Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 04:51
Static task
static1
Behavioral task
behavioral1
Sample
0e00a24bc6b2d3b44a581e25339c3c80_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0e00a24bc6b2d3b44a581e25339c3c80_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0e00a24bc6b2d3b44a581e25339c3c80_JaffaCakes118.html
-
Size
4KB
-
MD5
0e00a24bc6b2d3b44a581e25339c3c80
-
SHA1
e319892dc03b90e2628726eebcaac0609fcaf33e
-
SHA256
d6b2f62bd0e93b883b0ddb375eb8d4d0faab52a4027bbaaab72390a785c7757c
-
SHA512
cda5cedd597fe2a8cd6726188b50b05766ce346e529cde6572fb3ea587713f943eea713fecb5d9ee6e4ac69c7c875566596b329387deae27f3fecccb42647784
-
SSDEEP
96:1xd9hwVPcoGg/j5yntxI8vq/5K/u04Xz6Qpy/:7dbwWo1/j5sxI8vE4/uPD14
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434092949" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40db48fa4f15db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{227B7191-8143-11EF-AC30-EA7747D117E6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000e1c018f91298c88a492e0709036bad1af2c9976db7094c6f6d30fe29b1b01b43000000000e80000000020000200000004d3841e02a70986d2d146222b37d0299a249d0bb715575db3c14ebbfe5241ec22000000051546ab6b6ec703e3c02e96c17870d07983ab476dcf79250de992cd70e7781d140000000ef2b2b30c78168168eef9cda9dbf41618708d68a8d628faa552b580868175df15d4beaa742d47f6bf5b1ca8ec330311596d5380443472824243f99ae8c08bd7a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000004889af0c50277de5cd7a76109ccaded4febdc8ede3ec5e2944396328e4059f29000000000e8000000002000020000000d75846a216c6c18eaf38114cc2d61a493ee2d00731b995719a8a246c28e8ce4f900000005130fc61dca75637c047c9cebf7f98fb2c255d00f5612969b06719e12bb88931ff976ed08bdcecb70048712a9fb09630237104395f828bf8bacdf9f50ec10a36124432cf7d9c78f0de7930282d300d345e728a153ea3f3dc4716fb03f89d56d169123b940050fba5695afc53a862933896cc1ce342a0ef13b70511f0abba753d6962a03ffcacceb88409b969f17d9b99400000007e6212a3a056017d0159883a3ad38282d82ab0c40ddb49958860b493a7d0efc99c261176350937d78b21725a8ee508845cb7523590acbe3f67fd55ad7145f11a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2892 2980 iexplore.exe 30 PID 2980 wrote to memory of 2892 2980 iexplore.exe 30 PID 2980 wrote to memory of 2892 2980 iexplore.exe 30 PID 2980 wrote to memory of 2892 2980 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e00a24bc6b2d3b44a581e25339c3c80_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57863ef915fcf57988c3b96dfe86d2c03
SHA12e8b19114edfe0f643d9a3191815dad07bc07578
SHA2564311483ace07f9841ee06dcebfdabfb5c6d58761f40a7266f9178551834bf121
SHA512c665bd5722c72191d870125d518cfda02475b082d49507217aec6ddd044a52e70e3b93316161b5ae08093586ce4dcdf24806590fab646710a1f09d0d5e9b1656
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a248b75ce1fab49cd1bc26e47ad0ad1c
SHA1b313689502cb92f4b9cd3d23a671132928b3515e
SHA25662f74ea74ba157afa090839de6372d55e780785cde3bcc25e3bd777acccee378
SHA5126deae23434bd082633e4c1a778c91319a492f7f5152a405c326deab44ed14c7646a978541e04a82c57947ca6e4a4ce70a533b05170ea1780552b81de1032b40b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577587cdce6ca8f6c523c574ed4081ab7
SHA1bc90c2e47009f01a11aca831be012638285b711a
SHA25623d9917000d474fcf6774daba7aafb17a1dc800656969f115228d2c237f9cb64
SHA512f543beb01a30cb6756e099f9e871bc4e97774a33a8366ca4cf4bd3ec9dfaaf39570480f4c470ce6ff648a06320243130fb9dd0985aad716494089e3f6d7e9640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553cda458029f32b96196b41ce4686ada
SHA10339e86af2dbc709063c277e8abba35e9286ce7c
SHA256b86dc1c92ce70a9e3e05dc83171ba3462c108f7e39663fca15bb66d1a298cfc1
SHA512f32092911fe3bc69b0ac3231c51eb809cf4c07227243fff1de8dcf5ab9c8b288fc44782fb12e948adc9460f900891c4a4c520ac7a8a5f0e3b341795db0dfc1f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc51a7340e151e86d353e9a2dba6c7fa
SHA1ad462cb822b89c94a9fc69a780d557bcd2ceb282
SHA25693fd61acc29ee4474d0101d3259384441a36514df67e3796e96593f63c31b76a
SHA512f931ad9ff1a44a3281b02c4faa5b40ee2371f4bca6a4469fe3d3ad61dc6feb74c374ed42d97d8b876fc7c4077ae352a064041be8576abd108cd19440d6d3e7b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536e736c673c42a678b9db32225944453
SHA13b41afe7a7ba6c5d7c50762c6b6992216994ad07
SHA256a2ce4315cc89a3508a0f35e42891c7ad8cc722bc814593b44748e889ffdb1685
SHA5128b309cf62dec00ed57b63dfe05877d8e8cb549586617dc3088c1163a3c368839a6c4c1a119575d701ff996ec7e79bcd12985caca53875fe96d2abc8aafe4b10f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dcdf06c2afc36eb51b9c83b9ad310e4
SHA13e0eda8c8d4c2a6a6f1f80cfa99052386d17fd93
SHA2565e4a90ae5eb3995d8e75965bb701081255fcbc4199b6233d39c1016c09f0088a
SHA512039c990854bad1fd0eb118bf38ae95d212e279852a9e4b9cf2933fe1c41395b1f8459af52e22fe36cd2abb038a7a30d9982c1464ee936d51573d48a50fd3163d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508ee3037f1cdcda93bb75bac4921bdc5
SHA18e5996a9adfdbbbe459641823095879cf145f7cd
SHA256e3d25bdac09cd2f87c6734c6e2cefb7608f7ddce61d804a45964e84261ecf86e
SHA51232f02cdcdb58e724c3ebdc452cd6bfe62576034d7246649ad1295e42857f60946aa3d24e50f57d0f1f56fdfad3af70db62be28f776c09920d0905bfe12442184
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0a4e644db52eaf134600fea54a8ff41
SHA113348b29958efb8e64f068c89cbfc5420bc97e97
SHA256cecd82f5d426393a7f7dff13bf35b82dc8a2086131a14254793062ec6e8bc6e6
SHA5122b08181f0827461c01a651895cab7ce7e91ee2dbaaa4f36730d458808a3232bd8769204556f8bf9fb27dec48d92c20947c3330459366cdc2eed50ef9625d42f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d29d260d416cc14248d44b932a339c33
SHA1e61d815d728fd32bf77544f56da7dcac81c3f1c0
SHA2566d742e9c51413df9b68199ef75214e235496b0ea99801c481001ee1d3b87cc2a
SHA512e81b71cbc593af3debae33b046d1a6ab46bb34229048310ce27c03f04a91a4bd48a3340818e75a25da04b6fbde3c48ff7ad42376ba2692b478003bcd9771b8db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59906e6029b2929f46c994107c21d43b4
SHA1f6474e8ef6e222bb17fbc3bad32f99a153f2923d
SHA256987f9413245aad7794850383856a463115a0fe5c9bb08a2d9eb237ce410939cc
SHA5126ad2ab04ced9bf9dfc573d4a59038105de91998d81a9adc4d1d8cee3bbda4cf62fa76abdbe7b845dfea363d048fe9c2f58a1b1b1dd2051dd7bfc49aaf0b1be20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536232da08ea7019c020e58cba45114bc
SHA1dbf9c947ad251a45fa692c6f16048a211b1a41f3
SHA2561e8586704ba24bee6fafe04a3c24f84da121aa9304e8289e74fb07c375da3989
SHA512f286b8d4b0224f6485b399f675d6f49c2b46c532271052f7cf12baa5855642418ee4daac7f9e634b1ebee8d6ebd1150b41e9855e65f18eb2a4ba0b677e5053ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bfa3269364a9e39dcb063d4e402cc44
SHA1655bada0df5aaa8139bba8c5e5c140a24760b991
SHA2565bbc1222a1c4f499f0b845c43c6f86a4b5fb62ff73d3ac2f546cb2dc1e65a27b
SHA51225754d8006a154551c92c8a4120caa08be737433c44fa0feb9aa1c8ca91933aa55a84c85da566b0edf5930332884795c1bfccd29156dd4f6373d259b0754318c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa97d0fa3f6da6ffeabb6693456ca759
SHA153b21fb353d7e0f83e84aa88701ebedc4470d701
SHA256c3ab020cddb5ef4db55fefbf8edae6d1909405ec0f32c7e3a913e85a3f0a693d
SHA512982d77c925b995620a4ad0c829a59b5f11af1ba9b4e851ab2374484e99ebe2821a135bb9449f45f2b9f5ec69b932de481e762a90a729426a33c9767fca00c3bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe1ed677f4f247f91df34f785866c70f
SHA1989f7b1a5a5d5fa6d58a51a3e39fbc5d7c1b7b2f
SHA256dc234d9b044ee484addd065a3f54692510af46aa08ba7fe91a00ae80bfcf4e39
SHA51251d59c7111833f4e4903a5c5d2704e82d585a2729ea78ded21a28df330af1ae54cef26978292a3e78d4d3cdf77b0160474f70d25e86cb69117746b8ce6f893c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f23e90df9f455e01dc68de2c4b4cbe90
SHA17f6af7d4eecf94039555807f4efad122a9405db5
SHA256c30a0dc2d5efa336c70397a4f5b53e8a7d558609d4c6768e96855999b6fd4de8
SHA5127b66fe84b2be56e962aafad1a34fe8eb9bc967d52857b097e19c771e4a11bd3a04e5a0be7d99d5ad1be02e3261e46967a71af2b8ae1fefc81ad10c4dc19dfbe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a141d497a2706f3c2f9af4bd4f07083
SHA1ef350ad1d8cd89a680c85e789fa367efbd970963
SHA256beb7b6ba511045285ace8b1aa79abc77248adb250fe9be1c3463c0c434c2e502
SHA512abd20a4fec091cd07127d8aa78e793575fa31d7dc9623fc34a6b6733243a1e94e519fdc9fc30aa91704716eca7b0328539423128d46b72ab53ec8b3ee76c3ff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e742b8366e5bac765465c4472c5f7d7
SHA1e1da6bdf4ca7209ad57826990ea204fbb8bff0ae
SHA256ba94c79fc68500d1cd692323dae58ff78651aea4cb1c461468be97cf738fb9ae
SHA512bd362a080baf97efa3d738cfdddfeddecc978cf63bfeed7d85a88da796348becf2e5d2d8276e7df8b8f2c328e198ec824bc239ace91491d772bfc864f9070a4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4f376bcfee103053c66827ce863f73e
SHA1621d8f5b9d0eaf554cf83f0643787c9061387dd6
SHA256405b3d8783f01f98ebad4ed6990fe42a209bc17470529ee2805c614c56b0eb0a
SHA512d0dfb004c4d56132acec3fb200130f361f6122d72a68ed76b7974b6828d4da7c346e14cb3055e805de8a88102aad2f37cbc776a666706e6bc0fb50296075f578
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b