbcb705e95a369dc9b9b54a4a072751
SHA10b5cec4b11cea19bf2bc56b1d2e74ad4c89bebf9
SHA256e7b31021ea272f82bfa3ce80bd4a91b12c13fdae307b7f429e7e7a2878a4480a
SHA51276684b8dd9a6b011063a4573b650a7e10c7744d6273bded0d6741d2a6990f32aed84491a5cafa72910ea43f69c2b36c2f6d17e6df71c5a61d0b8ebb22a2e5beb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d015272be90f62c5eb42b7f1d562e21
SHA1e0c2481a914faa1043c7901c6c9381a8976b10bf
SHA25629e6f79dd8d7009f320abddea93ac84bbedae97d7e71c3cdc360071a591f7880
SHA5122b7c7aee1b1c2894caaf0d225c2c513910db5e6163993db6d3c21327408eccb40b988db46f566377d80fadbb4a42d0b68784c129fcc050c86fc35f08c8e463de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557b1cfb75430f88705c7211c32032755
SHA1f1aed44a42b5cdd0e1756ec7cf506bf00a811376
SHA2564b2fd67ee0525fe6d0fdd680ce0e2b3d8a83731c19f9af583f0f7930dcb5d4f4
SHA512f0d424317c874ab3d10b90072d996b19a3a0dbc75ceb8be878dcc49f98c7700a652df5fccdc06beda80b5dcce70715aef8ff4c91584b7a570860c2594954f778
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e6ab95b40dc05d9bd17d2c015bd3cc1
SHA192582b011033bae8f76333c7eb2bd8bb6aa9cd64
SHA256e19d788a765e93c9ffd68f36bca7fe6ab8a067fa08bfc17530fac7f0b7524393
SHA512357bf72b42b26c90fb3c89a29a955d01ab2df9f7356916e8c5e3865e0eaf37847cc3edb3f47aebd5d85a5673b0d97702f97894d4db43fd5778f48254dc45d40d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a21ab9a0395bf332e691353f6977124
SHA19e32edd3b3240dd137e243a42524a54e17d3cb5d
SHA256c7215dcbdcc86fc1b3eb09f63f8cc45f5e60fcab832f9103605117ba4bfa3004
SHA512ac4184a4d5f340367a68dd534e6c47e9a833a7e10a6be345061ff9b55590e9440e8571a7e2e9825a633feb66ec0b39d96c20d48ec6f1f0ebb76b172da126a43c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5ae9d4f3153748f7ad7bac7c9261796
SHA1df2f7360dfc1bbd071492b4bd89bdf9e72acc0ba
SHA2560443fbf33b4821244a5771c81ddb637b8543b21b0b223cfcdb7b34a837f60b66
SHA512d4533002f1ce8f5cec605028764acdcea6010af23ae15649099ad0dcf7c9fb7a08e8180d549cdacde778317a429a31e5e366d59fd5ee48affbeca57efc8ff1ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f8e663121fd072e3e1a3ad34b453b6b
SHA125f15d76caaf2b22dadf52862bee6e03d649b470
SHA2566b4dcf73c73b7d271968e57cecf803593d686fd9336c320b137b781d9e72a08a
SHA51231a01205d62cc8289be3add8b662490edaa9a8252e4dcd76057ac83843040ef165ba05a196b917d0cd266d7909cd6c3b537e27d7f961372fde6a02875531f1de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5972ae0c7d2b6e9c521a6064e99716092
SHA14993b52ea24ea27c43760f985b8e48e2630a3f44
SHA256094616a853b68c0b4c6321ff766d3a13c8088e6ad9b0571649adcda55ce7807d
SHA5123a5cc958077774434d9714b4ca387d138c3326d7638711ee9db342b3910b32c9acc18f3205f98bd45bc941264ee785d58286016280574bd57229a60c86fecccc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb65fb5dcab00c715169296a521f5c16
SHA12477101106d6a15ce5861fa00772204f4ee786b4
SHA2563b52f7a687fa418bec59e62a294c8e8b8342fe416a8080cc19236dc856871f1c
SHA512a731d14db39f587b3dd9070320fe62a3f2ebee0a5b93a3da81a8e3f8d3f95d0e4cb07941c3716ba13bddb50e159ba77a8d03ead577a19f8a779949e375f00304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b751d1426c2e98e2e2879d2521cf9601
SHA122e837f77a59b270f8ab353d3eeed8b6c7ece9ee
SHA2568d9dd1c4a265d5a910b674543a86566b88c73570289bb0e1b06e2a4b9cf0f2ec
SHA51286dc4e83d1e655a5e988ab5bf871ed4314e907defaba5fc7f53ef9d23fc8953bac88cc43b161ea9c0a0df169dc3d6487ab60df68b68f4a32a0c9894ccf3dd26a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ae4d092e249d29dcc0316dff7115fc7
SHA1b140aefdb62dfe470e9845db8b88430a3daf4fcc
SHA256f48d3d640f1ca346969f2873c48ed5d9ffdb7627531a32892be7c8b483334aa5
SHA5121c3bd904436016495707678a8060feb88620657ae548c49b39fc08af7dfb40bf0b58d9993cd63f4e08276ace300b90867815e946fe79f7ff0608b6a1086c9df1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bb7afe6fef129de82e5e073195df367
SHA194a8650da1b73acb6ab503dfa1eb80b73d444af5
SHA256f2486c6d6ad4fc8dee5ef7c6aeb41915d820c5b1a464ad50da2a4e2185d462da
SHA51256c0342dbc38767198eb17f3ba0de89ecf8f8eb8ef8d6d82326b42675f21a0bdcb04e7f173275ca436247cabf89d13d0ab233a493e7732af2dadb380c9e7e32a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53703e0e26034d8cd018fe6c9f8cdeb63
SHA1de61680e0eedfc709967ecb8fc86a6cfe1693b00
SHA25646ec871215fd569e87fd7204d96864a87fd07b9c033e4f22293458438376f3f9
SHA5129505639d6650cff013ed7c9b5e8b53e31859c9ff13da6e92a61ba01d54b9a6f8c32b88726e12f33a343f4957f8c84e43a69a947a5149ee958b1f8dfd1020f694
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500d2dd8188d25eed248ae4b5f903fe2c
SHA1d6ca40b20d4750bc57a28f031efbb5450d0d82d4
SHA256e0450cb5007cc478446d2c71cc3ff82af88934e13ae0a5aaeb9ccafa53d7972b
SHA512a0e384bd4bcb23b8da23724724e56cad160f74f175dd0ab1287b48d13110ee2c4918e36f2b48853c4af79c0fb050f78a82835d68a5d320b236a60ff9f9b6c29e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5838741500eda091737acb6d9380d27ea
SHA13a9201349f158462327b02613c1009bdc9255fda
SHA25653e7552b940d841109ffd95803b0ee219b86a67d00b745f82885c39fd3c047f5
SHA5120f8cfccdde54d2a06b0c8093276afae11b529b305523571470166d0f382aabdd7e4748016da9c6682755743173808094ab004a9b14955a551d00e7e0fe071d80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab55dadba3eaba76195637d70c666dde
SHA1ec5628d7b10cb8f810f9baf3ec4b76fe93c2d6bb
SHA2561413103a00f265d8b69a488e4af310f7c3cb8e6fc08a5454ca981f5ebcb76445
SHA512e48666f7fd6e67325cbf7b60125b4e255a8c57a4ff9b1d0f0fda62f10c4f0a45c52971a61bbadb4add9b843fafe21d2056c5b04969ae67b325a5ed264f272f90
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b