Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 03:49
Static task
static1
Behavioral task
behavioral1
Sample
0dc655087b7e7971a9a63e7b352285c9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0dc655087b7e7971a9a63e7b352285c9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0dc655087b7e7971a9a63e7b352285c9_JaffaCakes118.html
-
Size
10KB
-
MD5
0dc655087b7e7971a9a63e7b352285c9
-
SHA1
4f04083ade9ce5f2a61a0ebbb1ec1b4c13919b61
-
SHA256
acdd0316b6f5e05ee4e4fb2d9b87c09851e3527188c95a9be01c851205e277d6
-
SHA512
72fc27f2893eef722ce21e5d7ecb5908e2a47afac16276fdea0138a75580a0f8a8424d3cd4ae93b3af6aad1ab68fab1799669d086a7a49c170ebe7f40b990091
-
SSDEEP
192:2VMlIsr03NO8k/w1whqJk1sBoIrnRsiJG01y5uBuLbdU8d:sMlIcuNe/g6sBoIrnRsiJG0y5guLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8BB30411-813A-11EF-9CB9-62CAC36041A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0f122864715db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434089260" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000025a70fad85d3e470d1aac6db04045818d72cc1bb500ab7575bc14cae5edcf099000000000e8000000002000020000000d8de890d7433029a20c849b039f7705accd349c70fd31f98cd955a005982bbaa20000000020d800974d661fa5249ca9d328eeedb36e4a8cf7b65dc440539f5ef9deb399140000000fe1608557e88f7c26dd98ea7d0e523f78c04b31a2167956ee6b7a475c33f342425d8e23e20badaca260db865e0a07eaa2f53350a01af0400a908d2bb07f95c75 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 iexplore.exe 2336 iexplore.exe 1548 IEXPLORE.EXE 1548 IEXPLORE.EXE 1548 IEXPLORE.EXE 1548 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1548 2336 iexplore.exe 30 PID 2336 wrote to memory of 1548 2336 iexplore.exe 30 PID 2336 wrote to memory of 1548 2336 iexplore.exe 30 PID 2336 wrote to memory of 1548 2336 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0dc655087b7e7971a9a63e7b352285c9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e9377638081dc44c42b458ccf33494a
SHA1b634f838452e57a921e42b9070b917344f145bcb
SHA256da7bb5bb757164f7cd81e5993fcc5d64fcef237f7b9cff031764736d09194d81
SHA512561c6b1404dcc2c2652a9a4eb3c0f6c9c00ae747a4932174fcab52c35a81513fbbfa971130653ddca50866cc46b66ff11615a61a0c4013174fe9c38979998534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51080600633a5e8bcb40e6437bb78caca
SHA15730dacf65cb496b685710db357e2e748d3ce6b9
SHA2565383c0cfe5c341484968faedb41f57bc7bbdc2178172b14bd00e97cb0d46f03c
SHA51238f053f697f60065a5e55f9b3a433dbc1e808bf56dd8fd4617ec8156474ae0756c2ded7789640212d5aceccfa1e29b55e2505f627caa14b7fa61da5415d66267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f74963204884bd4016b2f5f56a03fd2e
SHA1b5d6948ba381db02ffaa05ed345beaddb57bbf80
SHA256cda48b3c9d4264710952d1ef47118ba9131646325e141ca170919f025e247108
SHA512060d835951b9dc77b2182d01aa53e78bcf13e723acb7ad70fbaaf2a2c8905ead97a9970240493df0f815b7e026b07966a920325ac92bf8b62c96249bb14f9a57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5983aa69971dba49e6fdf9ece716b7bd0
SHA1ac86530fbc1b650baf1d111151e37e951f32629f
SHA256c0c41e90b5999a43ba76521eb084ca6cd186763468b68a6851b6eca674dc5f93
SHA512ad92f2322f93b0aedaeecc3637ae9455619afe506c061b520d75b961a2d2b6209d8e8b2add674f2312c38e46479d7516b04fc4bade14d0f7ba06978229f6f24d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555bfc52d0ab97f88f89a8ef940243ed5
SHA1f2fdc3e4b0e7c75c67eac68088f988403fc920a9
SHA256caab81aaabf061af2abddc034fd8578386c1bcd039597972da08b672cacd0140
SHA512508398a8fde13d2aa259ef26be35cb9790afaa06f87bf934b3dd563b2208ec4bd116326bef7067421ae74b6debb790fb7a9d2b2374828bdf1dc51d1bb6196525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599862e8d72abb143458487f731230b41
SHA1ee7a2c3e06b3f3f15f467cdaf2a022e9e17ff17c
SHA25668fcbe64f6f9a5595bda8f93ad265fc0a1568d969304fe513970382a82cb7c95
SHA512f495c645fbfebc2f2b1274a966c8c7aae72f78ba6702e23aa9c0c31d1af96a5b742b058c5c7ffce605fbcde80bc236b94cead427a3fec796573bf8b5e96d8984
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c33e3f48eb687761ad40f80e7e3ced7a
SHA183aadb737afbc029950e97f17491670b44e484d1
SHA256e71c9735451af7bd6c34e3f88f9d1d36ec1657390b9bdb776f1abe3d039b8f2f
SHA5124b46d7d065b8e63c5d27dba0ee8b6efbb5181f36112411077cf10c2df5c54d9393ab1683fb6e86ba2963ee2685ad794f87d517c428b80ba2caffafcf4218497c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bfd341b34fecb848c7a8dcf2ddc9eca
SHA1111e3fafb9c29710f1845190eb63471943e71256
SHA256adf0b99c2201918127f3dcf7954cd4a261e397ea36c1b62a22c2c0cb519a92e0
SHA512f09ee4823ff878971d55a19d3f92839e460f3898a546246febb026ca9adbda80823af1c1f8f213d4eea4810552354b0f5a43084a754e2540a3ae47a656c82c9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568eadfc295b33c1b6c83416e9dbd7c5d
SHA17b031c827370d379377b45c26f60f5927f61a7b6
SHA256ec3cad323caa3be81e8bcc9ccbc536f1441823607fa21c8f3d0955c22bdc03e1
SHA512282950e9526a76364369e2b304f7167137b8804eb3f91dd096422564c168f958a9f3ffa8617c82505b4bf95eefe3ff8580b27bfd40e875b3a439d71095bbe9ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c73868708ed0721c32cbc952e159ca9d
SHA1b1f71249c5e8d8216b5ac92138db4c734fc80573
SHA256c17dbcac005d97ef951c15bd9fbaba84856ae207978c5428c77e96b7ac10c2c3
SHA5128db29bdd77e7fddcc9cea0dff05727e32dd2d65054f52037aca81c1475a219d1ff25b7cb50b9b412effe8166a35e672564ce2b30db429edaaae212793734290f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51575b5a0da15a7237e668bcfacaea828
SHA1193fc89c663b27a77050e183eb75dd52adfec5c5
SHA2560761d7ca036252acea1b245e30ecea6900f5e7faf0f8a1e8f4516948c23db380
SHA5123ba5e07e0f623061aee2b6f19e9f746591c5f4a9111f076e933f509f93594fdea56e62f47ceaffe7c801486b2d7bfe366335d1d3b1e5e9caf888efa397d222e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db85b2a4511284f742c2ab239a2464c8
SHA1245c1ddc4e81e9fc2c7ad9a5539cdc60b77aa20f
SHA2569051c6f3694fda88d89d582ff35bece49dc0d6d85b414e696cc8fcecd30404a5
SHA51290fc03393a616a341a281c09ab53874f6d1e51242f695ffce10f7e907a5280bd54ba84fd4c8b67e63583b876396cb54a1914a87f9627bcdcf2593845347b1f7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a72d5d05fc08229cd8f91b335c244651
SHA1985ea69f6ade12f5108a017dcb8cc8786f28c027
SHA256de9a15defb53370a25695e588bc017ea556e880b3c8f125dd458adaf04514b73
SHA5125d7b4552d6ea799b42c7d3b6a9969900aef6d7e29ac3af148a9d3ad6ae8eb52ef11a64dfdd06c42031f8bcf441ee9258f25cc9d5bacce86b5fb6b8f8a9c25849
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536c6281c4ba6be962759f511fdc007e1
SHA1396926d8101a926939b547f57c4b65d49ecdddc6
SHA256e344cfd91dc0f40b056a93aac7151e67134cd30fdc1c318e28a5d1d9b1a2cd05
SHA5123b816dc5969086b82057771e6052309861dd83ede5fe1f1fee5a3015cdb69afc9d778f55a642b847290972a6bfcf9e73da46025179e20824a6f21ea506ac48d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569087559260ddb8950e7c5b3c3e652dc
SHA17f71f535dd352acc874eb60664f8fbee20d949c2
SHA25616d362feba3240c0a276f0133c9daaa216eac44b96467d97c9f9bb73b9079312
SHA512c2b617e562545b11ad9203851d71bf336ebfc703deedbdda358a77920616dd874260acc1494f8b2200b1c67474c3e94850645057683ddf4b248455726cfd9ed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520d3d241cb4d807759a35a5ccaddffb1
SHA130b612b2eb5a0ed3e7f86577578416548b725781
SHA256c46fd59b95c2e3640ca3e5086994add8179163421bb058538ec76cb11c285998
SHA512fa5ec888408299bf51ada9d275eb5d8ca1e57839f08af6d64ef71327ef4afcb9114789334f5a591698547b3add326e956e1565d510fcf3a296070784b09b03c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588ab3e803020e468f00b5139e42f66c8
SHA1cdf187f8a4ff564f82fa1bcd3f7bd31e7f0f9651
SHA256eaaf7fe29eb164705a2f8dc5c0fdef36846cd3838cbf58c39cf48f4659d986aa
SHA512db26a1eb3c3672182b574f326725b3107c4776fc70307049bfb4f689eaa5faa2ebac76b2fc038f8187ef5726bb388ca63cbc16d48f6c329cc336dfa2c449c755
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568837345b9018df455e96ccdb749342e
SHA1ea88e1e3a9a395c499c0f85518ea2cc8e96e9d40
SHA2560aec37bf808ecdb1eeb91bc15b5aac921ae49afd79db9cc6e6ae692f718e5b93
SHA5123895b7170bde173740b12973b2784712f85d2004f9daf2da5a77b6a26b9c470a8a91b2abb4e30f59b5d6fd14e3989ddd93921f55109b664c11c320f9f685f209
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4a7dad11423c8bf8ea0a4983b80485a
SHA12581fa9df32fd9f002b037e6e0424703da7d1eda
SHA2569413e6bb58fe7bb98a581331a3d7d38d9d534c507ca257d328b19c69b9cd5368
SHA512b9339ed3c1c8bf26dc18469da933a04264cf285b1d974aacf0511a2eba1d2ebf2e1cc55243422caccedf3ae8e88daad2f7eef2a7e6f52687628b614a9a6f0681
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b