Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 06:33
Static task
static1
Behavioral task
behavioral1
Sample
0e6177bbeb16a4cd1898114cff9af700_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0e6177bbeb16a4cd1898114cff9af700_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0e6177bbeb16a4cd1898114cff9af700_JaffaCakes118.html
-
Size
32KB
-
MD5
0e6177bbeb16a4cd1898114cff9af700
-
SHA1
aab3b5d1c531f35ad3edea0a40cbb16d65b5d726
-
SHA256
f99eae5c98a5e89abd24f240e5f1a27e1537c9ba2ce5152cf80fa52783ca074b
-
SHA512
34cb1b035d35a601c2ffb3862d0c712c962ef5042cec92be4d4bd2602d0c3638a84adab9547c1a4724f462c4cabdcb58341198d7d572dfb39107bf115eecaa22
-
SSDEEP
384:PKnpC5IgSnbmFe7AcyfTQevnEYfnCd8UHhybgFlM9Eus:4pC5I9nC4GEM08UHhybgFlM9Eh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000c5086c64ee29cb8c1db250155f74bd133572ece2ca2ca105b2e5efa2569fb971000000000e8000000002000020000000d1e9a9e2bec929eb5a9e158363e118da2c030fc64c08bb1064ec8f561a6001f0200000009ad3cf6d6b86a8c08bfefdd2bae0fe1dbd76f4ce06b82fc5cd9b158e8d2b5b244000000098969ee4e46f3ba2f4de3782548243f9ec0b0068bc839d3809d03fffd642bbc9a5584305bbecf3e88a521812b48479d014ba1deb2d6947078eaec141a7dc5ba9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434099099" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{725B9F61-8151-11EF-988C-4E66A3E0FBF8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 606f6b4c5e15db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2916 iexplore.exe 2916 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2704 2916 iexplore.exe 30 PID 2916 wrote to memory of 2704 2916 iexplore.exe 30 PID 2916 wrote to memory of 2704 2916 iexplore.exe 30 PID 2916 wrote to memory of 2704 2916 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e6177bbeb16a4cd1898114cff9af700_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5c6fc6611fc26b783c0094b8810779acb
SHA1e86794cd6e8a1f56db3fe3f7638e4d2852633f08
SHA256974f24e89a6088360c061f5939e9a77b7f4be7f729f7f74d793d697c31d8c2ae
SHA512df8e8c0c6e225992e1451fda210bcc08ef8f8999be9fad1326a3a678012d2685c30cf594ff2f0b0692a99c71265e18c4a339e0031a4951c525d2b6977f36609a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5444872b29d4da8108e9d24a7c322eaa0
SHA1fd873547153a786eb4bc670ba81052e2554eb575
SHA25618711f17bf301d5067df96cb0557ba80e8cd036fd4e71c54af9878127fb320a7
SHA512efcc83ead6b652ac1a0aafba1bf6cf56e93d845117101e2cc296bac3033a428b18222ffd01e7c5242fbb85f5990993f07b70a59af97c6721d5ea0146d7976bae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d1b484843a1e0f37d08ca832bc340c5
SHA1a39d6b33aef7d99ecb5c98403f13316c704b4f7d
SHA256f62185481d01309d34f3f99c7126ddd9056bfdc3523ffc6848bd36685ba74669
SHA51236a93f4925a67b84f9bed961adb7ddcca84ce38c028b86852cdab0cd0609ee1120168483664cdcd566db7b4e5dd5e93fe58876e14474904fa7f30b449c085386
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e588625b7a36b92c6e9a8332e657eba
SHA10e408614a1e4b601b2fd9d323a483eaf33912e8e
SHA256ce40346c987f639207baa8c4dfe5a72f7196185828cbbb6e704131403fbb314a
SHA512fd96f02bc75fa3e38dffb43d5f587175f15f7639f1c2258f2925f1f8f5a95ac254c6ccc9ac172c7f8d45c58cd37c82f65b2f342ce4ca54004f1a5672c40b73d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581783efa735fd3996460b2d612289f6a
SHA153debf5e6700998f166e358f2caa6fb8e0fa29fe
SHA2563deae276e3ff1a930e2f5e644f6b4d61fd0f6aade4d3556d8efbd1e3243e4fb6
SHA512303b75ea5c8913c24da0179f03a5565394b1a5c859317fe652867213fd7b41f0af73d18aa93bdb07aa9ee87d3651e18f36f7d46b586980302373a379e6f61f11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2416e4904d49a22b27884d580d3e429
SHA1b6ca92b845e3d91d1c35915a4f7357f9c369147f
SHA256d2c4077a6f45340296bbac5dd6a726477e6a5b04855ad8158decd59c59f6e018
SHA512b897907fa7df80de94bbf08af19142b780a346072bbad3c5698376a759ecf0162d6f5a1f0703ae0bbfea2d8cc1eba9315686b5053f2f4755c3d7619dd0abf98a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56080217498feb351dc578863788a173d
SHA102b05fc2846d10c064f3b1d1344a833aabb7dd04
SHA256b6104c0bf317e02175018cfa10036510687ada27c886a36be620ce370ff32d6b
SHA5126a70735b66cac03a7b85250cf87a3f5588906d055508add6c7753dd7572aced96c942b1aabaedc532033111c38fccc961a6eaacd03f7e2053e4cacb97abc2817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ef999d8596d145674f095052aeb63e9
SHA194cf0ef8b6c6df3acb9418856b48f1aae513c129
SHA256a6cf01f679915eca735ad398ce0c3e1d28f190c88d2409bb6d40f5ab93518314
SHA51245608e1276d6fdf324567bb04eedb6af21ca552fd3a2ad9d7e66d3d53f2694b42d7d23079f32e4bc658476983901cb921c4f845c712dbdeb23671dcd201dbba6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b11085748f688c4353863ebdd8907b2
SHA165052a89683897e046f7b65da20d564d20917508
SHA256bd71865d8f2a006e2d4e4d7710a3a865a13ee760cc232803b7ed26277a835938
SHA512acd360aea1bd1b9dc18a7cc194ece331d915e5a3ef73323ac16c10eb690bd64de9e5261650eba15e7f19edc425f3f7dfc3eda2cfbff164b8d04d35f21d331d03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584b24f5f3ad13d148d0d6d3ebb02656f
SHA172796e82d2cd192b30b4ebf2d05a9d351ee3522b
SHA2564b2f3462b36540a64f688dcc2c4b49022d778a13b3e5ed7258c6cbc09e0537e2
SHA512842f8a28455e19db1c3f0cc90d353d2ad83fd7f898dbf41f8edca2ecb7eba7e2485eb06c0ab1c663f505d93aefdcc7d3dc5eba411fdcc614915d1eae78dfa618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f431b6b62d75bb79b10412a762cdbd0
SHA1275addebf315ff605e674f4c89bac78eb90ac694
SHA2569c9cb1666487ae62a588565cada21428cc430ef32061aedb24b6f6d99673d3c7
SHA512520f2a9ca6917acc77cdc5ca3e01c79443ed49034a4acfc656fb7683e8cce41285c0f6d2ebb1861980c1f9c1ceae1ff580d67a9d3723e392caca1bce11c61740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5999b39e90adc3359c3ecccac1acb608f
SHA1e41e169232298bf179add1012720985bcff093ea
SHA25674de81d6dc68692285023dc09ac051c69201b383a34ca1c59e4c98826048f381
SHA512ea5a83949ed066ddbd81d240b1c3a768eaa40a82de8a14612f11ad14ad520eff705156ce094dfdfcf9c804738e30192acd3d5ffcab4613a0cfae7eb3831f4088
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e10d4bb349d0647c618ca349f53b049
SHA149622e55ae3dc9ff1e81dd020bb44ba0c8a7699e
SHA2560a93935addc03ccdd84f41ca6dd7e2bc1943521ea33f6c5cf176d83fc2389c3a
SHA5126c36c2982e6a4f6dd26523794302e89766d8921436b99fa5669cd91289f149be0f5718b0f853503302594d5f3d4f6a3fea4ec4dbc4a2333084cccab4249cf955
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f2d03b515693c8c3f48d90da5bb8aa7
SHA132a9b83ca1fdcea279bb23964062169588783c4f
SHA256a68a3108c428d9ee69d82bb8531ac13e469c2766165c22b14ec7b4ef1f0e2b81
SHA512bd4037934d46e3ddbebaec6d92631c1d6967e21a8cc579df339c284c93c072521fed352947ac5c5538fb95a77f6d91640e6794b65a9e783f7ea88792e6f9a9b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD512d5c8b7d704c5febee35470ce4e43c6
SHA13828cc88244c128756a40b1da898c5f4ff011b4e
SHA2567cfae18b458a0786adc0fb0a00052095736b46eaf394804bc15ef40779220df9
SHA512e0b74d4c82d634f5022f64ac52ebbbe1f2cb0873543ba18bed10348a34ef2ad57a3d53a962f3a880393dfc90c47d22a9569f5f365c90228a7572ce2356eb934b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD56d0e4149840607e735896676a343e3d9
SHA1398609292bd4ce8b81f39f53da96a5cf03c62fc6
SHA256fde056b72f4f2498e2baff01722cf87668d6cf3a57adc4c5ad3030c7def391c8
SHA5121d82a338558a57e36765ed6f38d46ed7dd75fc1d5f3b470f9a3fbdbaf6084eb5d170970e269fac5fc79a380066894a9c12543e0b9e5923f8ee2cd276fc7bb470
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b