Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 08:14
Static task
static1
Behavioral task
behavioral1
Sample
0ebc50ab255bd8a9c5f9fcf15413c283_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0ebc50ab255bd8a9c5f9fcf15413c283_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0ebc50ab255bd8a9c5f9fcf15413c283_JaffaCakes118.html
-
Size
49KB
-
MD5
0ebc50ab255bd8a9c5f9fcf15413c283
-
SHA1
b6d692960ee7dc0682bb108c98b17b5895d786fb
-
SHA256
d3a6b343de8692bc2cc0b439dc77559a0d22eb6e4bc82c5671560bda92f03c89
-
SHA512
2adcd2b95c47252355dc6d5864f3a843bfc0819e8b032ee5cb31489748f453862042438160ec685831aa0d8128fc837dc0d79b48a1ee9daa6183a9166d89a764
-
SSDEEP
384:Te9Omq/lGW+nCqScXXDEROeDQXkAHJiOkxT18ehhynylDU22ypT8nP0QAtL:Te9Oz9KCqjAknXkGiOKLhfpT8nMQeL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000022a74312f66095d1cce474575ebcb6b4ef4e7e81e70c5cab9ed2620c945fcfb2000000000e8000000002000020000000a0869b77c68346d2cb257702eb61a96bec798e142e5938aa19fb5c717c845c8e20000000da54aec9960114bc24e8a2eb6aa79dc35e2324373cb9bd580bce2e17c5fe6a21400000005467f4c7c83ff7c4f32471c2d37e0639022c4da001c7031ff8b63a445023f4b52572207a03e3c89517d6aa83071941780397115239adbed449ee2da54cc81b98 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6019ab4a6c15db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{73988BA1-815F-11EF-A207-6A2ECC9B5790} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434105111" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000006e77e0b225f8323e02056ae46e491f8b60a54b3f1c50fdf6b7781818af1824e2000000000e8000000002000020000000ba65ee0720414117b9f649a0ab9e69cdd0bbc9ea9ff6519e74c422886ccbaac790000000c95e300dd653eb6034991e2c19e1643d326b7b3a73118151ec60c2f0c13df9dfe1d36f5dddc7c52f19d4aedde45280c956d8b045b94085faefd8545ecf1348c31cdd9fe36cf24212a3c2c1fd5534b4baa3e010f86118a0078d26ae52a1e43d3b971452fbb54897c54b4da690a8d0588f2119c71b2d49c7ae234694e84ee3fc2d3a8fc649d574038c2fc7d09110aadb92400000009c96a07c64da19b4580abd05c02926a7a06f1c0ed53f018c1ed957544b96720a5ef4706ea6058ed09d8367d6d711f0c92828721ad264b694a4d3534d188a9e40 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2360 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2360 iexplore.exe 2360 iexplore.exe 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE 2516 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2516 2360 iexplore.exe 30 PID 2360 wrote to memory of 2516 2360 iexplore.exe 30 PID 2360 wrote to memory of 2516 2360 iexplore.exe 30 PID 2360 wrote to memory of 2516 2360 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0ebc50ab255bd8a9c5f9fcf15413c283_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2360 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b609d42194644143e00e516ffebf37e0
SHA1315752afbc4fa0e943aec2c48661ade47ff63d11
SHA256eb6ee3ade764992ea60acc9368edbff52a1984f3fc8213c24af35c0b1b732062
SHA5121969c0d4b92ec80e2030cd0e08dfd50ab292b31c36465c373b8d4df9f6792d4fc687b67c93e484fa4623627e35342bbc2d52b337e565f52108834331fe6ce72d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574328a4178ee274d2745782d11a5d5de
SHA1511fd48c8361c7a3503d90194595b2de9af1bd7c
SHA256225b145e7865f2cf355401524b87085c5b777bb59d28e5990d1b284f2971a9ee
SHA5128a65759735ea2e095c633b35f7d7c32b7dfc0798c2f841e2c87b407c7d84d885d83bbca0e9533577d5ee8b46c094740932f9f5abb5cd69cbc72a5d9bcf419bff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe6c52a9b5432640f83aa75e5374fbf8
SHA19738747bd99cf9c41dbecd864f81fbf97b57f4fd
SHA256cf44a191e1265d2d4816638b3cb023dbd9e99bfa2d3341fd88cf52d397a3fc27
SHA512adc48e13ba3d07dba7c247c9d5f3eefd668bab09cef93a890cffdb8d31c878367db3fda25be46350db4c96ac6260eb855cb0c43ab5bc55521fc8c80392489539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5424d6246888c16d7007c79ad4d14c180
SHA14a5bb6581f1ef8227eaac8b0f9374da70d18f290
SHA256760f64470bcf4ba2faea4e54c4f41dff9e421a350c58d73f814dd1b22f12595a
SHA512b0c694005311d8b6dd99d73d2a19a91c2ad9f830abaf64ddf0cbb3e54e2c02accc194e7e33b3afe9ab41b89e8243cc30399809d1e2c5c0a6c3e79b841899a734
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8d3cb7fa0a03d0ec9040cd991eee406
SHA16dd0c6aa9ef68a84a4b81f79553a988b03bcc1b7
SHA25688baf7be54b67f1af51f2f570415a911fb401edf1db5a3fddea95433c382ed42
SHA512c85fd59bcae150366569bed95680772d5a7eb90262dd82750ac93dba551793d226b36f55f5951598ec3efeeb6fde619a99c2a3f40004396f9593f36d013a2323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ae89146a0adc31d58e23c29b3484fd9
SHA1cba33da3707d4e4921ff4811be713a9fb164ce08
SHA256597b38b89ccdce1be964bb55cef676284563f3f9a4d85a7fdfe9a2ee751a5e81
SHA5123b484d6b9d8ce8209f0ac96a7a1fc783e7329f94a4e040f001919f72884e675cfc687cdbb41a7dae60b573001d3a0ff9ec1b97faaf71210c5ab30a8d452163ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e8eed5b1105990557ca58657ec6b001
SHA1c739915d5f83f08ff578919d47773b17205eb3c4
SHA256740965972a6049389660be2f5a887e1df514f54818c4e04922ec74775a6df823
SHA512ba0f50cb3d0a5ceea27ad355c3583d541be41491405c36fdf146a2bd3e63664287e9cb1697904169f8bcdaffc6e8d0061bae6c539229102bf0214f835af4a077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51500276213947bc2baf88b940759625d
SHA1cd4039ab00c26112ff179f779c5dd145f572a729
SHA25666847a28c213106d7727319f2512f4220196ce568704f6b5e136d0eda7480289
SHA512c2464146a189a7c697cf27111af0e030b0b7fc9c276bbf384c8e7ca8f8826f47f28ee3d1d7a25796ba3ac9d02973510867e3527ef3a6e2522ca18aad8fdf13ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510a3abc92bf7afbda2b656e7fca25ed8
SHA1cf07f63052da07d785ba0b639db28fe4442a12b2
SHA2565c353c450dab7884f233ef9f1d3465c44445c5e3c57309e75af05158b38cc422
SHA5125f3ffab4c697e9f2834a1a2d9c6fd439e91a78dd38355c676a75ccaece0c85dce1bfdedfef18c232546e9d76d9c49e34ad32b788bea7917b4cf695433f10bef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582ee2279350ba77ad6a08f70b2271ca8
SHA114a98f0df86aaa9fff27f702a29a89baaab40d1e
SHA256a5e9c7d5965e0062600f7b571a290eddccc8383dc24c6894c4214abb0b39159f
SHA512140ed9859d154e0ff3ad6ba7313d8de0070aee05a1b8daac4c939a292581a5bdab058c1da42db5e136a1b94a60380756c2c52045e4132c147dffe7d6e7105dd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507b9fa1587e20b2bcc08099bece8c016
SHA12523f1d07ea0b8fbec1657d5f8835ad8d27bd0b9
SHA2561fe9506bdd24d743e650f79c7e5e160fcd31496920406a8a6fa8738496dd905e
SHA51247f63ccc81610ed39b38325a33a07a19045539cc2e3f8326ba94dc7eb94ecf9baea4b1b907ac504e96f7cc6f2600994913e780644a08839252530b8450d90c9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4e4523113e9c0e4a47b3f147425c5a4
SHA1216d6d2f3ed3c6d3863633713a3c461aea79735f
SHA2566d4650629b8565512624aba6e2fd85c5f13f690d633c9e39c762761feddf81aa
SHA512de39ff875ff5d4b40bb4e10286efb0158bfffd0476b4d4e298870f19ff9158ce6f6b7e778c4ef797f803365d33cb906aead052364a9034158d7b7c22107a5a37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b1a744160f180dd6010551b51518a1d
SHA1d452a100f7737bda76309a2901a7076310b0faa3
SHA2565141b407f53d3cb24a1c1a925586c9c9185cb1d4f4a1d7571ae964fa56d336d8
SHA5120b9496a4557397a21db2fbfd57d1524ff29865fdcfaae6940801725bffdfd2c5e53e3f7f243850a5a64b3d39b67e8ec17a72f992970db9efd88843a16fad2092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc9a59f3b40f152d284622ab5d290bb9
SHA1285d6efc1e06194d8a4ace9eda1a378cf9c3c5c0
SHA25603ce2c8d4cc0076259759c42561709c1da1a675b61b9afa38afc3137a59a914b
SHA512f19e451d95f583206e631c6225ab6f57016f84dfc8d36deb888b6f1ba1ae730669648d55fe9115dda00c18b5520da6d98bfe6d169ffdd3fdbc2ccc61037a8e69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52843a6913340e9d71126556fa2a81839
SHA1598cffa8421254a129ec1c1750da20f4444d726a
SHA256399b5a71ec3dd661c58f77cf86a6d844d922ce3a186d525fa94c7bd735e49521
SHA512aee4eda63c06c14119c86cb919bc9da3458c9b0506c9f22cd3c95446609f895930678450b5b20ca6af95992fde8014efd1a9ecbeb05caea8eadb2a67548935df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fba4c0f1b9026e2ccf29227f721d7607
SHA151ed954c87b46a998396254fa13169f0d6c3849b
SHA2564119bb964e2b520d460eecc732a80aacba12982d6cec7e23d47e553062a6be59
SHA512a99bc164ee5a724831c8b3d8b700adab2a0a0ddb1d7d652cd6aecb8956f4e9b58e9730ea4803671ac54199b18b86e0433f00050bc0059a5d93fa63a4b3062a9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e886ad50616162d0d332f55abaee1008
SHA17b8206d28dfa03945c1f98d073f45220fd32df99
SHA256659f19eef9b879c9c85caff4aecc40ea6539dfa807df5ad19b6b399c6363f13f
SHA512d13160d26c8e49227f5bafabc2daca0766e21276289e86a934ab0a515a740f97ad85f8698d41facbb8480d09f846ba7841a7821e4ca9a4cbf13e57c91cd60201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3dd947484c844f27d131d87238360d7
SHA115a926df36906f09aa580ed85e55a5ed7752afbb
SHA2560d632831b47b304ba197a52e93470568207a6bad117a085ccfc88e98336a7c40
SHA512abae0ca5497b302d8180c5eef74d68ac293fa8d7d2769ca5479fc10533375a15d22dc260990be113db1289d920b17a1d525ba8f9fe5f9708818784503ef7e678
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b