Analysis
-
max time kernel
122s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 08:42
Static task
static1
Behavioral task
behavioral1
Sample
0ed2cf0b61c9997f3a84b42d0f0fcbe6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0ed2cf0b61c9997f3a84b42d0f0fcbe6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0ed2cf0b61c9997f3a84b42d0f0fcbe6_JaffaCakes118.html
-
Size
42KB
-
MD5
0ed2cf0b61c9997f3a84b42d0f0fcbe6
-
SHA1
8ac7efde30ce62a2ee8548c71846202a304f41e2
-
SHA256
7f5ee98efd708efd0adfe520911a256281ec26681d14f755a52227789eb42687
-
SHA512
fb70004d755a9665728512ec245e185ed3cd6a6c6dab3bb6b1c4ddf48c380e400c6c48b88ebe38eee51dfee7c8dc237d9cb3738c71a6d0775289120ef92c8c4e
-
SSDEEP
384:xh+Z9QFtLfs+XJsBjDppGAPZyCJRsvMAL6Q33P:W+fsK8bDMP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{68415441-8163-11EF-854E-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6090643e7015db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000869deac7675ef6654cb54b1f756695225d016484f1a0a6d91f7a7745afeb9818000000000e80000000020000200000006cb0338a1b20fe9cafdeeed51e1f3583ac18e06c0622b55998f83cf5f9ce727320000000251116bcca97fa93c6511d797550d24a5e8f1df77b20ede922960791cfa7b8c440000000797cb4ff05b0032d2734950a252d0f7c1f54695e4cb471da3564079fe814deefc8d0412091ca0c6570efb47a6746dc2224c6a881aa29b9eb0b182ba7b0695269 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434106817" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1668 iexplore.exe 1668 iexplore.exe 1048 IEXPLORE.EXE 1048 IEXPLORE.EXE 1048 IEXPLORE.EXE 1048 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1668 wrote to memory of 1048 1668 iexplore.exe 31 PID 1668 wrote to memory of 1048 1668 iexplore.exe 31 PID 1668 wrote to memory of 1048 1668 iexplore.exe 31 PID 1668 wrote to memory of 1048 1668 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0ed2cf0b61c9997f3a84b42d0f0fcbe6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbcacfcaaf7bbad7c0355c7c428a4214
SHA15af8f8248ff4e2d7009bf8df4155d8f0c1a34029
SHA256d6c315a27b3840b6d35c8c6cdb45252ff3bfdd72dc8f4f95bdb2e009fbbc8678
SHA512eb4adcefb727ce87c26c21234e60d6c7ed230d16b2a89499fd2160a859e1c0246d07b5129e16bdab5ca5c4b13dab5fe50e3a7748f69a655b126435c391770748
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c02199396970c5c4b72035dff66ee0c3
SHA1071ab2c2362def3c3a8a9c33be7dc99bebb028bc
SHA2563cf62f20b7dd1c1f22288985c950b3ec75d5699880014b1af09fcbfec3c959d4
SHA512335729649bc61f42ee6932aa48af076c75279374c12f662e9f9d3dc6578e93e995cf36a56c41438396edaed303e84cd8149af47f38f04ca82d3386c4424c0a74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56355d7f90cc44f5e8fe65b6ceba0c49d
SHA19a8d9a1c36fad204242917c95f8ed1ff1366fe53
SHA256b55fb5cc8d93d71fc46f26f78517aa3a0ddfcad297d6bb00ac898706c31a3501
SHA5127e2ca4a416955a549d6076cd840ad85e9ca4704e6f8b6090159fcbf98911645eedcf5705c09406a071fcda2238cd1250a153a7774128caf9365db35c50b726bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59311985be6c89012bdefee8d0ce278bb
SHA13a2388cbe105887bf57a0014bcccc5598f349acf
SHA25643e3b2091eae67adcf520d9d125a3e9ca1fd9dfdeea059be854e666b2ec1e68f
SHA5128fbaf16de4d6789c4c12e30fea79f04bb9ff2f3153c9c64affe898d120062bb807cdf6d959bef28104f5c9124d8beff456c631a07a093ac3f602714aa787e622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e5f4803673fa61b0e35cfaa8d96090d
SHA104fe53bac6281675d84d6c10c5796a1fe0699c39
SHA2568293290cdede02aac2829cd0213e474de144e28298c8a9fd42c9b4032460766a
SHA512b8578ab27a991b8949c1d819127358ea2f31451678de3773dc71cc4ac41ae86efedf43ea7ed8f7ac459947e983bf504303be2986e2d070a1b76414f0018689ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d052fd675a4a1312539ac194698a336
SHA1af3192937705da2fb80844376b00eda8f2986e30
SHA2566dfe8abd2a0c6ef0dd6cc535f0a5038d89a94ccf4b7f97dcc238fa896d589a5d
SHA512aed95334547b28ea8134e83f49c3686e363b4f550ed22a1dcbf3d69c22834943c8a2a89864a7e60371f5147a8338ce83a46919e7b0541261fb030cdcafa5e014
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1ef6b4e6f7408692705de8592aeaf95
SHA196e5fd8bdfd1b27fc2ba54f8b1b36dfd07428de5
SHA25639d32cab3a3606335a2c820511eaa391b329faeb55a402ee6e11f13be4e8d9e8
SHA512d4dca58ff96a85a16490d967c7e2d81731323848c2a4ce84877812dc5dc75178031fe3f1eec1dea82772ede0c97d92673efe435e8e06d1c6f4530f7d15cd55a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7e22f728df9ab885db23303952babae
SHA1337188e032fef8c02a2b8580a6748b929cfb5252
SHA256ede88e0056b2dcb979b48401bdf7d90784dedd6dc0a160bf646cb0d2ef92effc
SHA5124f3a5ee6389db45a74d05349630b2ee00c1e4fd550c6cf1048a42cd421417679f6539e31bdfca6aa9b682efb586c655df0c18de2e0cab2a353c2445ddbea68bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b7fbbc0c9e93bc5dd68f14a38675c7c
SHA1d31300077244e961d228db94c5bfb236eb313eae
SHA256e9bc4c852245e3df06b8adc62fa30e56c9d2fcb1ccc3d24fbb2eeb1f6dd5f072
SHA51218075a527bd80c9113cf0f272533a486f8c231e85bb0f0e93af8dbf46ff0233008b56864902246a345b8c6b3f2b6d07d232b9f118028d53bc75c8618debf697a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595cbecfcdf04d9a59e84409f3b23419d
SHA1567487fba740b50d2a5d13e2590ef647a92e5141
SHA2563766616e4bc148955e4f5e01bd40566879a032b984cd1303785980f8b8410880
SHA51245f884bd2d13de1d9070c93d8f09fe03f5d20af93c2628d505b29d0ff33b4fdf949f0445aa973ff5dc0e86bca7f79fd5ad76924e8052169c6014fb2db1ba6250
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0f9f16d7e5da1bb3a0bb9d6dde6c9af
SHA18ee4cf674ef238d4b17ccc13f6c9ca472906a7ca
SHA25677570decae4e92bdd874153ecfc0fbd68982a48a2720819345259276eac1c2e1
SHA512d363970179a1144a4e14b57b5b0127dbe48f8575167eac2091f5d3a33317b314621faac87eccf735edaedee561a0b1a73c6796b59dd75680bb2f47ce0dac6a86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec570774646545c53762001a6299e7b7
SHA17cf48e3c52b943d526581ad97b33fb662d2af02b
SHA2564ef9d7a29112420576a5021b86cd74c80fb62dd0c730ac49f0f9a627bec164ad
SHA5128368935309167ce077662c336591cd7a9cb144ea031644f07cdc05ca5f54802e402f4942d9519fd8c90b8ee2e4aca380dfb248a6e2aabfb414f516ae1fa98273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57776165006d4e136e2f7395fb725961c
SHA1cf93df57d0e21c93a9f14d495498bd62361b309f
SHA2561c44b8f5fc64e86ffb836d1bb9b3153ec0a41350adbe1b37510f1335506d4e32
SHA512ac7f41f8a649dc1954c918e1866fa66f1f0be8d49d5a7029e4778f6b3df9ccf550e7f596fdc23bc613d0517b5a75ab04e26c3807b7be5751268ab670b7161fbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c137ffcfd6f090ea77cf23f7f7e5a3a
SHA1cae5b9762dacff20dd725334ef9e5904c56c0dd2
SHA256ab065cc72fba37193454f7504035a60c13392e50366e14bdc5250c675acac5f0
SHA512d5da80deff251dfd75d5516fdcff5fc6ad7fb44571967835aed0afebe027f7b87b83a397475c923a1585aa94165dc6db09419e92dd9f5db5bff0896761069a34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfc6bc9be84a8a92a35e669f35f4bd9a
SHA15907292a08f9b07ee2d57981c04e9e3f38eaa33a
SHA256fbc8fb16c527403bea7cc03c2757483f9a898b549ba46e1acc23dde345a47988
SHA5125fc22a3a6d77681b86e871b24ba69e24d4e31f19e21dd7f201a2d8d2c522a26e79d14a822861b709ec9504542c151335567f7b5c0317140c37dfd84ba7f5cd06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f2e35ddc952e9961cd56e1e9c26947d
SHA1a1154696ffcf05434d3012ecd146c96f2317b021
SHA256c21017443917eb691e7902bdb5603f2e38a9838d00becf25388c33fc41a6d77e
SHA51216eac71e341ed5027eac615acf392c74e841940129da98ca2813aa1de3b001825393610d63b7d6d36aaf5fa753626767f893089a8b49c082ed391d47622a5e12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550427adaf0015b917b22a61c5d17bca4
SHA1da18fedc2723603910e3564c5b272ab97602c40e
SHA256a4b14d6bf4900cf2efd5c56b3238074cdaaf794129e6f648928eb409cb2c9358
SHA5121033d31e51eeb20598792b1bee3f4d37b2ea417d32dc4308b7e7f4f4254c67214868820a627fcaf865959aba4500e48e7efd0d5678125c50abdea9d188d91241
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5118d146d85d136464e7a4fe359c681ac
SHA18af944e7fb043ee93d09d42487d151d8b65e7c19
SHA25692f7d0deb206f90ad501052311934650375d08e6c1470b0afe42a5da0ca53695
SHA5126a6c0b2585394a75ea591a840ebf7382d61948236d42f75f2642c0d099e8a2dcd63922756438347bffcc04e267b45a53f7c8b0315489f43f6b2eb0575515c496
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b