Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 13:03
Static task
static1
Behavioral task
behavioral1
Sample
13770baba8349efcb4d5db1d6f3cd82a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
13770baba8349efcb4d5db1d6f3cd82a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
13770baba8349efcb4d5db1d6f3cd82a_JaffaCakes118.html
-
Size
10KB
-
MD5
13770baba8349efcb4d5db1d6f3cd82a
-
SHA1
046aa44e1c3c6dd063a363a7d98bef7c53047c32
-
SHA256
7dbca3e6d25a58355bb3ae24783d678015aac7b186988ad81e93fb58709fc97a
-
SHA512
8fc8978b362fa2b3dac1241a2906b938928fec2a65959dba225148e5a94265935e4373a265a10ba9f0bbb9ebb5ceb4110ce2f82d310abbce7f592b6e6034ae6e
-
SSDEEP
96:uzVs+ux7+ILLY1k9o84d12ef7CSTUpGT/kubp7C1qlVHcEZ7ru7f:csz7+IAYS/gy7C1qPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434208886" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{12E2F3C1-8251-11EF-9D9B-465533733A50} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000003b2bb65e6dcdceff9d8f97db9ffbe86d1ee921e30950710bb985972912ae8786000000000e80000000020000200000009317a73c94450a398c14ae923862ca4737975da54ce8491ee969a16cbe0d7e3c2000000010d8949c63495726adbb9036d1eb53587effd995b1d689506ed922456565d1ea40000000d34448d137db4ebef945c9d995893c6b1629ee7d50280038183e7205028016510552f8f4e0dce6d964513d3bc18abd6125d618e7f7e64c695a27656dbb51c5f2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 707f5de95d16db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3056 iexplore.exe 3056 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2540 3056 iexplore.exe 30 PID 3056 wrote to memory of 2540 3056 iexplore.exe 30 PID 3056 wrote to memory of 2540 3056 iexplore.exe 30 PID 3056 wrote to memory of 2540 3056 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\13770baba8349efcb4d5db1d6f3cd82a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3056 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d103dea10aa125910adb5ea645ca1a8
SHA1a3e7df033cd2159afa051ac57b32dc5c0986e7f9
SHA2561f0d04f45a62ae53f0122eb28783a114ea72667ccb20eb44e8e2af84315a2615
SHA512f8b8b7e9463a41dcca23ac163ca492c7b3695112933810d69ddbb921a2ed646d8a99e0337bc397a3c0de7c4b1556808c9f02141e59e7a7e41d3320278c7f77f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54addcad9c70a52b45edfdf675c6842a6
SHA1026dfbe0c65afeeec8c0571a88a6188e6d941cfa
SHA25683cd4c66cbea414f551dccfe21e1ace2342795d43028f0a11daba23a8efeeb2b
SHA5120263b8e553ffb31119aeee98e4e9162e102203b8c62840a09866df760c522b123edee60e998a449609d1c527c7e9abc0e43ed122c9be5d65b204fc38d5912145
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f05a61fcbb652a08c00e22ca2ed1eb12
SHA15d98de58e5b58b79e1f9f67649a4097743373d93
SHA256325a1dcb02c7b261fe83c4493c573fe1d9027aa7f1f359e87ec2f7cc6f9d5158
SHA5122511e1a34b59c1c5f9d3bf6180da3149d0940a71dc70e7926da28d5156dcda1ff5036193d587860cc9c93ae03f61e5b3036dbc2ff6cc33e72244c37255df5df3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557446999daf32fd9ef3b0ef4bddfd8e4
SHA19d25cecde535530eb2d43c779016b43ea8c38b5b
SHA2563a68cbb7fbd698aad17ebb2b051a74ca85025c14ad97b2cff5ebcffed7edfe59
SHA51237d17678de6a77a31fb6f6ba5b9284f1ac91fc95d84d343ccd201b091813777a0018562ee2f211f3a16606acea2650ce03114c5c84b9c924b6cfe4fa68341b0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584c0a039c8129d7e1d40c6c307e741ae
SHA15a9c4a03890dae8a818ecee574b257311ce46686
SHA256ab6b04a9d4273fa1175979f0190e7db085e834f0f3d2fd02ec0c3ac8db7765a5
SHA512b216072a2146d101a8c107cca3c453685844b8d4cd41c653b36d82d9803fc81eaf4fae2c28bdf72ac835de738aa8838a3656d953e172dc93fcba83fe5476aaae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7d8b8ef123de8d28113ae9918f96e6e
SHA1db687284aebab90eca44d4b6bf4376aaa0dda61e
SHA25613b61ceffd407f06db7ecd43b63803820840e7994d3c288188ce79845ef17cd2
SHA5128cbc6a41df926278ccf160e27801c736cdd65768cc8c975f56d508736e7c2e5f4ffbff67836352c59d5b6b78bd5f6a32eacf7907ade2f9a9dc11886a036940f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bd0029d36b983bf13e5ea35b2446793
SHA1fea022939e998390009ada4fcfab1990fd178b5f
SHA256e869f8af1c63296123bc40d9582740965e223201c0c790d9f974c7ec4d3771a0
SHA51247bab12f2752a78cdaaae020c66d84b48d32e28d69eae262ba74decfd3b58c9fd255b7bd7d4849794e5edf22853cb952ab033adb7dcbe59891f61ef36c297a25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557d985d6c23ee79e48f5ea4b41dcd0c6
SHA147e08bc919f49b7f0089f46966621d7777899318
SHA2561fcf9950c106d3fdfa22e137884facd080b3c65738ec5a0c546d51bc505a5e0c
SHA51246e6a7b1de04a1aff8b821e14b66418e0598fec5e2aa39570c8601a8aaa2126822dffc36a532faf107299203609c46f7751e4e98757dff738861d95903c19ab6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587eab2c7ec9b1d114a023d1a53bd90c8
SHA1d62023d02157b984e1a51a2a548e8a8384781d69
SHA2566078dda82902ddf627c8edaf385e45fbe4e529cd4bb4aa631aa375a4bdbba2ed
SHA5121ff5bcf92ec8bef64d6a42bb1b4256c8c9e68a848945b535c7b4c92012ad0131682260a582ceadd6e7cdab963c9b379ce4d231b38df1a30ef6f050a5502ce74a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55460fe7deccec98cdf4861eaed6e24d4
SHA12f31bf2cd034644a187c6fa2e235e365607cce65
SHA256f25c5610664ead0c77c4b85587654dae4acb66ed55ab2d1e7816710e217b009d
SHA512f46be2c29236e91b1d37ef70b73d78ad36eb4ec767031128f85d2806760245fb499ed4c7efc7a688bbd848160e94faf604399a4a3f7407d5a3128eadc8b8a9cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d53c874734366b619044ae377284ee20
SHA1e29e9b2823c742a83f95bbbf163e281d5707dbf9
SHA2562b25ad556beb32d4f2a1e7159e0a8b818c196411386a5cac2f65ca9d49fe0a4a
SHA512ade7c77bc27c765f8a98c59bd826138fa5f5966017f8b67a8ff0758955af3293dad3f4aee341a56b9931df2117ee9b4bfc4762af20b0147380271228b433f3a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f60ef364d6f79f5e026c731af0bb72d
SHA179ec597dc62006bd06ef6b305b940f677805eb69
SHA256de530439690829494f50c9a9f10aab10709e027ed572ce17c3fc7f0a9929504f
SHA512e4d9347807442e4c1a42c60f806a3579fa8e21b9e0ae75036f612d8793890f347636abfeb8088159072915b3b17521d66852cc47e8ad26b835a770e378d121ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5187bc5bd6e9eea5676cad960c7593b8d
SHA153086cd91b8ade7e0d9e56f8e81cf3c76918447a
SHA256ce39ef6a86ab6ef9a57d7c0c765e888014f1706c1d5808686331156f8fe43fa5
SHA5127a7c25c8345c81eb8f0a74a3317bdeb8455eda292e1e91d8c773928a8be0a3e5c645698e9f1ac560271d689c4540052a999dacb556c317885ec91fc7e8d8d3f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e06380d834fd5b403961b44811e415a1
SHA1e811fa0d6a6b5972ea34fab7d023e60705112b82
SHA2568d23ca18e08a75eadb30fdb0eb634c893f615479136efa0880227236f1141b74
SHA512063fcb1570d27a48af017d8bf4d138e56d2781d10efd72f2260f49bb793a0042549de19c2fdabccaacfe3f6263088370d80b31936099b9f2b58af3a2b7c5197a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ef1e510a731ea7f1727f07db73ff4ff
SHA187f807f3bd5266a3990415487c440aaff56588cb
SHA256fcdd03dc826b33eecaf63a62e1114994e8f56af0a4fbf5209b764b46b6b462d8
SHA51252d70b76af3de37087e843ac0431ad4fff00680b52b57a492070704b040ef3df38f973aced8c63a62c3c1050d3f7d1a697a62cc133b7aa5f60e395c03eaff9b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccda2ed4403ca02a1315678179f7fa73
SHA1ff507c4886782018fcd3b1dfcaa1a8c34aebb13a
SHA2563e801f7b9f58d5623a5b46a2b646cc47c9ff0e04472813c6a85e2fe7de8e10cc
SHA5128d617f55c09e04469839db48701fca5f182dbbb32287cd4689100f73b01c7bfae19cbc9cea20a90b036ad3e6998466ef4db159d5cec7a239e19ff3f5827bb7ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ae5c3dbbb89e51e81153cd401fef5f4
SHA1af36cc8a6ff162626bab9c00aeb8310004c77200
SHA256de3f3fd9dfae5b6ba55e19615607df224abcbdc8e7f97baba7c8ece756fd09d0
SHA512d2bdb9db9ecdb62d6359de7a2799b2ab850e23e919e4059124a850c8257b34d1547e23175ce58f0a24d653e0e968ac5a845cb552373ee254c54d56a23aa96329
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4451414746a11824a1a6f5adf757e28
SHA1e5328f2ab5d56ab40daecd4423e8c114c108f3ad
SHA256a263e86ee5f0a86209030f7730227d5748809a519dd6079a8e4aeeae7daeff80
SHA5124bca86d0c4d8fd6b23707191c30c7f20bbca9e694b21b341c37827f3c6a029dc1276c02f5793c92b11b7cc4d3a638246a4da93dc5755fa8c11ac213432b6cda5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c61526ba852944f2d93746c0949b606
SHA1724a2342940a3f86a503a8f4bd9237e9244df5dd
SHA256fa8ca7cc1adf01151ab1249a50514d68250437f62d6eed83feb129927608e9fc
SHA5128bd3ee74fce8725a0041614fb0659b36a8a708a464b889ff9141091546b984450f5bccdfe6ae3c87f74ea1aada71667ad92536ccb2bb53151af0d4cf897636fe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b