Analysis
-
max time kernel
139s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 05:49
Static task
static1
Behavioral task
behavioral1
Sample
0e380633525e8feffdccfbf7c1fc828d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0e380633525e8feffdccfbf7c1fc828d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0e380633525e8feffdccfbf7c1fc828d_JaffaCakes118.html
-
Size
21KB
-
MD5
0e380633525e8feffdccfbf7c1fc828d
-
SHA1
9980953eb7a9b6202bf08f3157e8a77b30a2773c
-
SHA256
9dd1bbc559382e79cd55cdd78e2a335a0bb797fab51d38468f036239a197fdbb
-
SHA512
362f01325899293588e93cd5822abce9eed183f685081719c2153cb64f874c26bdfbd55bcb3464abc35375e44a9559cb287679afa578a68b58dbe5bc5b8af461
-
SSDEEP
384:4+QfPFd9QZBC7mOdMwk+KfpC5IgSnbmFe7AcZc6k/8E1jYNPd:Zcd9QZBC7mOdMwSpC5I9nC4y6NPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434096465" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000735d7fc4c2ae17989d537293e6dbecec93f59740147987d75ddb69b1a9d3cfdf000000000e800000000200002000000006b8f78be535af635677f4ce35a0d0f33fcec99902187aca8305bdc30e17bda9200000001cf4bd2b6abe0f1ef03a23af0f63df076d756e3e3cdd727ca98a2a143c52f2c040000000a4d9ae3714f895c3c1c5220ca32f5e7d22d73385bcce80c37b1babe81530b0f41dd837b1ca5276589b85991a528d7581a5006acd1021d7b479fc69c90986c059 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00c4d1295815db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{52D1C441-814B-11EF-8D6F-62CAC36041A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2312 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2312 iexplore.exe 2312 iexplore.exe 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2300 2312 iexplore.exe 31 PID 2312 wrote to memory of 2300 2312 iexplore.exe 31 PID 2312 wrote to memory of 2300 2312 iexplore.exe 31 PID 2312 wrote to memory of 2300 2312 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e380633525e8feffdccfbf7c1fc828d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2312 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c62fb59d19d1464ee66ee5a2bf5bdfff
SHA1c82dca6e55dfd885f303f0bc15bc6af71b245ff5
SHA2566a22884913fd3f630403d5ba29adaf0d6244aabd5982acbc417d5d9e1babeb0d
SHA512f6c68760160d5c2e2bd6b94d3a9120edf7539d19c2a5c6de66da922d3c08186bae5d304c8d15200591954f22deb884a6c4e7a5ea301a0b39118fd220f6294c63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0c4f5c271cc6a0a130cdb44768d93b6
SHA1e654527d66fe5938f4401440d4903c87fa6a2c80
SHA256474f34c7435b21a9382e43d8c48ef64bb587f36d0f74c44f986e84ebbe2a0dd7
SHA5129c956093685de975875db6b7bc869e50aadb88d0d1d7bf660490d49fa4a0cfe7a6779d2492ddc17ea7347560ff43f9edda8456110c648a1ebe095120bdd831c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5630eba6b01e9bb24f710d1d7b8f1329a
SHA122ace27b11267d5e9477881e66da0b890765c1ef
SHA2560169ce352319fb044881d84d39c9397ab53ac435e8626bdb4050f94b92be28ba
SHA512b85749ed218bccd5ae3b744fed50d847fe6666338c6daa3e396f93d923fce9292b4749188e85d2ad5086ac40d2132eed572ee2983d35304224b4f010b0ed97a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9b6842858a23ffb82295e4f45036149
SHA1341ab55ff08a8a1d751e035f228090e35918c874
SHA25620c2fd33a9fe1c40e7f1bdc0ea4c34b7de672b1fa953da20baf397cf987b52d0
SHA512dca6427100012ab5a28e527e5aecdf669c7fe10d581f96124188c13f0b03d66760fa41e1e04830ac81b3198fbab7f5a0699b8b867eec237d936a0da9096c751e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b7fc67b54ac6766889f91933b482679
SHA1da1dcfa8360c8ee844e5976c0843d87bed0dd6e1
SHA256ec6a660f7a2dc4f30b37fb33ac3959aef7f7c20a6aa2b8242842a405df7a0a5e
SHA512b7e8396d7bf46ae47332fef286aa0193f68639e54505ec910ad4699e194e99f8370e8b0e3c64c724274b3bf408893752e4f500028b38574094173d7d938d0b19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1d86dcc669b239ea47988c91327edcd
SHA16a015ba8946da6146e9d0aeca579536c1eb7f6e4
SHA256792075cf753fcf2631e4a527424b886d83b03f82b679a422947301d162557c92
SHA512e87c7b9f060dd9265de7bc0871fe069cd20a47289c15e75b38df3425a72e08e18a3005cfc4e5be909843a872d95660987ecef3e9763a3acbbef3a8a73a260e69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e19a8c496ebeba0fae395b0b9a400579
SHA149ce59846f9998cce7beca64aed09c6756e0f887
SHA256f961ee6c6a8f4e278a0221ea710702ecf5d85132fb7437e2dc8d9dfccbb3b7c3
SHA512df9018527524ec2201af2900387ea2dcdab451245f923e9e97402c65a6d76e9058ddb94af4c53f28146f7aca96fed7a6158daef326877dd1d912dbcaedd87a5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515d9c7f1a50530af1844854485f4f961
SHA187ca3589cf7635c48e521b506b223be38f6a03bb
SHA25622391d593dadca2cdbc7cd4882b47bd01124bb11be6e350278f7d518e2c2f835
SHA512c1c31a1b7bc5585faf0995e07c4c7139aaf236f696916cf07ba93acc457a1e547c4e67f8ef1b80cdfb1252bfcefd32e514e1cdef5e65bf227f24331498f75ac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffa48b7b69d888bf5d439fd143217192
SHA1684206ad83df112834cf1e053668408fec5cde27
SHA2569f19f19ea8f11bfcd41ad512a1aa3bbbf8453f5a056ba41b076fd209c9d941be
SHA512271040ab3774034215f57080fd1487c163d1f8f78b8e2188c52729455d2223c8b37fb20a09661f148fa570dedd94dc909c3e5284e3ff1d0bc4b1f31e6f3c5035
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb3c8ea261077c81a1db00335aeda32e
SHA1a71aaf8b138660255d56d6c53eac83e5462aca7a
SHA256b70c8bc8d2348891119ce6ff19c02f63493c057b76696bfa384b9971a1ed3f9b
SHA512c45d18b7204e1f48c0b89de6ccd40f848892671bf6cb016036768cd8b5f4899b403b40a2eb1df8b8ff77c1a847ecedd47d2e87c334e39b524b8813800f4a5ed8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52633be8bf56ac396e9216654d57ced25
SHA103586a8640e41f7052abfac6426ff5ac64d243c0
SHA256a683fa77d16997ee3693fd199d4b3f1a492565efbc13eced3acd28f5737b1e69
SHA5126f1320c91d3798b9915916d0b22cef11555b6e2c51bf0efa163d4f242f772b36ecbf2d045a26f8ddfaff21aa17bfba598e8687f85791917fc524514779162d9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bfbc2880ee23806811d1850e8287327
SHA1f7bed5c81e7f2987dafc92ceb04e08dc1db8591c
SHA256bdc5676811f698fcdfdb28f1d59b5bf81a2df02c2e4a967db0c39ad58bcd2f0c
SHA512a361833cf1f8ec9f66b262cfef4a36c2134d04b2697e62b4e6493db84df4094404ac0cd8aad57be181974fa5855979d4c881f0901f69284092580b944f8befd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5155edcdbeaf4a13bd9fc6668711f252c
SHA1daac2d67f3a819c0a243d24804f06e6bbe5f63f3
SHA25699384bb3933686c69ea65e5bc55f64efd9c20e7f9250a80dccec85e442683772
SHA51213160a32860fe0cee6277bcb622d5c8d409d415693b6851acd02dd27a854093159e28d1376b6cca42c9513999f8a36840c887e5e4f546d776ab86db1b163d97c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8565d7526095748034f2e44c928c64f
SHA1253640ea2c32bab41ff8177eee6152d553eb18ca
SHA25671cbff2f236bf2c245f6baee05d29526b0cc3631fbb7c1d4a7cd47a2ea6713e7
SHA512dd61d43fb74d636e2ccd5ae77fc663c3ee6d37f72d2a799a0d2385f9adbe9e49f5b585a548d23204835efab401a51afbcd5eff3714b42a84935121683a17bcd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b246a1e027a3289d6f7600687335765d
SHA14a9bef54c3bbbac8e4db07cccf626428cac6536d
SHA25640ca64f29a1f2da3a5e6a665b1ae68fe4ba710b673e9d5ad5618eea4516a5755
SHA5123ff10eb0bfe6545ec9cf24a86527acdcdeea1a8c40888ba4daf45ad19bb04c00922a04f0d0d14f558806c025a786baf3659ecf08aea85f3474bd17fb2bd4def9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521ed5b8001fadae86b361e6e05fd21da
SHA1736276122ad5781192355bf2559181b9bb1c639f
SHA256f41904b9f487abc41bc38f07ca978ae35aa0f4c077e51892b49c99ce426249dc
SHA51285cb1b7323251cb55d445e7470d798507952588a63532f350d5c37e0c15a70c236004483fc2488bb5c1c284b7fd33c6cf5862bc84f9c70f273b17a191f71c124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6c6e0d6fb46d641883910cfaf16240c
SHA1ccd89c1d61b584e485e8e8ae91e0b696260c8029
SHA256585a8a90ce05157b0409c6b43c131f62eab396fbb6fe4c65a305ebab7ba5bcd3
SHA5124c1a0731e12fb7e14f94c957b531cabfb952c16cc0ce0f0871c29389b3635ff875ac42b6bf91426af4a6b6b71dce58f782a9786b758f9c1e63cf826bb9f7fd9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d8bbc47d7f4b3811df1ffd901910f45
SHA101aa007335e6c76529af38a7c638c377e77a5bcf
SHA256daec36955a027957da570e8f5cf557d812ca5ae63dd1616214acedd7ad6a55e1
SHA512909bd9a6265e9f165ed00e667c69f4256424b20a415d06f1e839519939786893e6dab8af1e2586f1dae135e6682b71583d389bf2ca5b10cfbbfd583a936e036b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b