Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 03:13
Static task
static1
Behavioral task
behavioral1
Sample
0da35cf9fb13735703ce32bcc626da33_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0da35cf9fb13735703ce32bcc626da33_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0da35cf9fb13735703ce32bcc626da33_JaffaCakes118.html
-
Size
53KB
-
MD5
0da35cf9fb13735703ce32bcc626da33
-
SHA1
a9031aa9cfddc4b8b8d8a837a81e89d146c0871f
-
SHA256
acede32fa59180ae1ff701f2980ab16026f574e069f103acbb2f972d7f736e8a
-
SHA512
8ebe941b2fdadd5821b4e65bc1b56c234ed2461b55bc70bdc9e5c4bb857b0668f659ba73d912362a6e3cc7ab3b84ef5860bac3d7fd70e407440bbbb44de2b7a9
-
SSDEEP
1536:CkgUiIakTqGivi+PyU/runlYt63Nj+q5VyvR0w2AzTICbbcoq/t9M/dNwIUTDmDY:CkgUiIakTqGivi+PyU/runlYt63Nj+ql
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000c106841f33bb241d2d88d1b94da5fae780fb4edf49cce8c96e06e93ebd2dd1ee000000000e80000000020000200000002464a4f08ab18501805f71ec06488cac7cd42122832ee3d25b7d616fbfab27c490000000bf0914309ab2797c1f53bb532b27dd38c3bda06f1b19317fb71b9de0582efac477decccf3d392b0edc8709ae41ca9f50804dac9fef10182e3092d873e2b75f77f9b8fc74514a118ce437d3cdc3ff9c5f95fed9c071685341b4d7f5e57a3ea6ab0260bf863283a294b1c4a1cac77b9ae8af6aa02a3a96e10a90a85476275f905f782de86a755378fda95443cfcd2d7bc340000000011146ebb6ba2416d6dca31f9cd25d2704e97b7432438768be05ec8b7274261d69b7cd0569c1e63c26951043eda9a66d006768fc4c8dc901fd24ed2a1432040d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6707A9E1-8135-11EF-A76B-E67A421F41DB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7053ed3d4215db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000e2737095216e8113c84b32a1d626e7065abc14c299b6ae37354263a112cd8352000000000e8000000002000020000000e75ae520c9d9a379c0c5325d8fd81c2d48b8de76328de6466c59589220a8a52220000000e33dfd0d74c8bfcf1d176466038f8b5dc7a4ffff915dd4ead4853ce09dcb270a40000000095c6d724f54148d00ddc8547fd182a577713a1ca85c916a526bb4cc2de253d4232cc8c651e1c2fad4105cc90ea92ea2c01c3beeb747f47220463b2230110ff0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434087050" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1708 iexplore.exe 1708 iexplore.exe 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2208 1708 iexplore.exe 31 PID 1708 wrote to memory of 2208 1708 iexplore.exe 31 PID 1708 wrote to memory of 2208 1708 iexplore.exe 31 PID 1708 wrote to memory of 2208 1708 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0da35cf9fb13735703ce32bcc626da33_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1708 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e60ad4b152fca7a4e1c5ab2da7f96edc
SHA1927e1b695f894277ed312157bfb2263695a16da2
SHA256c3cf60c7c73214fd4a8d1684332805b342b6dfc637f65810a49af037dbfb4242
SHA5129db39f406416a57a9850eeb8dee5efed85c66da196a9846469c4870e6a1232070b0dc66c99e214cd0549ce7da4c1e76ebc662690a2a49fbab028670aa381a190
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4b2031d5880e7dbc5b698a70619ad3d
SHA1aaef90e3bb7ce7063de3726aab1866cba5b92f75
SHA256d2127da4c058b7fda799703d63b27a068199fba6cc3927f5deb66a9a73123445
SHA512622f371e0b3a53e4c3a5b7149d8d6a9449973fda682d0882853b80ec40b13db9d26965f4aacf7eeb5f482359cb2e12547ca5e549381a0248d90b0be158c5115b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bc4adc6729d398038d9d84373fbb7e1
SHA18f6a396c822fae18feacb545f78a10820208e6dd
SHA2569454af2f625462cdf07e190c3a1f22b8700bfa9a38be8ce5601d952c1eddc435
SHA512df12ff7c9172fb83451f7a5b331950e66bc468a8f2ed6a2b230d22deebad748b625b353e47b6abc0835213dd0eb1fe65b8a992c39ab5e4e7347ed44963a07e05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8d52726f8977286eb303ac7f320cdc5
SHA12556e8957c4480efec6eaf11b2e9fb42994d0468
SHA2569f071d083dbc15346d2c758e15aaaf61009200e2c40fde35421c5695d289de11
SHA5128cb78943d0767df94bbbdf8cdc9becd049ed06a85ecc7d1ac8d1369b777c5ba56d89e1bbecd6da52cc88f2f9f0f1bdf751095ade6980b1335537c4b10d8da184
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535e0f01a3cbf0812146c0f0db2216739
SHA1a64c3d0ef82d10c4a7a17ad707833b0ff01a42ed
SHA256e196c8b06a2d0342a636770b8c0ad1286062f49cd86946f646379840749625a1
SHA51211ee29d35bf5aa3ded4fdedcdfc244eb074e9338c90f9ef109b2181ad6c5e394c9adb65497623353e5caf03bdda86fef05c733ac93bc32d234ae014b0bdeaa5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514ac06b092c3930eedd155a112ca2a9b
SHA1aa9ef52fc723d270bd31f64badd3d1acae84edaf
SHA25601682df9655e6cf686b730119f89a54e2b34cd59901de8e82453718c4327530b
SHA5125511195b5f172ad8812df23a1900fd49d9542a3dfb63dc7a5bfc2732c00fccf118b68131b34a9c6ea27ff47f89fc92cdad977dbbc44212e4f62e24a79a4eb31b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3383412b9e354234be1a5787f563583
SHA170a15c74ffd4f39e0061885f4fcb16950c842362
SHA256df57f3474f2b15f0f437b94b19dbec45493afbdebc7060757303e7dc284f7491
SHA5121c8a292f3bf20c8197b8482399f39c84a4c8c72a424f97c5646f48ee617f9ca0396f49d87ede14d80b6cbb3036948394b6114c523e867a90deacda2852c87fea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5871b450071ff0df1641c6d051e8fb138
SHA130f39474fcae79be212959d9ad9d576f246ce0ca
SHA256399706a513a8423697b9c193cc4931cdb87d74841af62eba6ace743b1e9f57e1
SHA512b7ba7d33ee4b51fabe6897b4f4cee9973e2913d97ed8078bbabef1f7ea1da4869b320ef2f10be62bda61ffcc2967aa2acc8b85b891b84644b3d5130cc6d9eec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51468607a2cc80a0917f3c7dcf369978f
SHA136ecd0d0450c630b9bd2ac9804d30665e9f4f97f
SHA256e8d90b669b0574dddb56426c619cb52b07fa62d73b562deec54e10b901a852d4
SHA512acc3b1eaf605f54ebd71cd1c0de434df66596c45bd2497fce118ac0ed4f82dcf2dc651c151ea3531996dd0eed4299d5320090a33e4e1210e3ca239cb29bbdb57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a68936e7c9858164dced6073c9f1c103
SHA1041db02a71735150c14dd826e0cc8c323c10f49a
SHA2565f66c970952e3e2bf50b7ab9c33ea3bebe6e7ab948190ca210a1e5a5847ac773
SHA512d42292522d82dfd951d9dda729e751826231d60e213da9930707d9dfb2f9a3d67d40af336f02ebcbcd292c0d0ce3018eebeffc3cb5302688d740e8b4ceae3038
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f356d812e878160e1f2b19079749f0dd
SHA1f64b36f7f7d55e75f7018369c80d471d369e95c7
SHA25662d6f13c7b173f071c2cb6cd2849955f465475f4aeccfd8d1ba221291f9b54b4
SHA512e9d146044454d7aa1135a01211addd91616d992ae6450cd9e381227352fc94c60999f904e502c10c5e84cef19e5ecb36678c9b9633a64136ec173ee7fec90de0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5646bfb3a8ef4917711da77bcfc2c3a6d
SHA13bafb0f3e3799a1c7d0294e8c1e1e1e1fe54846c
SHA2560bcc13851b46161d1cd4a1d217bf0a2f02dd9565a83226cb67df5d92573ade1b
SHA51203eeda5bc4e04776daa3b1e08f5faa91df388197ab08485d974c6323c8df508f811495fed13ec6f9af5e6453aca9af891caf498e62f9a5e8dd3e2edce6f25535
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517bb008f6cec8b0eb7d1d03a1a0f957e
SHA1ac2fd52e74899e05cb135ea2bd7f4ab40732b930
SHA256046b5e546b77da35f891fa2241b7f8bc7c48283ed6f79b920ac53628baa67c24
SHA51230b869e4c85ccda517945f92068e4cfa5fff0c1cf64d285254554eb3c42725801b6a456650546a63fc0007464b5d1ff18b0a742924c52a41d3383aba9db56fbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a7b06bbbb28736080663ff9233362d6
SHA1e12999fecf990f98f6d2a8dc21c7f7d3717898ed
SHA2565d6fc9a71f5fad4fe5eba0a3632f22255bc52966b100362465964a836e6f6bbe
SHA512fb5342af09946e84fa3585ffeeb1de63ba5ea3f8dc1a783f87b0e8c6ef9b857c24ed34f0286129624b5bdcc2e4c91db342e09a448e88ff4ae6ae5dda88b3bb92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56085bfd49e886761e5c9ebe03c75b067
SHA1dc60cce2e9c85e3f9710cafbf0b2326dbcd1ac36
SHA256c13ee0d39c5652b0d6e1623d56874ed795ec19b1e027709b6a17a548a7b1b68d
SHA5129f8d55ced44f9395138847cd72c811f98594fcefc5785cd148056f668aad04ae0171b30d6dd30d1bae5c15bf10f3683cbd524a949a1946a59e1072cdaa297a93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3efee2c3b3347624c4ae96244e571d1
SHA1effa5d6c9fde1a014ca6b2e9ee436b7d71600770
SHA256ab9869b36a037123e5a928ac74ce4a6b0deb679696e821352b4b0c5e8e2f0576
SHA51273605501b7aad78a79d22e43aedd37359a74e386c8f350adf2ba56277faaac91520f08829989e2fa503f3996a0af177bda0275bd2801cc79351c86c2c179bf80
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\633SXO0D\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b