Analysis
-
max time kernel
136s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-10-2024 13:00
Static task
static1
Behavioral task
behavioral1
Sample
183062d1a85ff6a7433093653bccc6a8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
183062d1a85ff6a7433093653bccc6a8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
183062d1a85ff6a7433093653bccc6a8_JaffaCakes118.html
-
Size
19KB
-
MD5
183062d1a85ff6a7433093653bccc6a8
-
SHA1
864f7d0e82fcd91c5f2a664cdd7ea55b5dd0b248
-
SHA256
c9712cf1a5226da89ec0a4d2ec9758b727c6f33b18e24178e0de2836724a8574
-
SHA512
fb553700a941f4c5fd5aa27b1f86476705d3e095fd62b2c02646a1cdc2c08e1c5c06f1c25a48a2e46053acc375018b665024659f11a7d9241a65e1bcdfe4031b
-
SSDEEP
192:pgTIzAlFODGL0cMv1MAak1mIBZ1GpRCVdNVG52vcXI5TMfY32ZRcZqM:pgieQUkRVyM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10c1b4c2ef17db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434381484" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000017538a0e2eea008cae6a303e2b6b9101f185d6664a690b56630dc03bb37a18df000000000e8000000002000020000000f9fa0551c53a0f1fbd1861980144d989b7a8321d0946ea58759cd3404a783e8720000000177db55df4e98f875723a35440772d087b45e099482572e9513ea1581d1a59ac400000001940bac609bde84501d65ca702124ce53106592966aa817cd98d91b6abf13b09c77eba23f9053163255dc3df25e04a750a4f324de3ac47b260387cf68c771508 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ED5B4561-83E2-11EF-B0DA-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2440 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2440 iexplore.exe 2440 iexplore.exe 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2432 2440 iexplore.exe 29 PID 2440 wrote to memory of 2432 2440 iexplore.exe 29 PID 2440 wrote to memory of 2432 2440 iexplore.exe 29 PID 2440 wrote to memory of 2432 2440 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\183062d1a85ff6a7433093653bccc6a8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2440 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53961e722e077d7e8ff42057f5ad12133
SHA1e4025a645b71e9f1cd9f8f4273079a63ed825176
SHA256ec39f05c724a8fce9e771eb556ae3a7dbc180c86743ead0af45334b4690341c6
SHA512040c19b95459f1618a94e4960fcc32f4cab04c8d1ea54573e6ec67c41833f8dcf293165f68f46319cf08b08954bed34447875f7ecfe7ff6a40841dd7ef5d2533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d7fbce908d929556180ac4ee2dac002
SHA1abc0b14556061b102f8da833b3de8ab40c4d7005
SHA256758767f3607b80e0b285c0b28b3bea1aecceeb5c2a5b91f6ca1bc12523420238
SHA5126890c0790efee2b9543f72e8129bc8e0a9e5ce5a79da9b10b7d6a69b874e3933264cd00b987bca566050528f5165dfeae7d9413c0380c7397e54b6ccbf2d8911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ca905fdd166f9c23aa1f9186e48f8cd
SHA1828d2fc503c8d8fde4158a103688276d2db64f8d
SHA25687938332404f0613e90b91119738d85eea6ed3338e90c2e35bc22699bf3d57d5
SHA512853ab3016a8fb90f7fb9b8f3e253372fbbf8d11d7d70950aa702435fcf2d8d399b8ca52e02da480d76532cc6670a803526c69238344960d09ba08e6d55d35c91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fc39414570217d0842cf8ca4b8482b4
SHA12fd766d8bf8d912f34d0e05d96928135dd7b041f
SHA2564e639a6bc60ae7dd49c24a5c59c7046b5c6106255e5e2ebdae81d78f7c884d40
SHA5127a70a3bf99e20f90fedf56369060f6ad980b04e8fc36723864715a163bf56d6bc1233265d3ad8c3cabfd2124975271bbb1c5aa63ec7c3c88040e5d969a1dc848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fda965c9f3b863bad4101897e08435f4
SHA12bdbaf76552c396d44238f3cc84c567ac9540e9a
SHA25690673d0cf2f6bc7c5d9dff647db4b29afb6dce29cca564f3b1c3a43ca32b7800
SHA51253eba81002ac44eb5d5fa60feac94cff93a36d40b264c207316f44572208bfefe71ae66f088f726b877751d842bf5f3639922740dd63cd0effa913d6dd945574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5931d20b6305a24764e222d92d4235bfa
SHA117ddeed7c0a28d6973b555efc3b7d5e75ad7cec6
SHA256a644b7bb5478385056df3dc2c0a3793b3447d9a7963480f089ac175448f487e2
SHA5122220e03fb333362aba0037ab8fe98f6410a57015b705a48dbeea4fa95a339706ce5781243157d80af820752d888c47f2c1a2810ec8c4d591d6bc8deb4c1ec3ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3412602b0744c9a434a255fe4eeb7e8
SHA1f967cc13cecb619184b3736d5971599ded792917
SHA256868d3f90acd2722befecdcf5d5ae2d8d09f684c52fe5f2c56dc340afdaec4f01
SHA5125d3aaceeb1d2ff2eb1766a826374f220cce5ba8dd1c354710453beb911e970505dae0c77ec6ca020b7b9b57c0884cd1762c860515dee57dfe1a91d5f2560b739
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7962a08880bb800ae1205c372f03878
SHA16e59e90b84899494e5396890808135bf01879072
SHA2567173aca756ba2a19fc42114acbe6eafe92f8c465ed60ab37a20940ff28267858
SHA512d62be0f049e4dea54ca732c970e1432fd615aa9ac4d4c8c4484353154433cb21bd1d7bff8cce6ee87cf5a49685de884c5a840dfb6229de8ed76263a5c224630e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf49a8091c5b37d279c3e2cf590e568a
SHA18fd6a978a35f9251d46be6c4725354700364d6c5
SHA256ce25a192ec553b865f49ef4517d12d548934258e527d272aee1c881aa81d8478
SHA51241135281da6e3989dc594d1fe69a09bb7be18faee71380cf86fefd1e37d5a4ae13b04b2a8d9a5527e763c93fc44cbd99c90a3652c33a70fcb5d55dff7309950c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5363169a6825ab8b1623ffdc0c510d4a6
SHA1d2910d504ffbe0e28bf287200189ef33b2ce5d2d
SHA2565bbe1cc2921118681fc4bcce7e8d48b6d49aa01e28fc416f56c836d1c168595f
SHA5120d277f08840819c8e52b908687878759586af692fccf5970de1c51f2eb65e25081d06cd6fe2a275ae056515bbed351bc5781cfe3c2a15c4377dcd0b9566d563b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d251063ca5eeeda8fd397925da260e1
SHA1c2d5c77b446deb8dff0df5ef0388dd47df37cbe0
SHA2563a337bf19e3d5998a68fe0e779d7ecfe1aeb9317813190a2e67c3c7bca68e6fd
SHA512b93adeccb2ff9bb5211ca30116d03e770a48578626f452e79a8ff65e25d8e1c1985c3a7ba80ab5dccda1cf347dc497ce4b0342d4aaa3736189d9aaa4d246f41d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55720637235c2524cdc23721c1b7ea8c8
SHA10bfa467db2ef6d31f915acd2a9697adac881a5b0
SHA25639607293e46eddfcf4dc982e715cdbff5b24172f9407afdb7d56c028f6fa9651
SHA512c6bf494e02da0b743b5101821f8da2f6cac60fce49287960b3b9a9124a0f107c3fa7f8019fae569b530d072c75e6662d35e7b6e4e2e03c6a6029a2d6a3733da8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d24a93cd1b1f15846a25a8ddf2c85740
SHA11f0e8eafd63eeb70634335236b95c3fd902ed919
SHA256dcb89bcacc20ebb55132bff5ad5f7ab2c02ab8b5162e5e1f80e00f98cf79df05
SHA51286190885e11ead4bf7eaa98c93c22d6819e05d5d5685480b8b0832050b017949025751ed5d530c45055e54712d6716d609f3e267485a929563ad1ad1711e868a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511c7b65137807860c7310a158f4b57ba
SHA190abe05315341fde3076ac642fc16f1dfc6c4196
SHA256d391cd6db49c6521a09c0afba4e0b4908c52389f464aea1c6f913b5f0619e8df
SHA512813c188ad0cd4eb9e93f69697e32d2f2b6a64c451e36b58bc638471405f7531d64ecb3ade33d4c38a40d7a5a6d13f53244187802e7aece4fdc14e2458235adc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580a2514ffaad4ff612384892278272cc
SHA1125c921ece0c98c5137fba5c815c00946ee606e4
SHA256221c30dac20953745460e05314cbf28b85d8433fdeca2e6ee2250cfe485ec09e
SHA512a76851059243f27df37d5639d622c7823cd02df65e00e36a39b26ec08cd69c46baaa65dece7dbf240983378d3f066fa9b8ca8e4949175a1037a869416bd3e6d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3a2f0c5838e34c119bb89608a533087
SHA1c5a2d8a02212456eb8c1f9e198055aaeea1b6fd6
SHA2565116d1f0c116c756d42a3ff079e3a130fde5fdd811acdd82dc528b4de4c0bd95
SHA51283fe083b1bed9c89e94ed63b7c6e6c516da89faf1cc9ab97128f37e766ac2859911a69bd696efd1aad7784f7d5d53bdf75d16bbd9dc7de83b54faeae969cf680
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5964761b76048ab96db4ddd4d31a6b062
SHA1e8882fa51b857d216e509d19108024489ed4ef22
SHA2562921a273297f187a85aa0acd18efd608406d156daee2505802521c6a6f03350f
SHA512c16abac89da2e44cc4e2120126f88d6ee938d661d2b3386281015a661936c017d473b65bdfd4ae406baf3cd2caff42c5af72004ca6705b12f037ebdce48c72a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558f7b354894475952a260d578f272630
SHA14843e1e8d7e71d6da6de5a5f14d5f9e5e57b5e9d
SHA25662b1bbf9fe106780e70613f5891ccd6d23c7bd221c2ddac98057a9e7a2ad624a
SHA51286b554d1b81b609099b35cb2508a73c021af0a4be07c5baf2fe10279508d5d7ae6c603587efec5cc079803f3ffd558e811d070cc2918869b655071ae6f696f69
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b