Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 03:58
Static task
static1
Behavioral task
behavioral1
Sample
11bdeb9d103a71b06421b42cee95d332_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
11bdeb9d103a71b06421b42cee95d332_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
11bdeb9d103a71b06421b42cee95d332_JaffaCakes118.html
-
Size
10KB
-
MD5
11bdeb9d103a71b06421b42cee95d332
-
SHA1
b6a1eb75f797aa8a992b5f23899e28ea465a08fe
-
SHA256
6b434876370d551bfaa7ebabe9404110581298a3465f559d920909a65cab08b3
-
SHA512
63e5759795ef88881cf212a990f34c47d6f240c5ccdf443d380b9948a80a37cfabb8eaa6636f686ec6ed097bfc1794b7acc8143afe2cffb60776f9fe48256d11
-
SSDEEP
192:csz7ccAYS/vqBJ0IaRX9/cZ1JxV0PHb76f:c/cAY8vqScoHS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F4591E81-8204-11EF-B1BD-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5045dcca1116db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000003d460a9c30850db5e585a7a66eddd916eac82bc06ce41146e0a576cfa5c6687b000000000e80000000020000200000007c41d2ebd163143cb36551d3ab5804a81f837b133e9d38f50084f51d09cfc78b20000000392a4d6c534dfba1420c2cccfad78ef96b31fa62d8a2ee117338c33952b6536a400000008148af24650d9de534bb210f531e13b2a821a7f9e446a7396b96a223d250481513a75824f95bbd0c1fddbead4f5c9f9ce569218a3d3581b3af838517612f88dd iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434176196" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1272 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1272 iexplore.exe 1272 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1272 wrote to memory of 2508 1272 iexplore.exe 30 PID 1272 wrote to memory of 2508 1272 iexplore.exe 30 PID 1272 wrote to memory of 2508 1272 iexplore.exe 30 PID 1272 wrote to memory of 2508 1272 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\11bdeb9d103a71b06421b42cee95d332_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1272 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cb7a2f55f2e10dbe33037fea8afd28b
SHA11e71bb76a23da61c5ba00b248af538088bd36fff
SHA256322f79b78f77170a0935f3a7aa586d295d07d17fb809aee388d7f627b76fc5f0
SHA512343dea960d4037a29a74f40e554e1f3491476d946ad90d56b93e62c0b2544af402d43021c07fc7339c415887da6bdb201afd891c8bb2edeb3b672d208faa1d61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9cdf130ec5c5e6bb6a9ba50b261e09a
SHA1feb6e3a93e9a033278f77f9cde9e86924fb96084
SHA25691d3538634af09f961a7319744c16b3cf0d2dd2a0edf67c7f114f6cf52cffe57
SHA512426236a928b273bb3d5fc6435f47dbffbda3a6a5b02564629811dc9254f2a8182f54fc42e9d617e299133732523d202129ae0d6b822df642d783c86a43c6a062
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e3355dd7a326674e1d04513db5b408d
SHA10be0bc6ac007d6e153784f92ef07f62f22e02927
SHA256b9d876212d2fd0d0ef515042d7b4fee68f065297dc2cb5114063d8f34c712918
SHA512a91c57a6dc68fe086f3b1ca34e82ee5ab5662b6b324e84a93173ac66857b0edfb0e82b50632f3bc57dd575e54c9ac581ee1aaedc291d3471221da4db9c7e05c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507f9c8758b40a556038bee33b1f09e6a
SHA139803b51404cd20d991aeeb087574c91de8e1e74
SHA256b6185ff30172f2387288186388af39f2cf7f30883682cba1061ce3a60df537e5
SHA5128c8d00b8630eebeae9e660f7b7092f01bd537cd24bceeb068bd7b87814acf41740eb15ec934953d0072f8cc98903c07ce18b694bfd4b4432ea67034098110e2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5257034665c9122ed2d6cc944cafe4e00
SHA1f0c450895e5f0812d31d57e3cc5c9421df59eb30
SHA2569424147e38ee3d2037d813248460cf9c60c421e4aa15fb3c4237d4dbbc81b71b
SHA5121007a0e6d247714e4a6d006d69d74ece03ba2923a8489855c033ebf04ba62efbd6dbe5a0e6753ea2f09f9865140d94bde239a6eddfdde5c46e4862cc9dd8a25b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d76bc68798b291001796d904c387a277
SHA1cb3621f8f5520d42f2de22eb1bc6d4704ffdad45
SHA256e47a2269a07eb6dafb5a28e630ecfca7b1b0dbcc587af39f2e6e6278e6aed70c
SHA51292613b2d39a2c93be0d5929ac968d856a3f0c6545fbe29f845fe1c248c822d2cb73bffebd059bd73412e4e0a2179b3f0902cf59844d2c795507a2ee8cd818ef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa44376321a37bff67bad2f5021e9191
SHA12784d11bb062db28679ab06e35c841def9f83d9d
SHA256b396de4a90ad9adf529f1a005f8b57088428d76e7db52ca7b489fb8aab728215
SHA512065fdde3d5da6dfca9f9072f6dfe2adbf25ca4d9153f225a91ac3db12477ad9a4464d42841f3f28d9b86ea8b9552e8546334735d33b08bf4394c5f261e7f1d1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cdb18e5ec192b459754955ca189be62
SHA14838361d318e7b81e55a7a0289b8f3a6eaf9f98a
SHA2562552be1405b4e87c5ecea583e70fb0831a8bd64951b3b5db89770b91faba01c1
SHA51233794ca72bcaad1d73fb17f1ee668264555cdab78ccacad5ecba769b533cb1c1728ce2596cac684bc5ab16a0eaa51646d68e4d33e3946a21e5ff804ed32e1cce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a22b45bd96b3c06a2acb176dd1ee90eb
SHA1191e14476854e7638ecef38ca0245ce96f653045
SHA256fcbcc69da7b4f539eb2d58979ea0df68cd9741466513b0cf2b30ecdbae272e02
SHA512228c5ad6fd38633d1ca4838ba0bb47d8e2563ac518b70268f693a276aa444a7808469fd8ec09968c8bb60270d4ccdd9c4722bb57e2dbe6c46392e98b9f318ed8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f6ca9d30c37ac659169da42aa7a8516
SHA170d328b8cd407b7746b3a1146b0e87e464940bc3
SHA256c323460e1dbc51e70b97682f2849b1d6cd91549267d0a2174f1f49be1385dc86
SHA512f2b5bc6f93bd16a8400ecabf0732825d98385e40d1e4f2b653dc7dbca3f6e1f871b5cc62b56199c7aac02c280df519af082c946085addc58e1caee9e62d3e3e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e86fbe8e16ce84363c52222b54397639
SHA10fab64417b3c324e559ee8ca6aadfae9c8de7af1
SHA2569c23a64dda40061a16af1bc4ff9b2fcb5366189af345175c5085f1297f7b1a6e
SHA5125000c543218b51e10ed0a4647060c216c495b773b5dd256f62c994c42d5bd7658cd5c66fc32fc4c126df01a620aae2e949a9aedad77195b6fd7cbfa799d0f247
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0cdf07b73dc7a40277c809ab15ac62a
SHA152c2b5e09deadac3f6c0fc14c716e83080dacb0f
SHA2565ef0a7f83412924168775a467262472814309471748fdf83dc1c04306c6297cf
SHA5125650b685c7a11841b80ffd7e2845e94e4a18a3421e72ede823349beed5b7719a1d3d7848bda4f2dc119d675cf4c29514f1ce7a1f4cb9bee6b8be7182e32c25e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c3cef3fd751be23907ea8d6be6b7089
SHA18521fefcdd0b59bb35e31cf66fa9821416e6a200
SHA256b803edd48f82f4d8d94da6d587b21e688d048f7f5a073d2b8dee21d9734808b5
SHA51225b2b09f826ff16298448779e8f44360ef099672698303109027acc94b2e5e39339e7e83f1b650c4a8c5c80eb3a5bb5dc64daf6e6892771d93893e0be6773ba4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3600663814d4bedaee33fbcf6103b46
SHA1998e7e4833553bd3e2fe2618866c8cc35cc26707
SHA25679bb8317765fda60a2e9f59174b5608f7076a73893f41a552baa82cdda844d10
SHA51244f20948d6d1a4db6bb7ed6c888ef7f36db6d96a68a708361178211c6a30c4d01a54bdcdb45cf2b73a15eba4f986e68b23d24ae3ae3f7b623edbcf3015489351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a214099320e76be2db575fcbf0aca01
SHA1ba4705e8a34f5ed0d279cbf09631fd177da83de5
SHA2564b606cc19dcc4abf7f95ca45a17132eecf5efc96d893213994feb19a5a619d11
SHA512d0f81ea85fb5c4b6388205e8a4680c44b7ebd8e9702c538de0e430686b1faf167ba1b1c444afa3976389d7ee03f2ed110209bd37eab8b3ccfb48d414a47a261c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5127ecf6029cae689c6e7e1c673cd2772
SHA1a588c45e2a38ef9c6166729f8452c526eca8640b
SHA256ba9584ab7cf24f13fb320e8b48882d0f295a11c5f3ce694bba7c2bb4a70200b9
SHA512a4790183dcdcd5259fb092af5cdeb17ad2d915207628fe48d704866163c5bb663176c3b22c78da46f44c839028e4053f8605dae2b2f5929e546578b2cf4c7dac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5455afb561271821a05fff27b0dd6694d
SHA19a4f2cd30b4a7c56fcf79bf4f2d89f298cba8dc0
SHA256db9d557a19572570785cb6e2f7ee5bf4f25ef4075e6cfbe179fbb8daf0d0c1f3
SHA512279a33d0963ead4aad04ac6cd56b27a2ee240728d0f98f4202dfe5e10b421efec607c66b4d41a05aeef0b1c2f642dcf1c9b217baf3a5e7bef6e1999014f9fc48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4cb42494f788b7d470101c8850ceba8
SHA110fc3f6bd9460e7ebc1e5bee77cfc5b270f49c59
SHA2569177c12bd8ad17dba2a7ed31cd13177a78476ba71039d7144ebe83a040155de0
SHA5126e3b58c59f3de24c04abea8982359bb751266440a9ed4a50383cb540483df72243db83d418c93fa637c98a3eebea22d78f3cdb16688e10f6e7f2918f53d92f5f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b