Analysis
-
max time kernel
143s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 16:32
Static task
static1
Behavioral task
behavioral1
Sample
0fa25e4d387676e084c4185b9ffd286c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0fa25e4d387676e084c4185b9ffd286c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0fa25e4d387676e084c4185b9ffd286c_JaffaCakes118.html
-
Size
139KB
-
MD5
0fa25e4d387676e084c4185b9ffd286c
-
SHA1
8bdc5182dcff6a8e7da20027eac580990ae02089
-
SHA256
e66ba74431df179238ba3b99230cdfee03cd3beebb245a1ef58ba03e251c0d24
-
SHA512
e14965a7c26a5971e9bffa6c65566a51797b9438f38a2ad32019dbf63856902d9031756ec1f3f5c7d54678b9f38d52fb651bd26872b1b44239fe3a4427b6d86f
-
SSDEEP
1536:StPM238n3ZftQyy6hzvYPl1ByLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP9:St6YlyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000b4cadb09254cdb55ad807fba7f80606bee6b79f25dd1b8ac06c6ae77162ce3cd000000000e8000000002000020000000292a5085f6d7f6631648179eab31928dfa80a1345cba18c54a39e2ea264bc19f200000001c5fe2745628d0e5bd3bd4a162cd6e74a577088e987ae900b13f87cd2217154a400000003ece3b1be3054e93abc0c2b1b0f7679dcf477ede0ab337f376c63aa895e09c7a0829595bf1790018d0b88beff3d1ff40e02dd7b838ec3aeb52165610c8c988c9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434135002" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0CA43611-81A5-11EF-889C-C6DA928D33CD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10534224b215db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 3024 2084 iexplore.exe 31 PID 2084 wrote to memory of 3024 2084 iexplore.exe 31 PID 2084 wrote to memory of 3024 2084 iexplore.exe 31 PID 2084 wrote to memory of 3024 2084 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0fa25e4d387676e084c4185b9ffd286c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536dc4149b8b31a456f8f89cf5be41e94
SHA1c460636ec37b23811adef29389c213e9d5c1af2f
SHA25630218de6d79b761b1a95bc004327bdb0947617daca06cea8ee6fc38cfb609bf6
SHA51288637f2a97a78209130abcaafcc95e315de9fad62fc856348620418d41a72df7d444ff6845723dda9e0a68097782138200831bfa300371542c5a079cfece4ce2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558033ca1ff674187cec7c2b24a0ec4dd
SHA14a4f8b18df2cb11012f6fa9b355597edb4f4a27e
SHA256f86b65ac23a46bcbe185bba4f7e0124e78739fed17cae9fabc560f81d647235e
SHA512200eba6fd163c3af6eeb8222569965b3f7251e4aaea693859dd00a96ff94a9f5d8808ce08f985190f920b2e2d4f3d3f8e333c34abf0e8dc3502a2efdff37f0d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d124ad925108b1a6849806ec666bcddb
SHA1b6af5f66c015347fa0c91c743f9a9046660d209b
SHA256c88e18731d4617cc10ba60076fcd70a192c6331723541e8cf296bc1578ea21e9
SHA5127158b45388c03f08eec1a7b9e1ae07f3575c697197904df62fb2a4f5c9c20eaf20e40c74c19da9f46d9c3211edf8c7b800cf076c602a5b16cf3a87b8e357a727
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c5935da9871f637acf05e2fbb5ce154
SHA1774db2ca9efdab029865a34eba67369ea362afa6
SHA25669ad864f52da9cf4c7ec6dcd98847f615cf8261f6a475bc8dae19497c6fa3856
SHA512bdcd1ba537a60b383b4a80b7cf14e113733ae2ad0a23edfa139b5ff7bec38f0bcb83c201dac4b204043494d34a506f941f7503b3259d094db0f9a0f988b4c33e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c72500952f6bc6463fc80c275d93e4c5
SHA14e1db05f2ac38c50a9bbebc48200c7fbff1d3d9d
SHA2564eef05a118f422a9dfec3cfc110cb4beabebeffc023b0400bce5f6a3e68ec5c7
SHA51243bd065457edad9b3da1254379ca7b40470c91537b99db883b0eef0b64e7a7dc9b81715023a88ae6a62f775878c65ce37a67900b2ac17c9a307318ef77acb9ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f799d0d7faa1f2209b2cb8dcef39e425
SHA1f58d7037f2ac4badf9a5a9a03c232ed5f46d13b4
SHA2565c9dbd9de373c2a088f617d13098ea925f84b49fef220b79b811e008d9ef9e88
SHA512722955a00a3ce04dc8fe7987fb4fb0c54cdc120fb9a4c41900a84bb20e1d8e201a0c5c5f64942760f6bf8a18ac193f0699bf5ff773e655a3c0b9720fa037dc87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592703eda46d196af5d017f6309607d06
SHA10be6e51c269c44a5e4de1746ec7d86a41c9bfd94
SHA25623544d5f7b66d8dc6b33da39b84807df6b67650b1cc9b6e2eceba06219e94330
SHA5127d27b1d4984ccc39399a382c5f9a40b57c0d28ce2e99297ce6eeedfc10f4bbcdd7f18725a9e8aefd205def10e9a56f465a0ed94910524bebf61a363960587589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581dfe7c97a7bcded813725712d27ed65
SHA154c1e577f4684983e2910f1d75f0d9e72b2a1427
SHA256229a120f005e8844f9bf54b9a629b23dfe500b415bf62a8ba8f984cdbef3e1b9
SHA5121982730ec1d136cf258f15ed1ac42076f7c45b861ac5d77b3620301d2e63d3bab3ca78af3a58d82f5ee033287d4df09a4eaea2c2b5025899b16a3825d6a83aff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573c740d3daf5644671bcf938cc46712e
SHA17e82a532dc26f50efbca1e04d28ab25e82e7c51c
SHA2561a3b31b0a9d9cb4b335906f7fb85649aee90245b58944efe7f8f58c988f2764d
SHA51284fc70fd91a2224005608fc9c4645a70268f16d65b04cd9b21c806fc945a500a59a694ebf511b1c5366291d564b9aa8a2fc5b4232631d79f8e1081c196520426
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599fb70429aa11c187013f5feea611908
SHA1d1b102bac93ed00b4be20744ac8c536f1fe812a8
SHA256d3491b5f3744aa9a6d450c1d29486a1bb7246fdeb5e1b4c44ef6c33dd4b19837
SHA5127e0751e6ceb224bd3d46348c01f4fd58a641acfb40381980732e617340e7c5264afeeed64f014600c1366eb3a1eec4949c53b8314f7a9d5ec25079408401685b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e81c081f8704467ce8b97893c076b2cc
SHA1a4025474f3ebf62ab5c430e16e95a85774481e89
SHA256f340d8ca5838f915884258c52ba8e2bf00f1384dbbaad7d4dd332e46b8c99cab
SHA512d595b7bcabb688f57c1ea88822f16b04097897cac51e52ecd87143e1e57607fae6db93b22f1f8bec0c5531466b47b169a390b617e0e1bb1aa2072dc6ada7d04e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bf5cc758c61e06ac289bcf72599e701
SHA1cbaff6373b72ba7173fc794f7b8ba817764ac941
SHA25688087c6fc2236508445e8c084646eafcd87f572d1763232ac54a8b85b6bf43d4
SHA5121f352971ca9c9023fbdfd4f362cdd72ea3523ba7004b485982b263a64366f56c58b68cedcae89570361a4b498202ef3eeecef7a15a9990f20c68794e175d8293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9707599a5aeacedcd0a6c8e681462c0
SHA1692745cb5d949491bb68eecefa7edfd09e59b751
SHA25624c3b350998f6136a267beeae60df1a0ad4cab8788afe7bdcac6a5fc09e706c6
SHA512141659f032e26604d2d5e2e7064c2c7f6901d556152fd69671f827eb560565baaef91e32ef7b94855b5bd03a0024f44d4240f04d09ea24ce3a545a58746363f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5341659688535d284d4d95b4ffaa0fcdc
SHA1c8ffdf7b4cabef2145e95f9c1f921cf82d4ded54
SHA25641329ed59fb6c22842883a7758790d9561607f9e13da0e548e9276ec5370c739
SHA5125a690020a1b12da2270031c6c4284cc63c7a29c89476be8042c35f7e8157e9ee7882fb358d417291b6b1d8a2cc2f550c7a7fac236d2b5a0f177b6cf9bef0bec9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558f4cab1ad81b44489c159dd26f31db1
SHA1e93d50263a00f3f5676ced3dd47eb396f6afbc7f
SHA25696f0b0dbdeed705faa7e7a3c897e52db96ffce1c51c81e02fc34018e9e6c74e1
SHA512bd222f784cfaaa35f5ccc87e1b23a242adef69696f8818869234cf8714a5aa9b47c6952dc7d155ac3944d02d09bfa4bc0328d71973ebc038cc4f2b71101d4c22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502df497082ba06e2b2eaecdbe3cb73d8
SHA1708d0b1a3f463145c23fbe9d130b382c4469877e
SHA256e920bcbf19037b64ff060b129afb9f34718a13b99dcd609511cf315fc66aedcd
SHA512a44906e6dceed48275fed9f7abfe61111f6bb6e1afe2229cc777f1636541c3a0e021e914f6567eef238c98286f27763b04fec05d29de5b548cdc61155f4ec11f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54620f32c45a0b2698452af6678977b01
SHA11e43cbe85c21fe9f54a5ecc84d783630e1c0158f
SHA25680807094dab02a6acbd57f8852480acabd7a6a313193eea28dbc12bfd54ae624
SHA5124013ee8efde477865de6201066cda03a4cff17572888165347246674129ea8c37c503ea7e9e8f07a3507e830a312b110954b33ccb0e5eebc9902c19bff8a3108
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b