Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 07:07
Static task
static1
Behavioral task
behavioral1
Sample
0e82102fc562c92bb91a7bc4ddde33ab_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0e82102fc562c92bb91a7bc4ddde33ab_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0e82102fc562c92bb91a7bc4ddde33ab_JaffaCakes118.html
-
Size
139KB
-
MD5
0e82102fc562c92bb91a7bc4ddde33ab
-
SHA1
c070ac470e950940dcfb20388d9f6cfb7af9b347
-
SHA256
bb72426ff0ceeb1f42c010002c2dac4770aa608bf2c7d163fa383918b766cd45
-
SHA512
5137681583bdcee6c1a06fe2984cc3ff7ad3756e7e15a0fb0191e810f75693916af2c5e65a56ea5ffa599eb404d45d4943453a435b4d5c8742fc8d35beee9c80
-
SSDEEP
1536:SHNyzRJxHgyeA8+gG7l8SyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wd:SHqg9SyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{28335CC1-8156-11EF-B0EB-7699BFC84B14} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000f2f8fcead3a02242ae158452e5db5ff40000000002000000000010660000000100002000000040eb63c62e2058bb4655979e71009d4cf533da8433b5d4646384477896544f7f000000000e8000000002000020000000866c04d11e5788ff7fba6677fd925cea83e425f910e3a9398947a85428e7b8e7200000005c94f59e78f548470af6b8e0bdba68a34c74574f065175b2d9ca379dc9d01f3f40000000efbfe8f0e0244e37d1061fe9fea6076024d489c591e16fc1ef9b86d408c7eccda245c8207fce4b970fb3c3606c84a9b6099ce7b4388ed144ebadc9947750ca80 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 403c39406315db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434101119" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2256 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2256 iexplore.exe 2256 iexplore.exe 1488 IEXPLORE.EXE 1488 IEXPLORE.EXE 1488 IEXPLORE.EXE 1488 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 1488 2256 iexplore.exe 28 PID 2256 wrote to memory of 1488 2256 iexplore.exe 28 PID 2256 wrote to memory of 1488 2256 iexplore.exe 28 PID 2256 wrote to memory of 1488 2256 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e82102fc562c92bb91a7bc4ddde33ab_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2256 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541f2c2e682d530d391828fa5b57ecc71
SHA1d0f030d2558905eee3be5e51d516186e5cb81c7e
SHA25685b160730dc4412b041856040b3f64d0dceded83b38fcccc99876ea5cf63b267
SHA512c2bcf4facb5f9100b7ad0d533a29fe81fc4f01b761013f8b48c42fa015cd993d0ff6a14d1db3cc2dd2e5aeae8552b84e7071f740990b3ab09c0d2fd7cf0818ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5002ff596dd3bca51878a46b64dba9625
SHA1eb10bffbd4d9266c09f38ae31c291f5e528b80b3
SHA256d0ab8b9c7a08ebfdecf63be396855d46bb2cd1462d3e667203dca6b59387d102
SHA5129583ce3c2a9f433d08390874748929eac869a4de7b06b11aefcd8be581e3a856590fe7928fec8cb73bbbf483ad2f3eed7b277ebe28b16cf626fd1d59d9e6ffea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1cd476d89c4cf7ec8448bb364538795
SHA1ae5b5b07ec7824d49845b9cd581d99e0b6d7a7bf
SHA25649c4d9c2f8f14a05cd403db357c3f2ca801ec65e9b9c427cdfcc165517063dfb
SHA512cee125836af6e7fcd58697ed3264097d1781e4511cfb6eba237acd9f4f2352f85b37250d5122a41120ae3f9475264d8eacb2b145a5e1717c0e2448f31cd8eda4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e03d1bbd479128ebf7fcf994bfedfaa8
SHA1e90dc60a01c484707e8e5ba7acb089c6f07eb0fe
SHA25671acb377ec31f23314e1727c9a2c8ad9cedf99ddc33f091d2e9929086ad692ce
SHA51200346e258e3d29bdf901c15de10fcd4c681a3818f856cd95c98f4819144dfc5a410d4ba1af1225859e83e096451e08315284d8b464e3201219822ea9012cf47a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e0b6fd7f0cb59150f8f060f5bac3a59
SHA188f8f4ff3cecc890395adfae2a78940bd9984f46
SHA25679e581084ebc30804441e98777981f5cb466b1e2019c0a8936fb4f4e212d10b2
SHA51293768fed2a87b02a1e90cfedb132ff12c51789768f66413cdad3fc93ab1ee3229a7ae51bfcb9df7ce3460abac97471751a952ef0cc2255780a7904f1578af731
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514d8944c61c88a952ae5a98c913bb875
SHA1681433b5b05e448f48d50b4acc593bd873ba1290
SHA25678d570d7b22858acc8cc031290c43b06d799fa90bcdddd3ee25155948e2a4508
SHA512647e7c39e70b7caa8761499fd28f841b79eec7dbed9881d89a4fec51f263663b75dbc047595944b4c9fe4385a64c490678d782559db206c4ddcf1c4ced75ae0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f6c419e6af6f785a791aa089b369883
SHA1745772811ef46dd60b2527080177380c9908ef16
SHA25642c1bcc28da7708c56d060425b5d78e156536e7efcb33e0b1f1f8f7db8f5a4d0
SHA51268e2064acd06795b2f9bce76ef6c1f88b8f037516c4e534deb05f205efe66d47b75c535763eeb41bef35ab56c073461b84889f1dbf3d21e886533889e27e3c88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e65726da2a083b1244112381ad1649ca
SHA17b11ad8bf61c739a2bb6b12f46e1473ac42dba7b
SHA256c983c645b12b4672af88f5ad6c69a9889b98cf350c14c94e446f1d4b68f9e3fc
SHA512417bc5edb7c959050b2af2f51c2d7bda9fc0e70d25e49803d5b4e6ed4022b442437dc334487f9951cd99aa17137b4aded7191e191858fc94c7673d7daf61de5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5663c9c6f54801b8bbc917cb55bfcfe99
SHA173bb960ea2a8ac842216c4b51c6c917fb32ec333
SHA25664e44a758c5e8b622435e806354c4bb2b70619bbf0bbd7cdd43794c39abd3f3b
SHA512a9c735243fc10361f7aef88eedc4b1bd63b437a93360764fec765c1ef7863ec83e58128853242374e3dbf20fb6dd1d65f126b546b86afeef478a255993f2aaee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab1deada760ce499f273d4859d007566
SHA1c1a212ea08d0d3e8a985212690584754522d3ebc
SHA256f78a3041dd6bf85695382d000c181124e49ada7c95671fe299d3df2f8d946b5f
SHA512c0d95b0a4dacf02aba8635a75eab05e7ddb4f16c2f79e23f357ae07f58a858f1e92f445b7e1d79ffd343ade08f05f45d826aab0a67bbc16c0b897a4a5b6e0b8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b4e6a110d9f5abd2c5668273eade2cf
SHA10c97b8803d0688cde5a34535e8c500f928c6e1cf
SHA256732d7f78399742f75d9a291f71b777a220e5d71371f683b0907a77c23005bafa
SHA5128853e7846dc5ff8af8884cedbf557695b3bc76dd789afc29356743d4eb6bb354a9a503a04a7b4406f93db8f74d3bc4848ca664cdda3f8dadcdab76f0f929a7d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8d1d6708298fa6ea2b3651f75a2ebe4
SHA165448ddc3b079e06e700c626b26d403021354ccc
SHA2566710c8f21b5878e826a79e477acdb443d0deb6febc4f3d604c1ad6fe031a5259
SHA512799e2417fe9cc33174adb274b600d0b37b7463841ce242fa02c278370050e510e6f65368cef3e710b8cf908065141bf924a34cc0c7222680000e589a58d9789f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6a0d279bdcf1ec3a2a60d21c68b5abe
SHA13a8b3e2ecc747721fd36344b4e0f60f8139e01af
SHA25603bb38ac483242a9e8ef745819a1b3bc4d5b8a8144b25658dc6f207b76740b8a
SHA512b22aca7576a85ee1bca6d34b6f1484d54c1915cfa3b74fa44a684bd9429b6cd9d12615f032943ee3ab39960fc82b8cb8556640113f82d70508508580a88a8521
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543a951ecf433d467d091fbe01abe1622
SHA18f5e8bfebc47344393c1fb0979452c8f958a1301
SHA25686c0eb73f7f30e3093d9c7ec2ee5a74ff1bab20e488dd7f80b3e1eb6e8bbdd19
SHA512e845f748cea6a88f5acada4f3fca691e4ae58938810e0281920c4f39c9fcf27f25b166fcc5643005893d3ce6e1839fa6c73d9b52d967a9d263acd170be46d14f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582279852758d521be495eb758cdc68dd
SHA17ac6adce2227492d8b6643c437bc391c5b2e913f
SHA2562e2369bd11256bff176f3f2e89e7a321375a8020d13455ed1a0b6b6a328e0046
SHA512b97d1d83a76f9e437e8f2e262ecd78d7a502c512982bb948da0e23b4ebef288b7594c4e654befa9662c2cf3ab21dca798841459753b05c7951ca022ad9427a3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe77cb7dcaba97506903e3edcfc74c0d
SHA183c6530eea202df648fc8cca26646f0118097ecc
SHA2567f3b9a39cea99bc7ad7908505b3e7f93ff11a50ef81d08d4c637e3865b0a2ebd
SHA51200d411f04195ff57416e0a746577ed543e07b4578d55afc56537034d124924a5d59a2c29f876009935bf1b1f620c62f8b1d69a9646188329a055d22bc3cd2c4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afa46aac9042da299e005f09019d1a54
SHA117f99448116f8b9f98ddce09b9e3cf17fbb636a9
SHA2563ec7063131ffdc5c517e3a754ab5eb6a418655e019bc87971e1d0ec25e3b310b
SHA512db0f3cea173faab423f829b594711c6357be5c2446da8c7a4502f8b5f0ee9009cf4e90384c349c43b321c2a185f12396d644e7cd8b56fc17f780539a5f93b3c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cada8d8b2d7badaf1f63eb4812c9e215
SHA127fa3e3b7cbdc900eec98e10881e4b3d249b16b9
SHA256767d31de68d400a95e6fa3f82076b8d5d424c21634bce8bc841a70bc77800929
SHA5122255e0396c9482aad09fa206d27e93c7a2aed46ab23f1f75435a3f6f461bef26451003fb6549bbbba566f3402209337db58edc3fbf1475260f9638558dcbf81d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b