Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
1362a96b346ff4ca0f8f79c90ebc91e7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1362a96b346ff4ca0f8f79c90ebc91e7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
1362a96b346ff4ca0f8f79c90ebc91e7_JaffaCakes118.html
-
Size
10KB
-
MD5
1362a96b346ff4ca0f8f79c90ebc91e7
-
SHA1
d1253d8550dda3acf976a2b993a392b2922f4be2
-
SHA256
bb8abfa7ac9b91df1f7347560c84a0aeed7924fa2d762cfd7862383955013c3a
-
SHA512
84923c1aadcd544bdfd0a10cc0a3740a0df46bd786bc2a926098060d14410df41283e218afda2ff9ea6c6a0eb3e65bf7e7955f095283fadcea3a1b440be56b5f
-
SSDEEP
96:uzVs+ux7lGLLY1k9o84d12ef7CSTUeGT/kSBpzrhufGet6fqb9jKtfs7glVHcEZe:csz7lGAYS//iVeZKdPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b01bce185a16db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000073319e8a1722051eed5ac1231d52eb49fb1d5cfd068f367002a682bd339e9612000000000e8000000002000020000000a88e9f414931d0cec2549bb334b9d079b6dc9a4738e1933cafb0c527a5c93d4420000000b70f7cb6c4b0607a04dbedf7f052ef6c7994ce130b2a2d0df45c21c014bbe50640000000087135f6d41d30caedbfe1c2597a112731842a698d24eff32c06fd8c3622f1aedf68537df9db3029408898545611f200d4ffc3e707ce903b9afa24ef383deeb8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434207250" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{43C6AFD1-824D-11EF-A0E3-4E0B11BE40FD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2708 iexplore.exe 2708 iexplore.exe 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2688 2708 iexplore.exe 30 PID 2708 wrote to memory of 2688 2708 iexplore.exe 30 PID 2708 wrote to memory of 2688 2708 iexplore.exe 30 PID 2708 wrote to memory of 2688 2708 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1362a96b346ff4ca0f8f79c90ebc91e7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2708 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5443467487bc1e2753b4488ad9cd2af54
SHA158e8ca063dd08be6d52d9fdded0e8759866410c6
SHA2569d55c8bf2ce669c90fddfb87c5c940232d69a23ffcdd1db59459259983491471
SHA5126de6b2dee60e559733e42cbf0a6f24968475f6406f071e743812445ef7f701d7366c861c3a1461e54ec58b9b17237947747ee0a5fcd0e672e9ef669e740d979f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55aee9459a68769cd3622f64f6de2b11f
SHA1b8c5c908fc6e9e2b4ca8c2e5583a0d79fe6ea820
SHA256f0acd387c01204046e87c9709bd2adfdbc7c557d30f6a76860490a94e8e4220c
SHA5120d6c124e87769c3da41742aa6ff1d6b9963a98bcf71ab8ed427b07e31496222d2959b3a05b3e84e1a6f7d9da3d5f4ee68b53602af165df61096ad9a6a1264382
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbe640b68f0b5bfe3cec121ac3982835
SHA1080e2eac2ffeb33e934a99c9b554306c875d893e
SHA2562f7ddfabc1fdbc9b086867a3d01c1ae4a2ae341beb6b7cc6f92900959635b758
SHA51243b940c58be8959ab4db69b0756c83195e325624ee364409ec21cdcfcce4e957852846234ebdbd7894e6e0908e6043da18ef1f2cde9441cffbfdc8cc69ddc926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8328cb6f5914a7484a711e57dac69d4
SHA15e3d991fe39beb252c493b66da6d8915a8802b3c
SHA256fb4d1d48852f8c25ce43937bc0bdd40d36d0338e0c1d9dec3b382d91a188d9ef
SHA5125ada165b3e3e97177a03428a65e8bfc588bf2e2aead3661e9f1d7625691ef5071c938b2d236b616a403ce8357c5a64724c514b7fec9d2f1a8b215eff240980be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a61a1e1697f041f1900c0eadbc841c0
SHA19b677027ab2692388c0bbd5cc190d75d902b7c91
SHA256dde1fe1690ce1e2476372969cf11141322419feecd9efc0b54cfa3ba787600e4
SHA512cbae310bda37ab8a7e7722fbea516f36a46f57286f0bd72c3e59dec0a5d89d766022e11746ad8a8e8b43f290cd3181227d75bae64d8471748efe2c06786cf882
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584845f98a16a9fc2527193aa5edfe9e2
SHA1ff5ca0e740125b40d5361d81b670d4fad5373ef3
SHA256730d10fe208e462e23ad1de16e5f05a8e6c50c3ab7dd400630217f12cc4eabc3
SHA512efaf17bbdcc4ff1d26108704ff9b8674bf799d532ee2b9c463a0f53384672ec0c41a8f5aa18ef641a2aff0666cb1e5f3ed44dfd397222a801d2497048173fcd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597f18392f82ac455acf47e8d828fee2f
SHA173bb39cc808982440deac5750b78a4dbf366b6bb
SHA256570c8dc212655c44bb268d059e7eadbae433866e3c261e3703e5a27b7d999ae7
SHA5123e75a65fae22128117ac015c808a2a83aab08b8875328c2d17fb6e1603e6254aed119e3dcbb9ca6fb7575c36cf563e70a5323bfa9311ef119c9b460f84d733ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb311e1feffe0fafe57cfa4016e85c2b
SHA165c860be70439684180e9d2fbc940fb6d50297f4
SHA2566d7d73de2d0580babce336a10ec20e50f1a926fa7a3231222a19800624daeaf9
SHA512f20feeb39e5187c5c5324d5d169954a2b714d641a2c9ad6a64a36268ddf3a34da9cfc1ab5ba0bd5dcc990909b709db71fcdcd8885bd431380b624ca4547f8f72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575d8c5ef851efa9f36f3e38fc18dd5f8
SHA1db14fe44ab4524dd6d3c0800871efef54e8fdf43
SHA2566d2787e1e7f9337fdebcdddbfa14c90abdf1cac98b91ebb5298148ef5e831c98
SHA512d6dd49f48b49efce603843f93ee62c1ee02173abfbc3eb6b7ac50dc713e62cf7e05af57e4208cbd823a6a6b0186763ef2a5a07321327d900ca5da321d319e543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5730dcf52ab8a758e394b10608222c592
SHA1442b2291abb8e36d086032a99bc9b3c0f06b0d5a
SHA25641cec5651f1f942b2245edeb42971882c39c267d046468873835410ca96075be
SHA512d795790be2a80f47adbe5b999dbf45fdf9f43c3b2dd3e2688e4f0736e192b462fb219bd861de0aeec3f2136ec5b83fc36a445d66a9adb746e769745f8b05bdea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f67681c368da65d620d63a4617834f2e
SHA1a69b976b5e80bec3769b484bfbb9475479b618ff
SHA256739915cedecb0c4237deda41d0fadb769d94ed5b4139f71ae2fbbe072f33bb8c
SHA5124797568a8c4eb1d2f03df21840a8ef8b2238feda97a2e92b531610788cc23dcb4c9459668d096f635a8ec86e8790fd29628aafe25bd7fa3d1dedbf9005493e8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511a9542f8dd99fa2f876da62bd67d9f4
SHA1edcf8b5d9419c673cd22c0262319a5d35a843006
SHA256d01e2dc2bf4a8c16975bb3880296165928c8ce98e75de33ea4752473716ca2c0
SHA512b5620bfa19744b9de982f8df467d8f58b12f5a71227446fd6f01906946dfb6f3198652fee9d44896cd6dbbd71bd2788580eea47139b7bf56f8589a7c57f277c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55558056cdf1b34239518637755b9239e
SHA1a0fd9fe5ea2cc5e1f112de968d1be2848b1358b0
SHA25606b0d3df542a6dc41ee738b44ec21d9d1b4b7812f17e0d398280837353c907c9
SHA5122c5e949feb4f9abc54ded1a7cb8a54f316d1853a11ccdfab34a566430c5edd4ca2b4c32789b177bd97945ccf54fea508e48bdf65313b39a23f3ad9c1058e1e67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51107c04e2a7dc78c813ed48c51d7a298
SHA106e077a0787d1b24339dd6c186f9008e2b14a92f
SHA2561bf2e7f35d91d8aac2fdfb595f577ba9e3eda47bc6dfe068af02cb2fd5752046
SHA512cdf5afaec24c1ca7963a612fb90e7f45edc92e5a73e24a23e525aaed0bdb36cf23cc15cadc92e0f5b207d20950659d608fb4f40e17769c8c2530802522c1f8dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5554d0cd0a8d5af4f1139bc0d4fe5fc58
SHA18be7c48507f9b2e4e2c585b350fb8614cd34b857
SHA2560176f396e85796e31f9f64c2c0d5bffbe25d5b9b7ab9abbffc1634613d648e7e
SHA512167394b6e58545abd3226b7a297e25ba5fec8a2fcfac907a46789c5e89c4704c8bcb74ae1f1127af449addb8c7d32e04965a0903fa0237d52b011374efed0b44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d888878c1adf87e6c1b699943b709f9a
SHA1242a59a05dc1565ddd80bd8c7927772f451b51fd
SHA25689224e8e85a359cf03761510e9d8dffbb399df4872f8beb415cdefd14c6c5c87
SHA512935a1e24f889f9751f6cc71aaa2185f49f9c2c55d9e47e0894270da5a9981d2d31acdaeb14fa8cfbaedd2f664cdab7347c58f2dc7999358314658b6badb56588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a1eb8011db0203affed9d390b8dcff2
SHA1239307b3d635e96b719786c180ebebdd9eda222f
SHA256562122af2490a850633151d71380c958941d02da44887c78e1e71e372e8d32ed
SHA512cd0d2334962bce156adebf4eda6f73bdf128efcce74fdb20780bb27c8acdb05ecf4b5b52f0549ded52a9cdd31de4172c5df27a4f3cea0035fd2ba8cc02fc7e41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547e136ccbc8c8da13a2bf4012046553f
SHA11c3620ce50f745b34c08b36c1ab5204b6fd7fb8a
SHA256efe506fa7e52fcd2ef59db027eb23decd6e347d2531ddc967de88769de0149af
SHA512b7299f642cd4e3957cfd095ea4affde78c39e708def5992503cd4d948f01df79afc8b6bafb137fef6a5f9d5aa1224f7ed5f62839d67850b31d3323f7450d9a05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58641473b22ce5034a8e2140c71bd3205
SHA1fc01101618921680b2a0c8fa8052d8dde714f78a
SHA256674e5dface4ee8c0e3f0573548cc727a8af43c87ee409d57aa784a315d115892
SHA51217c208a5803ce4eb7b994159cc1841b9a631982a60416b9916af0fce08920be82c9c1daf319964dd47d495a0384fad676cd20c30fcc8495264d5de7e1f719240
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b