Analysis
-
max time kernel
140s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 16:28
Static task
static1
Behavioral task
behavioral1
Sample
0f9eb81131dcc2c19d01793414b9d0f1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0f9eb81131dcc2c19d01793414b9d0f1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0f9eb81131dcc2c19d01793414b9d0f1_JaffaCakes118.html
-
Size
20KB
-
MD5
0f9eb81131dcc2c19d01793414b9d0f1
-
SHA1
b685df3a2d66ae6223fff749e13f4d1c1ede0d87
-
SHA256
7f8ac91684b50e3dab8e833b161547595d39691bde08db0be86239f152a00ad0
-
SHA512
8cb835362f18a6aabd9a556bf33e80b06980c422cd2e45308b74ab7cae31ed3dac1440a9aa7c180f522c1067d8b24de48bacd1f68de1f72c8552c265c46a828d
-
SSDEEP
384:4+QfPFd9QZBC7mOdMoauKfpC5IgSnbmFe7AcId674HEPd:Zcd9QZBC7mOdMowpC5I9nC40EPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000cc0a63c335e0b85566f6bb66781579d30aba9a5c95de931f0d99c164fc77015a000000000e8000000002000020000000251a11ae38a2b4b94b5be396eefe8d97519769554b87ef6e58d3ed8414c6ccf020000000d8eefb2c7c2d0a01c26e927318b9c45e64869e8f69878ed3da5dd8f71d0026aa400000008e9e22120df55c59fac503454ba40b3145d7f2d372728f8938c91989eeb8ae5d6b1d129a5253f7ffb4a28ba92a3787eb635ec21fecc70d272ca3b776917b9904 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f069af57b115db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434134772" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{819FA631-81A4-11EF-80EF-5A85C185DB3E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 584 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 584 iexplore.exe 584 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 584 wrote to memory of 2816 584 iexplore.exe 30 PID 584 wrote to memory of 2816 584 iexplore.exe 30 PID 584 wrote to memory of 2816 584 iexplore.exe 30 PID 584 wrote to memory of 2816 584 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0f9eb81131dcc2c19d01793414b9d0f1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:584 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540adafa2478e845ad43e6c31536c6bcc
SHA1097321122718421425a400cccb6ea9cc1574363f
SHA2569e18b25d18f40b6ed942de1370fa08d2e68fb01f4e8790ecbe18c885c3a1d324
SHA512f153950c293cd876548e318ff826cbbad3cfc259bd6cb3d0b051452a02a5324a886e5584f8cc5a79981a07ffda53852ab3323f5945b3ebb65a928d6487931f16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2906845af83abbac0be3b27c5083e96
SHA1f856aeb54dba890d59c68b4cf949bce7f1ad4167
SHA256c561f0945a61b7e7bc3bc46a30b71a79becf3cd888cf876471ee227381abfe35
SHA512aed18517b508de708977646395dca43dfdb58527117b99841f7227c713440b6298b88693907921cd8f08c44a10c8338a33eb10f316001bc98ee11c4661204724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ad2ec9f6083b7a9fe96e74ceca35046
SHA1fcfc0845e895c6fe2b6607d7d44156e8f89b187f
SHA256cef9731b0e0d1f35cb9b00eff905efb21666acf258df96a5c8a3c3d9a35e64ea
SHA512dc54308b61e521ddb3ee6ba185d2da7d0dbc131b66cafdc622f50395b7c6302600a5ffd504febd800aa05de16e6ab92de2c0efe7eec143dd4315bd59800eaacb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586afce395b6f3dd0036a6a02a8dcf194
SHA13aa714ecd4721f67234905c9ea0003d26d37942d
SHA256796d6628e85166b7368c25ef413f16728fd31c7f8cff23b9c147eb0d8ea8dd37
SHA512e67d3e7f51139c0567ca2e336b79d371a11931453b2feb69b183657a61a9d5932dde99414ee4f9087e49972bdbe76a38a1ad3dbc889b23c36937c642d74af360
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dd80995c835e8f838b1aac41a74f85a
SHA13d218ee2b5b3f03daf54ab83baff1df3fa3fbbf0
SHA25699239a9ae4f61219f803853999acbd2a4d9101a532241e24c1a616530355d1a2
SHA5125aecb3aa94e53d1070d6c72a1179c0fe1685dbdabd35b5993e1d6e98b23e334b010e145ef5ba150b227f313cc25bca021a4e79f29b5f77982d903dec5c54f520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532c91b99851fdfcb5fe2251cbbeb37c2
SHA1ff279c41a62df553cc20ce4ebaa316dda1757d9e
SHA25643b0c15e576f57f842e7c88f29148202b138607ea72edccba951d7f5ee376122
SHA512e96f973ebbddf4e6d9cc208b8c0bcaa00048934e5c570bb4a80d94e2600d6f8344947fe92aca637acb5aa07965f4bd4386823a341d34a3f320cb758db11c6725
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517cf539309a8197a16b2bc4995ea05b7
SHA15253fcf2930d635df31eb1a8aa6e93b6d11fdbc3
SHA25661492249a7ba028cc5f75e6756baa68d70299f7f5ff5273a2e0678a6bf6e75a6
SHA512b79e56f9cff26aef612ed0783b2aa3f4956e82d4d586f1c4354d2cd65fb75dad04f7df5381215942db3e8e1373c6ac03fa24049f3cfb9b65162af6e3d75078fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaa46cd1b4c8a20a86c5fa8f00b88f0f
SHA1ddd6bfc60690c3f1d23e4083df79fb76d286a9d7
SHA256532d5b38e02c990cd8cc32255c66cb125a037badf918332be1067972aad04acd
SHA512754226bbbf74d01721f77ed2ad47ac82d5f073a01696d22b1606d7a173bb156d6835fc9c6e94b1986adfa8a8c53e435dd1fd9119e3dc0b3d85ac1372b81f6e3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5810c11b7742f3d36df3cd0f14a898de2
SHA1b576f972f97c7dd046103650f8d9e7fe2a983d96
SHA2567e7eeeda3a268516329c4544a3def8dbce81f5e3a2c0f2a65349be91b53fb857
SHA512a4aea3c05d3acefd12a7b61a9ba3865d5f30090ec4e937bf78e87eca67336136b20cc0e35e10432c0c76debdf26d042dc3ab95237a2083ae9120db7a8a814b77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5804ce485ee4b7cfa0d9a4d6b33138c8c
SHA1a8a0a169dff1f9555dc68093c381b00d7bcb96b0
SHA256b9f5d22f91df25c76fcada9cd9a3bb027db9e3b05cafeaf4758028b6283a5799
SHA5123b11bb65568f57f4229c604f56a3cf88b32dc683acab8e6df3b26cac861764dab0b7aa15d3872b2ff29fdb324ab4a20c2844ce83aefd49ef5baa2e9009f65ee6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb642ebcf1755312fdc3104ce3123285
SHA17d1b541f4029eb4cf90ebb677fb5d14101136694
SHA25636b77cb086d601b596c5aff3cec1d42417bf3fd89c60e65e5d8dd7d0c25a90e2
SHA5123070adf5f31b2b8e72502817dde0c09e5c7018459eb37dbd60e359e8d2b29f819c10c78d77ab9e481eced338d9e53b8b33a5a9e9f2c48c214a1a00d74208ea2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dfb6b7a80be11da025d360ea287933b
SHA1c5ed6791290b104a442bd4e3266815f039f5df74
SHA2567fd0c1b77fe7472900e178f3b4e6bac3fe8d42462852517b47a82414794652b4
SHA512f55a003eb7a4ec8432ee20a2cb6828b34089e735cbeee914c5c0772464a5c8bcaeb0da87bb5cd37351a090888199570ef257b35c9fb31b56f2b5ebb159065fea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d411edaf5e2ad77ae9a3dcfb0c8bd75
SHA16c295ee14393caa017a056fe94102058a3cbdaa8
SHA256e6d5c1c9c2a563ad514588a199ed4b64f422b3de4b4a79810f0631565df3dee2
SHA5120cb6ee68f699f2293462cd9f5241ee7a9c15f59ebd6668f1db29a008724f6471b9b2edd17b60c2bd4bccc32ee43b173f0fb1b68aff894ec56537cc4ffcd1fc06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fb27e419d52569fa0f3f908d53b8e4f
SHA129ca4359ef35c5ec467ff8f258cb8fa6f635cdf3
SHA25667ab2f84311bb87a9f6ca8573e14974a1c13988870c3511861d72668be1b7de0
SHA51201739fc4e45e5f6548e937b47dc5902838fc19746dccbf169ee8b3e17d87c27462f4288f0ea940f47959c3f018763e74163b03241b0fdd605447e5994471042b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5e8ae9d3f5de26152931216beb2d9d1
SHA12150e05bb3ad190d10bc5eb2398eeb962c975ad6
SHA2560ba3b264b441be840e4182d1a5145b8c1ed0f1e69b1500f3ad0d3229d9f81eb7
SHA5123f700f75ee5c7cb3e6808a5464e99147ce93d886ee35de360f650b6ef0092415cc6a98c0601a4dfca8c80c2aca97371c474ef118517ce8b3842375fbf8094cd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8c35a9016373fc83368356424391b81
SHA13c629132965bed24174541bd1702bc8c0648b975
SHA25650ac1bfcf91c95c6ec8e711fade0baee8384015143533ca4a8031d072522982d
SHA512df0110da2d4ef333cb73c16b82299f21a512bbeedfc41c031f3489bf16967a0978d43c28fdf17d50d80ebd7ca14ea62fc944df60f1252dc6d453af6d95dd1cf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed0d7814396d19619b92ca95ba851436
SHA11f5468e128cbb3c3b50d25bdd76e4a91892f8d64
SHA2564a9e21359f5d8d07bce1c7594dad47a423898041211f3a8f9a9350b15a7b4654
SHA512b34eb45d13658493fa6c9ef9123ab4d9885d78fa3032846aed44782c4c86585ac69c11b8943c09e3ea03d44bf12d7ae9be6dacb7f0eaa3bdc3dbe08d5104126d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1e2178b30dec8e56080dd9b2da6b4df
SHA167a1a37769a57c2e56c6873dd986c04150ff4753
SHA256006f31e0834cdc49747cb4049800d22919fe4f8e79edf2666ddcc15447b4e551
SHA512213e7631de0f8dbfe4434d7fcf28a28b13f080d7cd59efb93e5a4c6b7d9e2f08e69d58ca664f503e9fa99e19df5b3765dca7b801c3bbd3c36deab283fe6b1cff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5928eb263b1c47715af994071253a1cae
SHA1bbbf2435afb0d9b1142a7922b338207a298af177
SHA25649d21b7e71021cfbd6582a6e17c9358fd630a05a0e0fc35c92995a9fa2c7aa25
SHA512f7d256715ca2d2f20d09cb244b5a1a639e78f8cbb38cceb99b5b7d104428cd0c57b7ab149f710066e314513574f5268b88d9095cb520f7655f66972ba42d47e0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b