Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 07:38
Static task
static1
Behavioral task
behavioral1
Sample
0e9fa2fe47c3c768e3d77a421d08a3d7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0e9fa2fe47c3c768e3d77a421d08a3d7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0e9fa2fe47c3c768e3d77a421d08a3d7_JaffaCakes118.html
-
Size
6KB
-
MD5
0e9fa2fe47c3c768e3d77a421d08a3d7
-
SHA1
e3e976d7b0ad8834d3edfda2c2df9dd5ac645fa6
-
SHA256
a66f080aba6df191beb2cb88c057fafec173460d04703230e4ae6f78ece1c362
-
SHA512
8e14831a5bf73f98ae9e105f1d0aae264c33607febbfc16075650f2027d6c654020d12b5a0196eb7b22073625c09932f894fabbd3d3e2a9bf9f0f9da21f32655
-
SSDEEP
96:uzVs+ux7mTLLY1k9o84d12ef7CSTUqp/6/NcEZ7ru7f:csz7mTAYS/x4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 708cdf796715db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8C57D1A1-815A-11EF-A914-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434103004" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000000b3b4a4fe882ec591fe576d4414418ed15c4f9f49a6b004557d4c0f63a938459000000000e80000000020000200000009ccaf9983ff6109b0c8a97ef1d063c2729a68bb412c6ae0f43d5bc5df5abe4ca20000000e0a5552dd0ee01b92e808db60b4523e66310fd8d7d655a812b51a74575b6a44e40000000f8223b6e2d479544555ccedba0719a746cccff1c07494f2f399a3bc6160d75e815d75c3c96259da70c9223a4bf4bb9f51dd82102755f2fa653b7e147593b769d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2788 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2788 iexplore.exe 2788 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2788 wrote to memory of 2820 2788 iexplore.exe 30 PID 2788 wrote to memory of 2820 2788 iexplore.exe 30 PID 2788 wrote to memory of 2820 2788 iexplore.exe 30 PID 2788 wrote to memory of 2820 2788 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e9fa2fe47c3c768e3d77a421d08a3d7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2788 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51464fb5886b5f09db062cd4f721a07bc
SHA1313598a70f83df44131e829feea98070d876cd0a
SHA256a50951ec47abed0b4cae4f5f5ed64df68aa3184a0f6fa2f229d47c1b2f5be717
SHA5129b10415b86616a47001d005265766178ede2789400215c587050c08523045c0fd1bf592435bd0b884418e06af7466a64c4d72d6a4ee35270fedac1cf927225fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf2786201f9b2458410b6fef63e81639
SHA1ab5c8fbff330fe984f5d574f7e0dd8ac3fc29351
SHA256483a9b60d175231a9ecbd62906cb82f68ca2f5e92dadb0c402efd8ed4c44410b
SHA5124f5da2956b3fa548c666483b29d5fa612dec8736294ef0fa6316cb7df6c978501bd3698cbd056bf02542bb752e50e590902f98feb5691c31a2fbf83a81d9b76c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50335c097ffcc7fea70ae8f66a2d4a592
SHA15e238081d1bc3dd621828766e3f339cb32fe3a23
SHA25678b5711f4a633f7168c6d3f1b06202daa0a04fb06779137512af40cd7c2c7e85
SHA51268fe212ef3c58fe0c4829d097fe4b803009c59f1f4b6838b0b143498e88906d45263fd5183edb7b6315421e20c18ba5789a2c73cb7248a5b3f754254002bae50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca8506968c7e531b0d6c522bf4b1a60b
SHA1e18040ee85a56539b1d36e2910dd4c4fbe93e231
SHA2566e027cd3107f25450a142606ca4c9317b00ca05c16417cb4202269f56e887d19
SHA512d31e5fdb4252fee5dcf12a73667973a3e8b4aeb5ee610ff21400f4dc25b7d67312459b538053d599c243581829a74a533cc5805f69d4b2eec244c9d30641804f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec6d8084c188ff50078c3dbb04bcc830
SHA137fc0a524bc93b9cefe5f8913347fdde880ce67c
SHA2569e6220ae548ef5914003b9eecd12a608940a34f646802a8c5d29cca581996c5a
SHA51206662fbbcf46e8e47a59858872cd97e06ae0f3a56af04539606c75b37944f61fb43a9d6d846269f107ea21dfba2c347a3993e23e46e234da64b415ac2875dfe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521a27b4f4adbdcb9dc2178ee750ad7c0
SHA1a9dac29d48ea838fe0c697fe4980fd5a1f51b45b
SHA256c307f10df6e8d076328cce2731d00941d438bb3b7858e39337f34fd6c4ad5400
SHA5120847683e8f50dff5b6c98cd541689ef576f5122593a4322052b2de24ed28dae13ee4d8549b1c59515974c751621d702e0e381d798760c20b455f3f1df5e3c755
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5208ba1b5417bcee7482862a4816985cb
SHA1c2cc2d411cb8b0c7b82cf477c0761f1ce4e7de8b
SHA256fc9ab2fc81c6638bcabae9df95ce4785239b1e75cd2f442efd832661c611333d
SHA5127cb43b057024028beee4929c4e318f20b0ac958e78bb991997bff0d504dcb803f4984ce94c983f33f50649c86c0d5091a2fe865bb2f8e4c25ca7de50b2f0ea7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511dcef98f69d207638476a440c92b716
SHA13808a6bfb5ec002e52c55a4e6f188a98ba819213
SHA25664d274af4e7837adb7db056bc0f1aa987a7a28f4bf05ea2392acfeca55d2ea96
SHA5127ae78e37cccbddfff7d0b2614357699070177e454097d086772760d7f8f37f61fdfa70863e1e3db66964980232b9b264a69be02fe2ec27a38c757ed41ec880aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9a4eeee16bc2dad90aec540c40e24b5
SHA12673815f5f8d00ba3b89bdc9f10513688b97eb60
SHA256891f90d8757b5955dbb6712d254bf88cc4eb11a796e96c47f157d6cdcc0116ae
SHA512f06925b56e0eed5da1c68a889794061a9fe0117097f5eb0645a805d393e51609185d46e8fe1df6e00f4c6473a8998387b5fb4563ff0dd17af36341d5d6c44a93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffb7cbeb9ff2f5f0ab5d4387eaa8d951
SHA189cb31be4b268051c521847cb19c447f6897eeea
SHA256d9731dce2033008ba8f73f4c7f33a538125daff6fdb1343b5a59d12036b562d0
SHA512d217f8969ca6eac42d9436c4f6f7370efc3085ac8d5b18ef092041e8b97d9225292998cba9d57ff0d99a8f868adc49e1c2108f09991ff92dc1d12fa0297c7927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfe630a362b85eabdf3160b260e2a7bf
SHA1fd0d1c8e9cbb3d0ee2c9d1dd6e1a1ab6194cd359
SHA2568d96e14018c74546e1b22e097b81f74e4d1921185e530eb24efa8efde9e3970f
SHA51252dad692dfe192124cd70ec6c07414cb666c81e0c6a431a79f133c6a68edcef7f235afe316387b2eaf6317fcd61be21028a6b24d20d295c3d06ebd7a89be16bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d878a6169f01668fad01ba16a78952a5
SHA1489db63e301a20eaa046c9b36f8616bab76f9ad2
SHA2569e7cf79adbe49897fe286bfa2c9617fd917ec2718cf6e5f8e6d287fe6f8ce764
SHA51270beea8206b7fb76da83e69978e179f62e668ea5c2fb23d5068f66a99bedf6a695152d767f701d88ed986d901a588296a3a4b5eef5a375ba1655bcb3a0958279
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585c182994a2e57492a92992d2455efc0
SHA1a8e821b83b09836fa8c809e3c444c8722e7484ac
SHA25689cd015107d77672dd9c34133692fbad5e966882978c11874d61048eb245eb22
SHA51242c17a70e0a863aa6be3af17da54b7a17eac2c5ff077fb54161d1056593404b85e6808b20286f3d0aa632afa1ea5cb60eb849d02969bd8f8e4b14e3533379d6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5185aadfbc7b1e41d4920cf44a9923bd5
SHA149fb710e2cefcec2a43b709b04fc26e4b1f8a3cf
SHA256ded8e1c8b21cce6360b4fa68512d82d04802836d679a7ddd51552ef4793f05d9
SHA512aa6c06681d9554742cc1078120db72158b4d73af74504e8e1208a43cbb5330e97de23a55173ae213590ae2b12b0a7c2ea091f8704777dc7fcb5b0e5b1b2af1f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5698c32f13fa6d2d3048e413d7d5363fe
SHA1d4da70a8df3d24f12437626079cdac1161770b53
SHA2569b38a0416f2e17550a1fdcd1c4f4b968b25d22eea3ce38718dcd28d1f72a95f3
SHA51287e180221b8d4684c594a6a79986acf52d518217d30a7374e78bed69b225d300e1e50a4b69c31eb784aacac1a2924e01a8671d5f3925a68513d01261387ecfce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5458144584c4edaf8130c1f5162b98d2f
SHA1726c1d6dc98f7caf818491029f4d065489119028
SHA256eff0eeb890699e0a2769303e1e1ee38469299aaecc1aae58a3c387192b8572e9
SHA5123c57b12b4f0d39e59cf50e9c526ad7dc8a558855d24bb0066b976857f58e4b5a19e6c0b29b121e91ac7f2db541499b0edafa31538d0c48fd34324c75e69b317d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5778a3622317a7570818fdbb74ddea295
SHA1b5aba762bc0138b44952903e776ac11287b9e70f
SHA2560811cedf2e2123b83022d1e01b13d043a79213f72655e4370a2f1147ac92d28c
SHA512d67fb4fb2245c06f5bb884a2e2488949ae912b6e27a2dd15361939804888452c9a6a88a5c40c703ddab8b7e62a0b89bf9a5adb5632c6cdb5bebac0051565b0a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f029ec9eab8814404f8c6da8c30baf3
SHA16b4af3d64fed6cc1fa30e8ee2f142f24bd9f522b
SHA256f5b4363f7a1d92c2084a31fa6e0453a89646d2d819b1f6ed847d39f2a368e0c9
SHA5128cb956634f12947d33c78a8e1eb32ddac4affb05e87a49377f68f4ef6963fbc1fa06fb66d559eedd5a1423d33e92fae50be2809595f7953bc22b3832dcb56161
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b