Analysis
-
max time kernel
135s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 18:31
Static task
static1
Behavioral task
behavioral1
Sample
10143da005b28d2fd5456d4d29deda1b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
10143da005b28d2fd5456d4d29deda1b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
10143da005b28d2fd5456d4d29deda1b_JaffaCakes118.html
-
Size
12KB
-
MD5
10143da005b28d2fd5456d4d29deda1b
-
SHA1
2f7752b43bf5a511aaae92af0ff69dd9a9cca91c
-
SHA256
61e6bdba8ab69a2f58c70e48fea815f4da3feb64d6532e4ed6e2d0b85be3cc5e
-
SHA512
7e0536c2ae5d1770cb544583c54fc49ca68130c91da732544ec4aa6b0c36dcc226af9b9c2c1c8f1798fb9699f62e01d09069a044beaf74e9377e94c0fff4ab81
-
SSDEEP
384:s1lIcJVwjJC/guhB6ZinWbZip0Psw8guLZ:Ug1kckxLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 709f22a5c215db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434142141" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AB2C6DB1-81B5-11EF-93F3-6E739D7B0BBB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000647e7cb8833dd047b00213f6127c7ba300000000020000000000106600000001000020000000636cba3fddffd70eba406a42638354de177dcfb952e6660fd345b960eeb7cf0e000000000e80000000020000200000008f35409f0d2aace5f47797e2e4f0daaab6eee09c8a2b448286db614f75f80ddc2000000088935dcf12568590b98f50b5d70b265b20c43e9594f72d583ed090ececbc81fa40000000421ce7dd5f19cf8f7c0c1970ac4ed2b8a1dfce848b4f750277d1a44e75a69615246cc5f48fc546efbae32f50910240824f856c46dec55c8e51b885f2501c2c4b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3024 iexplore.exe 3024 iexplore.exe 1200 IEXPLORE.EXE 1200 IEXPLORE.EXE 1200 IEXPLORE.EXE 1200 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 1200 3024 iexplore.exe 31 PID 3024 wrote to memory of 1200 3024 iexplore.exe 31 PID 3024 wrote to memory of 1200 3024 iexplore.exe 31 PID 3024 wrote to memory of 1200 3024 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\10143da005b28d2fd5456d4d29deda1b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5704bc6d3daf89a4b5538be8947a912
SHA10020ffcffc597188e74030c5cdabf485e48979b0
SHA25676118d4cf74d12371655dced405110d147fe45607c23a49483cbc30c92bed28f
SHA5125b64091cdc1c332952db1ac444fcb08ffeba31be3a4e81fb6dcb60aa9e8f2b5c6bc54792e17839adfe14d22e77a25c44e585c4b8d8c319589444efc24894666f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535fd4711c4fd98ae17502099f2b3d09f
SHA1df6dc07c693fb9d99851ce83f18cebd4e22b9e7a
SHA256708d402f0806ee75405ab1b3142c42cf9b0d903de41dd73dc371ca055a6eea62
SHA512ce53cdc3347677b59c105fa2ec0cf562312c55702dc7ee20db2280e6bd31ff1162beca2ce11bf145582ce157f15ce2b51a4c6dd882e0bc505c49260e12e0b90f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e76277af8bb6e68f0ff1aa9d98b662c7
SHA106eab717dd029a9091a92ee936e038a50d5d2d6e
SHA256c8fd17e0e961ef7664c38870dcb93b0650a283da96234b139c1f0f2377cdff75
SHA512635fd2b7a2c0b5692c7b11956db6c595b9b80c87c2cdfdd089f0f979f72d217633af63cf7970ee5d31f296f1d45a079df12b69e45c59959fb82721525167463d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a273aea476586658263ae2b815814ca3
SHA1aecac3cb3046a40a82df2c31b31495eb1b8df738
SHA25623648727327769a5113f613aeb132e95a78e273c1d4baba734f57cf1ef27dfc9
SHA5126656f1ccf4974b8cf4cbc2009e6e72e61fb8c2d2baf469692169adda5b9358dac4eb1be1d1825dff93b8e04e7ff017eff9ae14376dff0402e51e35a324ed3516
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fe1eba50312b3a65b0bc3ebd4792c54
SHA15894f36c97453bbc182e6a62ff5ce49693ba03f0
SHA2568204da4217ef06980b2edd0d73bf0c227cfbc83ebaf68dfb365ac85a59ece177
SHA5120713641006f881ae2bbf031a3444fe1285add6f68bb674d6a3eb49c07a658e32457c6cd3efd92121039d12c7f86522fe85d4780ee51719ea0ab5fc6fa47b9792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560b4b9f2a3ed914af779f8ccb382d29d
SHA13cd648f294ca98757ba41334ee65426702710732
SHA256e141e46a9c1305dc9e69aa12cc232c71c6d16027b45f61e0e1ee8fd73014fb4e
SHA512432fb5246d10701ccfbf8efbe7c21369b6308a00e49e25aec96d16bcfb631480d0e4d9ad368369a7cd4f48205b0d55ce6a2ec927c9ef318e3151231a60c53b9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58417c7f09be6593bcc063571e0ab50db
SHA1372d83ffeeaabed1ca6c04aef672276e7569b882
SHA25678a8f945b4a721f38427ab3d95f8ab5f9863c191cb9a6a4efc1e2fe06b5e2f2c
SHA5129d94bc42a7f7e77574f7b0e8d084b57daf4e157de87450d335afbc7582ecebf4a2a619a6a0e6d53b3247d30e56249f6b9058ab8b7afd2a48a591a632048963b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57efa2fc38e0958c57b9d8545fdb8faae
SHA19b3b224591cba8571b049ba8637687ee6595b9c4
SHA256969f19f3d47db512dfa461f640522af983d82669901ccff5a5e6389c4a12f8cb
SHA512795f1222f2bf6b975c01225d7155f01450e012544b82464fdd09be7d4d02abf747a8de7a5249f98e61a9fd109cab762e4ba97fc5b630961154ae7a24c59bc454
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566f9f744593bdf4ea12caccdaa78018e
SHA1290d172500cbf495b19f3db9e1cc61ae57b6150e
SHA2562a45ff71069cadfc2cdaa1514a48eee26bf64920dd67b7835d732e58121d0119
SHA5128923891ba575304473803de87f6755b2950aecd4cdfec8e3dc01584a99a9e52314ad03989bd5a7fb3c10353f61635ddd3f39eab49fd99a7cf3e85ef61ebd889c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad64441113f1aa07e35e4a2ca70e6a0b
SHA134862e82a1118c524fade47a90bdca8837ba0b65
SHA25639fd165b723c22bc6977791a97a2716be230948a5df951619a9d2d019749356f
SHA5120a97847ee1426a670cb274f485b6ad7fa6b19c6a5ef956f890cc9cd61c71962678471fcad7ac14c2beb55e18b050ab201b1afd4edbb366826a1b80df7c9329a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581dbd7fa8c482244e2b4096e97a6cb13
SHA1800f51678189af3413ad90c0ddce268de03a9212
SHA256045a10cf74a6aa067b15bc354ad581ba6c16b9d402cbb634116eb29a1dff398d
SHA51268870a58ac9bcdbf4313e68e0236a5f920a675cd60637b96d6a8211a31968e73d5e1a7094d6bd34b35a081ece07283d9881e371a7f52efec183c3f3cba71d2c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b29a3e318a9a63a2625282aff28fa848
SHA1594160ea88aa6078275e3822ad08ade371713d11
SHA256eba977fcfd483cf72652e4bd8982d39e1155bc35f219da73bff40aac248f4f79
SHA51212284e2ce5e986fc65aee528950a4e2e8aa63f7ace7a49007bb6857f3325429787751bd96584cb7a66d7e1ef9dbf1b78b52f317af21bd28eac01a970b3e1522b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a9ec2f31f5b02ded148f389b415c369
SHA175f17ed2380272a112c76847b85151a5a08b2e19
SHA256a2ec309a66a5a0f78e68e09b36ff6ecfe87ee684c2647ce782968a255df506ea
SHA51250ea6f86bf0fe0a27bc35f24d97a824fa78d14ae8e42de2a586eb7bfec08e616921e5c737d176d0c35f2617e66252487136b6f224efdc86b4814fe4969534d22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5301f2b8ec3dcaeb3bdc643bf17d5231f
SHA12ed3612706b3a11c71e04fc3a8306765e3b0d9d4
SHA256ce113ae45832eeaac2fae32df661d636298d37bcfba40dc7a4798a403d2f0b93
SHA512fb6a1ef3a394dc70ca430f113b157cf3b664e6b0fa19da2381cd1a7cd787a8517562e5ec72d00e14170d195a6db3b53c2887e22f40dd6b9b5f4c5b091b820538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e57a79cba52ad8b97b960cd9c7f99f1
SHA13ba1aec191032ba4855f76623240f7e225743ebd
SHA256edd4f17d068b3c7417bfd04ce4ceae43c6f2671f89e86fc23d4f5d4d0ea54d04
SHA5128917d034625797003828fa4e45c06bace08543e5dc3a58b98765e05c283cd48a4e733e460e8f18a06a6c46e29913895025e4dea07db931495c4ce89de4d2c40d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5062e6f59d5a4fdf40704d38e7862e66a
SHA1d13460d64fc220f41df145f0651cc1c5e4f898c0
SHA2560aa811868b28b75f5c336e9147acc3678c2b457f24cb27548bf1e1946276818c
SHA512a24f9453d3abda684a7775c9eb3a74e585efc0aed1f2a705526159091187a40fe9bfee6fbb80796d087a26c447052aa90d0efbaa361d43ded2055712c5ff4471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac3a3d15d90e721556d61b0d7383adbb
SHA126e31082831ff9bc9430be0070ae45f36e749a51
SHA256f61452371b9dd540e2e19dadc1cd3d75bb208f53536b072f116947b7bc984510
SHA51219dff55f8bbb21b83994af2b7e7354d33fabe794b5e023f084c71eeb27c99dc833ad9e9aade2a8bf2518da3e1c38c7725c48f4c754576067fbc6e6f662f46652
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1c6b2ba58e0ccf4748a93287408d434
SHA1ddd56c0a053b1d2e7f844077767f5478abe6c160
SHA2567c5e64df4c083ff7b005be95a12c0a0e4249a9941dd16676c5439456007ad960
SHA512142ba3ac39b75d6bbe10a8227e4046ca66eba3d8820f307ea40191fd2a5242f7e868928b762c189de1d835e7322a58aac2106959a0ad2ee9724b6be2ed08a56a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b54d2d66dffb80eda83932db336ca2a
SHA1224779b0cdf83104d982668cdbc0a7907788e3ad
SHA25609f219557cf4801b2c0aae3eb3ed191bad96b5f3a59d54fe0825de65a8c3e9dc
SHA5129c1eef8addc2ce1eb97e49c0ad4e4dd7261cba1038ce1b8dc11d3862b4c603fa5d78c8a2b0739d1faa3e6bd450ae6b822bf2c6f88f7590ac7f4b71d27498d2a8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b