Analysis
-
max time kernel
94s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 16:05
Static task
static1
Behavioral task
behavioral1
Sample
0f860ee9f146d7d0aedd58ed0efa0b87_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0f860ee9f146d7d0aedd58ed0efa0b87_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0f860ee9f146d7d0aedd58ed0efa0b87_JaffaCakes118.html
-
Size
10KB
-
MD5
0f860ee9f146d7d0aedd58ed0efa0b87
-
SHA1
cf2625b9a25d30f1510d7427f7fa4138d48427d6
-
SHA256
7c5df1d449a58fe259fd7a175f940a1e6f95fefd6524ebbb43478b9c3643b912
-
SHA512
08507f06f8aa199350672316a21905e151b08667cb06f0759325287fee468aff403224b048c1c31068e305b1a3843b827ce8eb1b1c1305c71ef13c06332b8ea4
-
SSDEEP
96:uzVs+ux78WLLY1k9o84d12ef7CSTUeGT/kuZIsjpm7NLLj7SdwLCdlVHcEZ7ru7f:csz78WAYS/3NEKLfmSAPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90b21723ae15db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4E30AF91-81A1-11EF-9DBD-525C7857EE89} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000c87ca76093f26a325ed7a16aea3d74a5dd1f39317359d2926517a161b64cf01c000000000e80000000020000200000005700ea4cbeb1517c8d2151be09347ab15e700e5a1d6884bc0a2d29eb9d789c5c200000001eff303935de163faf628e8ea5ff446fe709aa9ff8188b877bb467ae91c2e355400000008dfbeb2293dc4712cd88800befeb3adee42638d54ceecccedd47ae98f31e56ccdfee66e05818ff9df0791d14a7604377ec99278a4a4bb24d92bc8dfb545dcdfb iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434133394" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1760 iexplore.exe 1760 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2776 1760 iexplore.exe 30 PID 1760 wrote to memory of 2776 1760 iexplore.exe 30 PID 1760 wrote to memory of 2776 1760 iexplore.exe 30 PID 1760 wrote to memory of 2776 1760 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0f860ee9f146d7d0aedd58ed0efa0b87_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4ba0dd249ff50e1d312e9c2f0c3251f
SHA1a60870bcd2a8e7d69c20b406b3a36351d883ef88
SHA2560420b8629b45f15c29bf0a264e16e209374bd111e8abb00bd8b5f91ab2e81639
SHA512105de6df07b5cbf47d463b1ee10630bdcabb6d840a39edfb2582100bad60a3cde343513385421fc220ed2e0688be08032ab99690a5ce226fe075b8d667160475
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57530515773ea3ec6a4694aa52f113e41
SHA11112d34dafabd254d48d201607c00754139081c5
SHA256c36ab1c6da6d63c3143fd40120d709146c9147fcf0f89ab009c0edf21bde00a3
SHA512dd8c8776fd1d6a8424727cb946962c73b366a66c2cd8915070ff3b6b270aa9bbda75c5818f292edb5818bd6952860ab2f8f26431e247750f25b6d5517530235e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5654ef92193dfa9508619a38fa905859a
SHA195dc0ec6ae8b114f7aae642641b9dfefa6a0c31a
SHA256b8b234b75a9a7901f47abfc5c2bd0eb9f17429ce3b8d743ccf33dc7752243c5a
SHA512d13b8f7ab0140709599298d43746557a8b287ee9d7461536769737ce834669390d286fe1bc9d9f06cb62b2150ce411072f8db2f6f5cced8e3454e5a0489f6fce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d25c7628321c68642b9baaa19959bec
SHA141cd97bd49c584706ff582337f78991119a4542f
SHA2562554b6ee63e54fc38a4da7f5db2c3b4e0d5d9fcc8eb1cf7cd83718f18e4bbd52
SHA512d8f6de1625f4698d463b28b8cef57f6da8d4cb9effb31c14e14827c5e97500c1764a64cf77515178382eb7f425f5916b393c91dd670f4250ee83479052456a41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af989e41cf57f0654ad692bb0a846017
SHA1c6e177416784afa84528812e110c1c845138fba0
SHA2566d67b5bd940f90a03120e384f5625d9d5dd0916a3b840a1082f62cf2e461f027
SHA512f9d1703c4ccb04104b2ee51f30ea1a2b4be358cb0194951a88abf773a7969f6811d79acd6e4cf5a0a634c94443ccbbbe110cf473b14589c5a97402dc0716cff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a254fddc0e0694a5ad4471bd448c8b4c
SHA1b76e244495751f65aedfc3d7fe37242bcaa9180c
SHA25696226841dd598c4f80e61da8546fbd6943a54f7fb2a1162bb1ed71863728fa6d
SHA5126830de97797215ee0344ce008bfe8642362933bc2826a4863105d8f746ad97c058ddaca8df4a73113081df54e8e8f41ebf096d323fa5a2b6f5e75af9b97790e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c03adec9c3a93ccc444b7a31c4420e6a
SHA111a0e92d6dbb6471e950d2e5dd5681c17154668e
SHA25681366de3a31077920ee71625579d7591089e4d77b50dd6daa40237a1f96a8fc6
SHA512acda5627f01bde7fec5aa139694c90886660111afdef95c6670878f383995b58b99237ae7a4ed76a77165bc0e411336520cb35d13a86dbb001637317f231ae7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5c9ec3f5700304a6df9edfdfee259d9
SHA170ba86d219c966aae997caa6a94c345eb39dc677
SHA25680677445ae42918b629eec9d1febd4f5ac67fc9808fc163fe5df53712b4f0e96
SHA512dd0841047d0f47b908af84f158d8426afe263745a79b045fffd88b4b867c7b3152df2006496bf76ed7c7bcf974fae48427a836679c0b8c6d4a058c24be53d159
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5798c66d217264ffcbf663a493a9495d7
SHA1a9e94e2ccebbecd7d90b74105c476983962b9fed
SHA2563ced05364537494a3ffd634347bea06408f4c3299e66d84ad1d3d5e2037b0d1c
SHA512163611595baf386cdf78bebd7dba0093105a5696fec99dbe7d06538dd249d7948e7840aa9e3f92c309e8e878a326a1f940cab75a9df7d1303d490d0f9d2bbcaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef9fa096650565e6ae37131f571bd0c8
SHA106c40ff74ba3ad3792a609cf5d63636a895708cf
SHA256fc9028c689cd7bc5299ac1e9084486990575e6a6d630bd8619df5a1ce84ccef0
SHA512b77cb7cb465b26f2922a5830a0a8687fc0a50ce186d7cc10e678d297a1ce6686f00d292f104387c54de1eb40b9b132a974c8292f0cdf209da645be28bc2780a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f7d0f1e14c50fa51692ef0cb038b44b
SHA178b6d54a643bc8fc374759c304b75a39b2c3fac5
SHA256934e5e067dbfb982b567cd262c35a995f76649cb08e411ba42fa5045a908ee47
SHA512f01f48af46736aa9d777a8e1168cf516330f9cbfd3c7dfd62a062212fc47fa79d05f66672861ec7fcfa70b4e720a5bff459a9a68ccf80b71779d05520b6221fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa82259918585231f7d4010dc08c4a8a
SHA1e46c0b52a206cb2d33a2093fd06f67e417a9dc48
SHA256293b143ab7945e0fa4b28797f734151be44ca29487461d5cf78d83b36b91ad1c
SHA51209cf61f2c741919cefc6b0defadb5e02f184a59e0e6ef00dfa2fa4deb872a1609546985c16e73b6d3165705615d6e4dfb2d1ac513532effaebe901edf887fdd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f725f6ec45651b559dbf669a8a3cef9
SHA18897c715ae1c303312ab54083d5e9af2a18c368f
SHA2562f0f550f4e3c8e1ff6f1f1ee7759fc6eab89d550f492ef8a49f3347cada2e07f
SHA512ca8444dd8fcbd1242b18d5d257e117396f1cc32410a0f0476f2ddec678a68c1e2c8e18e333d4a6914d265885fba4be99cdebc458a41ffb95855b06c7e58c2e0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db512895c9ddd07514fec75ba919895e
SHA155b10dba8495efddf572db48dc8bb5f189d30c1a
SHA25625d2d0139a1b5625adf0297aacfb973186ad31cc1c9ae1f388ac955f74a152d6
SHA512ae0d2b4697d3aa88f422942ea31013db9e4d2a5f82428454f594e2ce9204f8e67b7822792cfe11de256fcf490b539f6f77de07055fd7c7e4af1a9106dd3ebcf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9f803f9213eeee9346c5944b10a9e45
SHA129bf05a93956dc117a48eb0a390a3002a8dca70a
SHA256d9f1d8c4dc2acd885c3757c0388161e99f31170cd43c5ce4d7b219fa4e7f2a12
SHA51224e3011059310f25f48b757b8c34e9c30134daf99f18c9d0c8772efad26d2b8da079251bdff506117f9311f4ab1551a531716e74d9fad8f2bfbae6f69ce34a2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5158c3fdb26facbad0dc0dd102482df4c
SHA1ea01d2da3da1ee28d6df3c565adf3c30a3f4d1c2
SHA2566bca2ffa47d336fcbc05437a2cd1b7151de9e3db10d19fe7a61caf345256e446
SHA51286a54a11be64ce8546825fad8be93d2bcf7ebdfcb986ec03c58fdd7a42d5b0d285e5c70d0cf65354eef995d20dd3f79d2ae7083e3fce55f1a24a1f9fa0494740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f810f421ae756a3f023fdeb5557e65f9
SHA15285086783c19874552c163f68fcc0397a839f3c
SHA2563ee011f0322674d77c170a971ffb01be0360281d8099e041a3a49a99880ffc6b
SHA512dc06038d234c7dd107447b3867409d5bdc348c6e80235c3f33fdcf935c35259a9c6fa8ed791c9a1433765eac8a8e1156d690e9175ca592b5519a944080241512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57307ce0c716b2b232922942ff1ebd45c
SHA18c0eb9f12045de3c905d2640fe5b52aac0d89f05
SHA256e4af4045f8c5e74a0a038704527ce77c8c8b19ad5240bfcefaf40464a5590946
SHA512281910fab2190abbcf9d8a4951a2e8737239d132674b38dd827f4764a8aea1a1538677092f01e14eabc07533022d30bfe366101e6852c00f9e7e7ee9a588a335
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae8e1fd0d54c4ed32127bcde2b80da94
SHA19f006806f3ef30d1aa8632593dffc92db629bdb9
SHA2562822d764264daf118eb095b7fd9e1a5a4aacce76c66c94da1f0696526772ddff
SHA51205cb0a0f8040f10b40a619f42c4e0472751350cba856536697c807867faab856fe4bb0de08e855a28bcbf834beca54f82c44ec37643f2dff414194b408ad2c0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3f32cc601bfdf117504e556a18b7e3d
SHA1ea86384a736a8aa8f2d598cc3b12cc64f6085eda
SHA256389dbec50d26e904af2f3627c8e2cb04b8fbecda7f33ac31a09d93eb6c8b4fed
SHA5124687879d4d8ac610e77ba68dcb87ef75bab4bb55aa62ea0d7c937bc1546667536cdfa170b554bc14af13224b42a59de304b0e72cf94f961b6153220a5e6cc6ab
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b