Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 03:38
Static task
static1
Behavioral task
behavioral1
Sample
0dbc44170509d97c59d399b637ccc8f1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0dbc44170509d97c59d399b637ccc8f1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0dbc44170509d97c59d399b637ccc8f1_JaffaCakes118.html
-
Size
6KB
-
MD5
0dbc44170509d97c59d399b637ccc8f1
-
SHA1
8f7fd5ac845fc838c6469a3b5531d5310301a4f8
-
SHA256
7e8f72dad3a202b9ea86aa2913d2977cc0070768312179371e36ba41db52ef30
-
SHA512
1340ce0686967bd6f1ff36d5f39c50c1401f3c27ac0b2789ff0504a4ee842660d7130e74f197aa3818754602b65e7728b8f4a51aaa6da714f900dde6344b6266
-
SSDEEP
96:uzVs+ux7wWLLY1k9o84d12ef7CSTUHg7cEZ7ru7f:csz7wWAYS/B7b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E9390AA1-8138-11EF-A02E-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434088557" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000ab118bfec5043e9d1541974e36e54c2adfc5ff50725c755eeca20966d3794781000000000e8000000002000020000000e970119d0b14cfbeb552f5d2cd01c766528e36bd0bd85abe74c2298e32592eb520000000313194509c4779cfe69f1283bc2db7f568b02ec01b3a7e407d0185da8735a4014000000081fe0484d87136d1b7f12170b7d7809c229caf39890c92e9d6cf1635f12ecf4f9de1b05c753908daefb15fbec4893885f647a769d27cd8e044b425e913d07361 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0020bbbf4515db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2960 2084 iexplore.exe 30 PID 2084 wrote to memory of 2960 2084 iexplore.exe 30 PID 2084 wrote to memory of 2960 2084 iexplore.exe 30 PID 2084 wrote to memory of 2960 2084 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0dbc44170509d97c59d399b637ccc8f1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527a62f3c9ac0ac6be3d9c5ed63efc8a1
SHA11783b8ca2728d6cba661b1f97994fce2103942a2
SHA2562a8a41ea54463f5ecaf7b43173f5a1efee93b5304298dd647f088a7a15311968
SHA5127b0944d678844f1e009cc06389cb4e4381cb37e344f110b79320d5c9a2421bc19b7996766a50535159d8e5cd0f07afdbbc6a3a2c75fff12dc105bfd9e12b5fa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ce6f746ca49b3ac03ac06bf59c43756
SHA16cd5abdfe1e6b2c631649170ab9791312904db27
SHA256e97380462383d29af6720b1b88dc730dec0eb54c7926615f45c9098286580730
SHA512c8f4a63f8d0b4cfa3fdf204f78bd3421fee7d510f1b1296942f3a614f2fb91a066f12a60005681d46fa92f37728860c0a721fe04abe5f57b56bbdb5bb5c6c324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5210e800bc84b385b31300cfcc41ed55d
SHA11d166138ad4aac44b4f53ad5d06bfacdc1bb4e22
SHA2562b1e0a4a8d18e3621d3990c30eba5dc6568d5fd717e913c38b9ab9ae81012c5c
SHA512fdfcf5e8614453a2dac4d04cd0d6597549bbe8ad28da83e542f516250a20fc9f7b7b1f0c4632f3e33b6ba5048ca3335b7088100a7c53e2aba14bf4b00100a9d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c767f70dd3e3caabe484ba428d88e93b
SHA19afa8d34a3fe6fc1950b44dea1a7e454c533faee
SHA25675920f76de09b291282588d1e372734ea58bba7431510b958cf08615564e7c02
SHA512819de713e847471380c7639b57dd3c81ccfa7ea12098387e6a60344c334cf4707aeffec0f058512b725682b6e41d945c0a08cdf397cdbcb851edab07f016bdeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ea699fd3eb68ed36ebb5b7d9fb1194c
SHA1ff2419b3b56c9711d0a9f240302f9c496fff42eb
SHA256f93fc2e833bd603a2e1cf2f0f5749dbe736e0136493b23a99a2cd96c18f269f7
SHA512c2b56dc210971468bfe897b528b5065e5eb0352bb8e1ea962b0c0a8718a560f7b87c71594c6ada276b4b9fe68082d92ca5477bd72331cdd012e000006226d40f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd0ab85180728bd2cb42c1df87342931
SHA1f3013cb1deed0b14382e026b0dc64973799ee31d
SHA2564a4be193957a6af2c9b0ea9e809e864cafe53df9d082018ce939a90b520e8635
SHA512d2add9626b3332c3c93f9d856c73d1a24ded7daeff43028df049bd6f2cb627ff93a457e1d0122adbd01a1c3c6abae6beb195972d65b76bb9c2afbb7caf08f7fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5def547e45b54223064855bbc65d86719
SHA1bfff59e133bf4036be709093db201142c47ffed8
SHA256d84456346809c1f022dfefaea65f534b2fb05fb27c4f1909c230243f58daffd0
SHA5122e9b3c4a8697a64953bfcf5e56dfc5560573508e4d9af4b8670f6dca1994ac5b1b48b6d580a64d4ee953613e1f70f67558b24f6eda20f011df6591b55fd3c715
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea4e2104974d4d45d7292284edce6acf
SHA144954de98114a7df01b60063a9209507b780810b
SHA256eeedfda87a211a5d2dd31c35df493ee7866f9cb818e4f64505e08e54a4356f4c
SHA512c049476ea8c3267af2ca21dc3c3ed280ecd19fa5d2b5f3c75ff1792d7e77433bdddf2d9514c8548cf96edcdd5ffb08b34ec5832f274f803b6cc6e9483a0d237d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5065b2dd5852eb16f8eb9daff22ddce95
SHA1c913ad7e5c813b89200957b50d96ab1e309723a9
SHA256cf8a988a01844c25d2bbcb950438045c1f55788b6900900ee82c02fbe38bd8ba
SHA51252545014ab7b1da293d6484e08a1135504521645225fdf3123c2fcada97d7f7459f89f2ae0e9c3f606a3e933a5d0c58952a94f4315fbc072b00cdf9da329fdbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d36bbfccc12576e79cf26143a5b40c84
SHA182782ffe275aba9f96383ea13cb13332e285f879
SHA256b4fa52eb3c2f66da263b7a3f29f86c3576a92f2591a93b118c74d8b6d4afce66
SHA51223d940467cb8ab6fbee2e7e4f054cb2507338396981ec3c840854012f5874de56ee326e72dc287e1877a3b3a2efe890eb3f39083c9c9f747e1118ee90f1fa755
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ea5611003167994b33cc60ac676490c
SHA1cbf6aac655b6649e3cd3253186f50000c70e4079
SHA25648827191de3903a3930a3377b068d927b854e25331243512b2faeea250e5b8a6
SHA512f73e5e00fec1e6830d605dcb4f7853fb9bf408e7b46cb1ef3b0e533e5dd846699e30206b9749371d15252552448a3a24f2133d50fe33680dae82d8e8cb682554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bc4655edf7a44b0f81772b0f25123ce
SHA1f613706c5f69d7a2d6e0ef5fca1a101d916cf418
SHA256a5ca689cccf41f269ce61cbaec04eeecbb4c9c10cd651719cc7f0ede0e96a112
SHA5123600f58a9096a8edd21fdd67c0423dc9243c89a224c3a0e074aa2aad65676f627fe96a93e5475f7780d5590a674474454c041ce21bd53b0a0586c2fadc90ca10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f05a89fb764ecb3fa2a2eba2fdb2ca8b
SHA16724acfe79d711e4903e576877c96ccb8e2651a1
SHA2568e77bcdb595980596e5e71acd9757db00f11704eb935dc63baaea0fadb1d2add
SHA512946a9cd0463f37df4552f3d32d6b962ccb99490eccad4b4e3f766b6256fb519b1ffc4c7cc09e4044d55b6caeba3a5fd2ccaaa7bc79883668ac4adf30890763ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e074fc9c979c730a684d61c822fbb853
SHA1ae5fef9da432ac7d93f8658b6cda495f60d5a21e
SHA256cc62ac07f3f36d4470e0504ff4aba24c5a532537ca27b53b7db687c6d5c29066
SHA512740551195b37229958c04718bc1154e8d4a59dba426694f518ff52cdc4d92c0af262248f6c9ba698b26d92e17f6dd7bc35834d294c4a2d3baf55828cecb786bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3082b9e0feda470927d621c86264832
SHA117aa44ee918b0b37738103962d2ed338aa86b924
SHA25609e2003aab2ef7d2b305f3f4d043ec468064fb6d974b10b1204e6b2acdafd831
SHA5124e51394335ffb9393ca9782a0b0e03cd03d8611b07d2fe824e461f8a5d6a3c4e2d286af6fe41bc36d0a165bd1348a3a9665ab2fbc2e8044888c3e05e0711d46a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e10928d12bf86dfa095adba29c9ada7c
SHA125dd97dbf9574e907cdea4beeecbe0d33ade928f
SHA256b88de1189a0ad9ef850f35a1fb34b69f2588bc302be2d440a2f5483fc7eb62d5
SHA51225861f3b98efd6ca92b994a52567b312ac3683b5604e0f287da3620fe7778cb9e198e34be92c5c45eba1c7ecdc67bcd2424946578951e642bfa5c22013f92914
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595aeb36357b1191edfc668c3a6d7ddac
SHA1adf83bfc66261ad47178ff29d7471e8220147d4c
SHA2569c6974a94d1af7659665ef2e93408108d3b5090f7858fb9a9c3a5a563dd1391c
SHA5126e6e3173f5b97aff8b89aff41714c7ea8ed06aaafa910cdb97cb14acb1f7faa3a13f44b4b9d461035ecd87c8c4d5eff1fa08a666a9b8c23f8c6369fcfdf7dde8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b37ec3c1504963496611b4117115abb0
SHA16ffe4d750b748b67991ea9b5b522e410b318cfe7
SHA256e68999b66bbdc4beb65cc72ed94a1ce6622f80f979f0401a4ded11b434efeb84
SHA512a6ca74910cccf8129d3bfc578896cadbb7dafa36a9ff5302a888af6d9b3b458bb50348fdf899d2e377e4fe8c58967d0c7075a74b6343f0b27bbbec9e675f5a77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7c1a077cae4cf14d9fd297ecbd5ce7a
SHA1a2ac627eb0cc5910df5ad1a1bac80b8cae782d90
SHA256c9cd220eeaf94b686ec9b5bf2dc9342789813a723532e3756e84771b3ce7666f
SHA5122b9ba1ccd2ac8033a0896d225d2dda97a45a8768edb88d7e606f22aa09134d6003eeaf46497883cf4e59684ef6d4ca13f3f4dfc540bd2a452b11b913304f27ec
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b