Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 08:38
Static task
static1
Behavioral task
behavioral1
Sample
0ecfc1e74bbd883e03a33ba2065ff2b3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0ecfc1e74bbd883e03a33ba2065ff2b3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0ecfc1e74bbd883e03a33ba2065ff2b3_JaffaCakes118.html
-
Size
6KB
-
MD5
0ecfc1e74bbd883e03a33ba2065ff2b3
-
SHA1
d0653a9d5a859c765ba3ed6763c1cdd24c74a01f
-
SHA256
b91aae850ffc078886fd35f9511acb5902f29d77c66f893e68ecc2108a43d06b
-
SHA512
ccff7e94f19e68d8dca9254a167aeac2f37b58a22abd9801f9bc0ff0b21ae0dc4d5278fb90b9bf5c36988a607d2b9a2e0b84425d1e76a620f629122d527c33b6
-
SSDEEP
96:uzVs+ux7kqLLY1k9o84d12ef7CSTUMN/6/NcEZ7ru7f:csz7kqAYS/z4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90401ccf6f15db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000f9447914592ee47d55ce7616ddd2ac047d4cf1f1cd283fb88b547c5ac05229d9000000000e80000000020000200000003cbb8488bb6473a64eb130eb6647667d65fa7636dbda9892c90bbee8c8fd65c4200000009f2c7fc1ee39fbf48c39b19323877a72c7a760cf62b22e04f8b2d9881009f66a40000000af5e70bb0433384a5d20327b97e6e9be89cc24c8755f837a02c36844ec1d10b46cb0443ad8e4a5df2139ba67b876cc130f8460c3e818a788a46faa8204c5ea16 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E1947DF1-8162-11EF-8318-F2DF7204BD4F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434106583" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2892 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2892 iexplore.exe 2892 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2812 2892 iexplore.exe 30 PID 2892 wrote to memory of 2812 2892 iexplore.exe 30 PID 2892 wrote to memory of 2812 2892 iexplore.exe 30 PID 2892 wrote to memory of 2812 2892 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0ecfc1e74bbd883e03a33ba2065ff2b3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2892 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb6a0d728b24b32a0cb0020654e8a9af
SHA14f0f448af5402bd330cee5ccd48b877a4e0a4b6a
SHA2567795fa732e9cb833f32a5e3789c39f62dd285742740fea62919f80400d56616a
SHA5123f5dd0f1ccea5871cd7c96f330995fc1614dfaa01d2373e4dc7db386efc6bceb5efe529a8d33cbedcbfe4c7754c98afb67fa578b431a2eb92b8a694bda428245
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52039f8d2a81b95f6afb90f2f6950df96
SHA197a9dea8ae669986224f83df85a1f280f1bc9f4d
SHA256efcc60cd4ce672ff1e167203c5a9c84ea88da3f9a4590c688c5a151ff0b3fac1
SHA512148a50a9bd5298fe3aa21ea3cd646eed6d885fb132effedaa46fa86f9f7c91151e155c9e63890543e36f94dad24e8516ae2a662a164d4e8c396736bfee77ff06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c4e71b0e4a9a4ff981c0a9d4d609e64
SHA1869a7d8263e79a49a31f18133f189b1726b5953e
SHA2564e766fb0dc45c1af759b6e2270b928b8aafef56d918663e52fce131e34006c57
SHA512ab1ada50317ef038e559d98a5f0cac32dba12419eb8e72b88c9de65e7feecb18916aad0a0cbe43d6e929b95fc35185507fead576f13b0ec3e8f3ab2fb426bfe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0637b106cbd5a29bf0260a44ed3ccce
SHA1b2429162ca27f9c287e52f123088555a4dc8116a
SHA25643e49b11fc5b087a10f3d7af9439b6048fee96e4f1ca644026de3fa6b3041702
SHA512e1beb67901411605f5c3b03e8e17468d08aa4f630907f45549a729b020d4e19cc51bb6599684136dc55c2179f92d8e812b1fdbe4eb7d86904ab6c5ac5c24d171
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb04878ba024f4a4f4b3e54cf3d3e844
SHA1ad6d8bbef4e514bf1b742796d1aefc3a1223d396
SHA256a535bf33a3321d8dc5bef28dcce38900804171355f0e8b762b9168e51e9e7627
SHA5125502e558231c8b2d77696ec17dc72dd893c5621a679ea1f7866985b7f524e2b66ee246b27ca8d5836f1b6793be96663372d47d35bd993d77bf3bc90d4f6fff6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503b5439ba6ffe47ab0b7306195348704
SHA1a3eb8249167fbae0374a53510b36e287cad9d65a
SHA2566712566c1898ee8ce3281bc576a376667c8218d15e9ee9d5cb0f3de660f7bf09
SHA51281708fa4def261cc8ef7ed9f31495907039986c7b06693cde04f64d78dcd8af0351f91569eb5898485f29e93fd55c8fb4a6929002b804ba8af68c3feb8ed8fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b00c2725b1029dd9842b36eb891d6fa
SHA16d5722ea34aa872dd37a470ab0dc72a64f9dfb68
SHA256664daac7861891c7a4a89e6aa30bd7c6814fa730da66504eb3cf124da9ab4deb
SHA51215961163cc85b8b5292749eb657d95194e6512c38b044e34db7f9425324c79ccd355ce7fd6a95dbad607783cdef35fb677c0d9a1988cbb8e15b9e7ee1bd32426
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a394c3ff0ed49680321a9c2be8039dd
SHA16ae37694fb8f913b7e090519c3c593eff80498e4
SHA256fe5950bb117ee649a4cc0c81cd929be5ac7b6a4ac85b32a86ddee705d41d558a
SHA5125d18c4cf2979b6564d6476ef5d013ea671ead304c85826f68eacde85ca28f51feb985190eaaef5bc98a6393b0d6747e97e977217c0e91252325210150e03b4f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5852a3a8b68790ebb0d5000a21faba444
SHA1a823e4fcf69ac0a9077a7618e3230f47a170fbba
SHA256b2ccac97a102f09141a7c1fa5146cf3216e45d8517abaeefcff85130f567c834
SHA51230d4349201d795e29a31a5d4f8d404acb241fc1a8255bfdd6ec747237ef61ca8bac2323afa0d5cff60871fd2bdbe5a377affc370095230c8fa4d6ed2827d6abc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ecd876be41f8117c1f2be14ed4bf8ba
SHA1067fc9fcb0d17493496aa7f6634e42442d366766
SHA256624d1c9de0269aa9cb0aef98438495bcd24d3b3998c12dfb10fc0d62b3e2e9c3
SHA512bb87838172372dcadc0b2c3c493e92d35e5c57a8b912965e5103831c9a92ed765c2ee47b53ed886325447bfa535806eba64be2f9b0828a601a8f1707a8b76371
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565a3951b19946766f53e4c774637cbe7
SHA123850c001105b46714ac2402ade235e5cdc835e2
SHA2569cdc72c120bf86a9c5ec5da73b7e693e3f60df63895c4844572e291da4bb47d9
SHA5125fdf9d3f5c3064b8e9d88d53c0e16bb46f791722212dc3fb79c468641fcbbb83569c00ef4b419978e8c20a03ab2b6c68e2e669a31de58062cc6fcd5ba9033009
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b88059dd1b3d60a586a24e26278eaec8
SHA18f12c729dae386833c150e313b9aa420fbbc407b
SHA2562f262b43230bc8c8ace48babb5402341d37a38d5a3f24c30053a91072a91cb6b
SHA512d7e6f93ee2e8620e02f2b0365ae4b49fc14da548fc5aad136b2f746c8c4d06d6fd418a12ab1be56d8c076fc5d8441581debf53f202a98bab893fa9c3d22a171a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584d350963e325aeba63ed7114a4fcbbf
SHA124d8f2f6a23cbba75f2c4a2fd7286c75b8e5a7a6
SHA256efa23bc633f7cf92d575451d70f9210a0bb2eb8b304ac088009b9cebb96dd9ea
SHA51234af9cdeafe0ec50eb5023ce49a3901d713e44e6650f0ff96b6636e1741585a1caebeeffa25b48634d69636e8c71b9bf0c5dd357003897dfe51048333fc45dd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0e8e559e1ee537e990529cf32c35d78
SHA19670b9f73ae0fa20317a40cd0a7b37caf0a98ba2
SHA256e23d761658f0094facfbdf095b61b7c38bbd126a50eda9e308f377c6cb5d058b
SHA512bf0a527034cd34fa6aa8199ff36e33c6d489f84426eb42963e945c5ffc8d8e25c30b453f435f816d879424b2fddcb434a337f00148221160434fe9c35eb1952b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe6e0d0615559079b1efbb943e69d85b
SHA16ff06059d6449fd3b1f4cd35e49f92214e9c2ce2
SHA2560ecdfc1424f10f1e7f5fdad8ff5e3447b5040cbe6b70e0427d7d0b60b5b503a8
SHA512a6b4891ffcae9c5e5eee1bbfcfe263cad4f0cfe4f7ae8571bb05fa44e38b09e4c68cc35bb0f340ba5b59f9a613719d9a616c44b709b6b02c1c421bc84fc33d39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4d36ee6d5f0885f75e606f72ef257b4
SHA183bb20f51f1dce4da1b1a0ec56dc2d9ce45d0d1e
SHA256142b25675ccbd8ed5f23672c45f5334cd0282390713ba5ac6109772d6b7e2543
SHA51202b11c653d2b13cc7b92a4c0d7a05e7f818d227fe2a4b23b531ad57c2f0321301b586e87122961ec87823d7bac7060e40b2d99e1e23b4fa1ef7d094bb8181833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4f91a146c277939e246ee248495304f
SHA17ab4715f12027ab43ced3d19f3cc9e85435a1244
SHA256961bcb9f6d93be38be397dda12ca77c3ccb37885f22aa882dafbc2c441977ac1
SHA512caf9d91be9d2271e3f63ffcd29ca5b0177d6fe8a2d1d3a46c6ff466a0d956dfc35964b034168d482d34cc047c0236942410d73445b908f1a29d819bd9d49d9ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f25dd6e77c7a164b65be06160f826b9d
SHA15ec725ec92a2c57c03b3ab83ec8242afec1375ba
SHA256f55ba7063cceffeafc6239464087f0e445d9a0c9aa31ec34c9387a7f4ce2dcdb
SHA512d10367b22ac57f1c7aa821e94ca528f91460a08101eae688135f2501007d2b925bedb1730906184d88819a598bd88239e1382e90c3ed575226cd7ae7a99052a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aba83f11656339e3b979ddc9ac70bce9
SHA1150d2119a897f907d35170da9a3f839db8a9de88
SHA25648352e1351771d4f3f42bfbf7a43b54ee5f57044e6d5ad563839254b80a7688b
SHA51240063d93c308daf531258693aa787bf6c27157b3300470e9545f9505d682b0623bf9b468b3120acedc9093de6025555216e2e15b7e2e6d752968d93c0faec528
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b