Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 04:09
Static task
static1
Behavioral task
behavioral1
Sample
0dda15c7cde8329948185d4bcc174ba4_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0dda15c7cde8329948185d4bcc174ba4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0dda15c7cde8329948185d4bcc174ba4_JaffaCakes118.html
-
Size
1KB
-
MD5
0dda15c7cde8329948185d4bcc174ba4
-
SHA1
5533101b1c62514c594bc416ad2670666b23eedd
-
SHA256
b118a6096521c402217b8d65960bc32e0d05335127a9005b5a551913089fb5a9
-
SHA512
0819818805960553290f0c6d79062e847de4b546c07bffb6e1a952a8a37cd1286417036bab84ca2e81c4fbadb22111a120982ad58a79cab3a4cfb6e95ae9cfd6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4F27DF41-813D-11EF-AAD0-E29800E22076} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000891f7ee9e3055d60b2a4b3c74972bb3df6a743714f0b4158aa06bd3809ee6f93000000000e8000000002000020000000b115cb7d381df9d24b69282b92f3f60f8b00802f14e82cdf9cc5fa2dfcad8c26200000008217524bff74679aad74e4cf472a62c6800e8d0df14cdb0643417cf9b92ef429400000001b782ba0cdb9a7f97cc76801ac0452d0d61b5b847ff6f8f64eac4cffecfed0aaa2d53422ca018f53c2b4c38554a31686b926ec4d4ce2c830a28d34c2406232c0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434090446" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d00c75264a15db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2684 2668 iexplore.exe 30 PID 2668 wrote to memory of 2684 2668 iexplore.exe 30 PID 2668 wrote to memory of 2684 2668 iexplore.exe 30 PID 2668 wrote to memory of 2684 2668 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0dda15c7cde8329948185d4bcc174ba4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd52dcf2ed43fce621519973d5a34709
SHA10c3dadcfe58ad86a722ec8bca029c0d92076af1f
SHA256c1556a026a943757b0c26403da3d8f7f0b4312338b78db712a28ecbf605947d8
SHA512ffba7be6518859d354c6d4d26fd86e2e9ff2fc8f875ababa51afa271095f60336b76f6cdc1bec59240c97aaad587f37ed2a797765e201b3193d1cd2704fda072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea18a34039d94334b470aeeccd24c284
SHA126e50295fcc395bd488e866978a4169337ad2615
SHA256ba00903e2a43e70ccdcad60c3880cf572c5e9c305f8407102941ae1629187848
SHA5122355c6bb188b08abb34f464d64e2898b6dcdf09ce1c3f500c538cecce65853401f23478c64efec0bdf9f346ebdccb00f38b6bf201f07ca5c298b90378a0a3f5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560a8405761ac258bd008da80450cf9e7
SHA1ef1c2c8384700d62eb3f59e3f10ca10a99f96cdf
SHA2563232df559800effd85f60329f47c4c526f389a62448b8f02f8f101e6ace66c48
SHA51260db3284521dcf387757700fcf46fc653bce41ff77fb8ec954757f15f3367b6ff0c0b34a36bf71b9fadc6afd161869379359cc2fd6d9897564b9f6592eea1b47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3af3f49af89dc48e9334f77e458074a
SHA142823e1fbbfefb8e7d63a87bc03a65d21efe25e0
SHA256add85b840f70b3f49696c0a103cb0184a21c9c5e6d90ff3b2fb2961637c3c120
SHA5121b7b52a8180c8d9e18286ca28bb8dae3cd7d2558c26d2baaaac39953933d9a4c2f15d57b23143cb83856a81c269b13b2242ca00176e1c83966f3603cc7ec4d75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f089021c40a79b9326a0e74a7fde2131
SHA1a66fda1b74df2e7e60c20d7afece494ae353a1cb
SHA256f010040a36df15049b470166ed34b05efc91f3f6f8d295a36324a7caa12ea454
SHA512d95514ace5abb70d9a37639b1426d0136289312a8f91252e8242ab8a62f45afbe3dac835796f81af2cbb9a7f7fdb041793cfbb81175ba9f04596014e94adb3f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50319b86947e278cf7270e7b6c00523c4
SHA17ccdc2d0a73c126019ee31e93406a4502a5eccd9
SHA25697cff3d6db530bb16623e29c1c0cc4612d51ed644610d688b38c262a17e4161f
SHA512887658250a5caf685628be1b639b35b0b20d7c9d8d1f86c304bfad34185d397b3462152737ea7677c4fd3a3f1a413d762149690ceed3b4eb58c7514a5cec823f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0ec64451c21632584786084653e8b0f
SHA19f3c19ee84228dcd38ac262f6131eaec4b844e17
SHA256073e04e493411fffc08e0451b5753350afe06b38e96cd59a8bfb2964a9e9b511
SHA512bf5484af5d7092b3e575bf56a223843b5fb0fb12c5b214e408aac06482a94d212ae14f634260a6cbf5046724475b175db50569d1a8bfc754155f9990eb38e843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5e533f31285b94d993a9f0dd4ed2d99
SHA14488c5cd24c6346715bd9089b31fe1120c5d825b
SHA256204a65494fb56e990896f46b0cba5c0eab615b1c089aeba13cc5d046542e404b
SHA51294fd2a964fb29d507dbb9b16f8f6aa1dac06dca0732d817db93cf176b7756fe2dbd28d2b5c6f01c6870935236b1974ce7f4c6012954601ab75d8691f6590657f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a53e1e3c7e50db5a334fb2589a06cfa
SHA18f17b5673181904aca4ae557d252a33601199c9d
SHA25626b0d91f237fd725c0abb37eb4b04cf713d46fc3e97cd585bd945641a4450d33
SHA5125b63191aa963584e7efc83f99d3d5e93748a6e958e42b513580cff0bffd0775241050e5fa072b8bd4b8f0d2c65e9d11c9ec52287c3c5d5fe41b5464b7c6ac3db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ffae4ce56b1f32182f340e725150f19
SHA15e9fae5737d5532d37de7e8d656a316c53baa59c
SHA2564767fde79c0d613736fc8ff2adae9e0bfc81bd92f32f28a43754647f6a426723
SHA51296331ff51c5a5890bb1d22fdc39edd99faca0b8d38a9360224efab32c96ed4ca0ee643c493196c5f7050fd1a4b0e53cb7a2baf1d23e1608c7e361ebbbe75d7de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582ba3f2ca06851aedeea392a281e220c
SHA1bff94be04088dfb37b3677aacfdb762c93948bbd
SHA256f96252a62ee19b9cad0ecf925c5c96b77f19f86885e9f0fd20d40fa5a15f8298
SHA512765c1c52f70b4503bb9c2e62c0364e3e6d651e712f9215f234008cd4c879dee328f8e27914b45ef2d7ebb98eea458b45a0101c520428832543cb78461a876298
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c736f74f67fe5459b316faecbdf2e0b1
SHA1517b25fbcf237eea1e755328d3367355486666fa
SHA2567ba3a9ca10ce827f38179631327c56c7349e908d4bf00cfaaa4c4d1230bbfb8c
SHA512915158c4aeae5ee07bcf6a6ba6c66a310bb8c98137acdc1c69c98b5b5dcf9766c7ffcfbcde1daf69c051a1a6959740e08c1cb72b99774cfd864e98b149405e01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8a356c325ff1110540b7e4ad46e8a0b
SHA11e4eb903c43c8efcc61ef83c6eb2edec087c9a53
SHA256dca80900483294b1879a0731934e969c31b3c5118636c5c01bc5bf02713b8dcf
SHA5125969d0d80d31a8ddc9893da6356cb376b9e6cd6b7d9df0a41fd05288f881e8176ada44a4a9b69700eca7fe4e3ad9296895849fd99bd2530596cfc5064659d174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dc20e8aff40ca8f706d044359eb34e1
SHA1e0abc500c1b4e8d5d2c3576f8a8458cf03adb3c2
SHA2567860d1396d0cc0595c5955274a36baf58ef647aaf233739fe476202b1a9959b6
SHA512437495c4e3fdd31532e29f963a2a725bd567084799a6e345bafa8e5b0d34fd12d8db2e8976aac2bd73626b59b1aa9c255e8977340a05006ffb6ffb0572c0f09b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd6eb94f464070c2348cdbe18aa5c3a6
SHA15c1de05268d0aae6b93712c671ce93134d36f458
SHA2567341ce862ddc6abe5f255fa0130c1ce02c24343302f0101ee80097dec2f1460c
SHA51237f1937057ebaa18a21a40530522cc7df0d8d8ce2f48babb5418a213dda8011c30fee8aa8fa1356ced811c66a5c7fa855e5e00af0e7d02c043b065634984ec48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5625cb9d522045171535d07fa257d5c8b
SHA154485ac7a9c4a21cba12e50c85dcecbb20ddba18
SHA25680006b0e1792c005b63973beb4ea5655bcdfec0239ebec0a67c9fd8a4670abdc
SHA512cc990b285ccf2657558723c2b63b1e20391bb5743b5a7d466a326e579b7bf3891cde0c426d1752d7b467f5a0e35e0ae5481c850ace2e9078fc64ed33b9341dc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c2e84748267ef9210f88184ab14d551
SHA17aff74dc5e6dc3c3241bb8ca70c4c2d20e753470
SHA256f5207c940bec2302d8ab8ff3849399b574fe2eb64f093adeb3b6699e87e86cc6
SHA51273425661061df9215c659ff27a5bac6dc4f59f780237462e7d7f65b80ee1257d41b4c7cd9089d74c50a5f0272c269d0f29dcec0d4e384ec98ddaa8cf5bebb8ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3723d5f4df6dc0dea97bb44fb972569
SHA19ba0d7afef6a80a74e75edfd911e7827e88304ec
SHA256b1f053ea8a5fb78ca95ef6c62b9aaae4d573ed90f6e71250e01b9db39a78254b
SHA512bc57c0c1c52a8a7b5edf6478c9755787192367eb6e1105540cc3c4cce4fc3ee40843f0203396144841c29d3f7112803e46dbc34e60f15573b62e601c4d946180
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c021d1d51d3ee43a024e6fc8916c379
SHA1a3ba6cf1a2a6f7b8ef5d3d028095acea08ef1720
SHA2565c017443d834474919a4ed77cf6d6ae8e80a349378e85486187eeeefd32a9869
SHA512c1790fdecd1524dc898e0bf1693f78a0d36d5e60ddef9282206b32c008f7dfa74d0a53800051e3c6dd568ef3c5f5b0bd2563bc7daa4f639a646985f67768859d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b