Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
01-09-2024 01:30
Static task
static1
Behavioral task
behavioral1
Sample
cdf4bf9a1db824ab7f1f3c93ed08fe14_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
cdf4bf9a1db824ab7f1f3c93ed08fe14_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cdf4bf9a1db824ab7f1f3c93ed08fe14_JaffaCakes118.html
-
Size
57KB
-
MD5
cdf4bf9a1db824ab7f1f3c93ed08fe14
-
SHA1
8f110a9f1d95b93bc823f2cea15a478206e25cb6
-
SHA256
15a4338c08bc2c2471c27c7491ca5657cea2cba5c35690bbc5daca9d5975974d
-
SHA512
07363985efcab9ec072c7d16bcd9954b46a7dc3558681be3887dd30981c6e56a8ed77eb59c533173a3a8dc39d6a67fcd958c077c7bd09bf6fe1907cdd54eab43
-
SSDEEP
1536:gQZBCCOdi0IxCcTZyfwfSfkftfgf7fzf7f3fjfxfWfWfRfjfqf4fKfJf5fEfqfnB:gk2U0Ix24KsFYTrjfbJO+5LyAiRRsCvB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf710000000002000000000010660000000100002000000011a99ca53612cf5bbdae301dedbd638b71c38848fd44027436d9d5ffc91137d8000000000e8000000002000020000000382e0f92efdb45fa2236072fc042f4c8b47a25037c65e5710ae8a064757a57b620000000850e3e9ca91876e4b92a61ad0b65303b731aa22e43e9df7b6d51f6c33a13f4d6400000000e834e6a818a62855ffe7e4245dfff2bb7533590c57c17ba4f08c4d7706225d0816b148917ef26747df9c0a8be1d06c4c2062e3841e893f3d5aa53dae52861a0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c054e3a20efcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CBB547F1-6801-11EF-8ED3-72D3501DAA0F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431316108" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1652 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1652 iexplore.exe 1652 iexplore.exe 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1652 wrote to memory of 2004 1652 iexplore.exe 31 PID 1652 wrote to memory of 2004 1652 iexplore.exe 31 PID 1652 wrote to memory of 2004 1652 iexplore.exe 31 PID 1652 wrote to memory of 2004 1652 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cdf4bf9a1db824ab7f1f3c93ed08fe14_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1652 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5c227513d133b7585b8dac9d6cfe29f0c
SHA10cee5fed4e7433e457368b35107062341d290377
SHA256a55b144f2a4c1f51ed4a0e88ef36454c4ac54cc70d089b0a24f718b145d1fdc1
SHA5121cc5cee49f9e9730203228005805bfd2aa343bb6c9650c8de57d188fc825523fe8bf00514375a530535f5c699f98d184fc7e36ca37da5767e7b813f17cf4b81a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f174f0756720cbcccb23781dbf897954
SHA166e87e54ce978567b46576d3957c75c28e85d18d
SHA2563a8b6ee16aca4d6de5c9a6af9b721be2b4cc632dfa97f2d85b0381353b0d7250
SHA5122314af0bf5eb56d797e29c165f1a287b22f4c822fa4182def90695696323a2ba0c1b9b91f56ca609d02977ca31314dcccf9f3e2247435d0fae50099ca6581524
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bab1e8a2599c431e078086b1a1ab6c7
SHA141773bf78ae61e335cd31adf451fe46625b0729e
SHA2563b35411e2bfc407aa8edfd7e8a01e6a12debcdf7f83ec14f8dd804c69931e900
SHA51298ec3d8acb34cb1a05227bbe996080b8f9bf604d991ca09ca06cf34e0164007af4e090b5b2dd19a0ca9ffc2c38f3842fa19663b37d0ab2e24dab308a04648c48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535ed39a0b79ef83620f310a620305dad
SHA1f06c6cf1c1e062c4a124e78088673df81e9508e2
SHA256e5c8d5cefb55b146e0f813d7c147df0c984a6f0af321549be7e9ed131fcc4658
SHA512e7f93c4146d113954c5b9e0f59ba79f61791826ac1c4763f1e69d6aaf418395ae86822c81721d01bbeb17a8faec39a1b711c755da45a92be110a35c5efb24e45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b51e2fc9471e093232f29430a5bab055
SHA1531de1fa4a5735cf51712b09f2c1368c64f59c6e
SHA25624db6648c88e24d5c2fa2b054cb9a67ef8708febc07840d62d8ff156ede3265a
SHA512b54c36da0b0d1146e3231ebbe6afee326f38d910a0e47e4733aa76d768b0976887f6a5b327b039f0ab5681475591127e44e1986634b373eae669b4e74bfc559e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbfbc17200a5e717aceb5db4537ee184
SHA1b0f747b5355c6a0b7bfcb97fe4dcd489491bb886
SHA2561c61083f54c8c293a7d3bae19d563348857de8ffc3876df88182eb8f36e8c40f
SHA51226c7b9391fad21b3631656f0ee291b234374e450c6c93a79b15589727eb442b9ad0d715f821830b1590fb4cd438d410b4148b663841918dcf23d6c3df8160f0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f43e3b3eeeff04e04d9156bf03535be
SHA130244a00d0d78546f813c77ea67a6899e8bfd49c
SHA25661efa57a8c01405d67b2a0c8ab778d7fb8ab9e60360a07c5c66d835ee836764d
SHA5129e29b588070729522c922177bdfcc1595560f819afe19487126a93b1c6a84e1c9e535a0fdfa9355e7c727bba487880ec54210ba22115bbddeee68a001a270ea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fad31e0788e939a6cd8550a866748e3
SHA13308b250f8abf32e87542dbe99f697ddaf422125
SHA256a0051375c19fe70ae8b08da753ed1a95d374eee918c09cddf1beda1278aa135d
SHA512abd944a84a2ae3b461aada614ddd460a3ab8383cab5ae584b9f488757e4214b649d0297284a45a7c9212e6bab25b4230048f2937cae33ae410b9fb238455405d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56217251bffc6982daf39dad348e5870d
SHA1850214aff77bd990cd7bd7cc0e2c8c5fede01f3f
SHA25617cf9db8cc4f9f6298f8ace4d11275ec3ced0d7a5631ccc798d5a201f930ebb3
SHA5123bdffce6a066c007b299e7ea6da9ad6c19a08217b3baa81eac0f9b97790e8ea19c19d53446f81fe7d70d88e0ce6c500eb12983e80c2b541b9b55019a4840884e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566e9eb41eb0142fe8027dbb802b2f624
SHA17594fcd59f78b598e5bd4e48e53cdccdb819eae8
SHA25636b6085ec4c9832770322278337a6c90b57899f1aec22ecc506253af30259ac3
SHA51266d924d2093ce9cb1319bf2ff3eea8415fbc4b21e9ccee596b129ff4bf163be5fde25d992b3e11ebfd23338b18a64ca0ecd48852ee28e6f3acd5c37edb7e2c2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afc07e6f27cde79505bb05d330763b13
SHA11e960f7ce6e99a3d34c53d66188d64e1c724c91b
SHA256e91e449b345d6030df91d76a25208d0a500240c243846e2f7f360a06fbc7cd16
SHA5128364710b8a3f774a92f241d491c181b87818a593308a54555121b26ff8f6df4b072869b82a471fc378d768ac6fc501db23a7c7459723b191521d601c5e5b01c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1b0f1714740d57431b126fc8c92ab65
SHA1603b5ccc006ce5986e7ec7ba059cf7a0f74093b0
SHA256e2f5af998994c4c6c9162984260031a1bc8c5c52b6a325cb63c88fce74201d95
SHA512d8b9f65dbf7c49bca25a29847ff7bc973719fd8d5dba9d61f738a5b5856cc0fd80670237b8d599944ffea29d139cd84a8a70b4ff5d14c0cf7837faf02f5d195a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508b339fa8383e94d3cad9bdb827cf2d6
SHA115729e8f5a2296a284c12ea195b4be9461e98b44
SHA256d6ce0f44f1cc6ad63df4dd516fc4393441351d3a05dd4a2ce5ab4cf7a8e346c4
SHA5124dbdd407b264b1466fc1c354d9defea232ff5f0b4353d1aa80a93b5c3da4afe79ad4450e81be4cae01ff2a855c8feeb5fd8f410baaa26b5d10257f56856e331f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eae0fe99c532dd9b5f906ca1ddea1ba
SHA1afa93393b3baffa71872d61ba7a195dc55c072f5
SHA256c0a3ba116af2dff0352d77abdc35c3dc4583d51acabe102e0162acd2f74296a5
SHA512f0b98defff2ccd313cb14b80f2d614016a30a8fdbd2a5e4d58e08e0152f4a305aa5a5fdb32b97af0c9e07c54c5333d55c864ddea3260a2eaa6a6f74cef223e29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574ba0db48045d5203ca2b594682dad94
SHA1689e5dd349ad5479d094d2f2680ab79751f44679
SHA25692c81e0148e6f0c7bc961af9b1fc3f0a846f5d4aa0653b4584133d14ef1c2bdd
SHA5123257236a11b53169f9dfa63d4f71dc8323b5bd2cfc37f03ec3897fa0875a0c714d4dd3104584175043ae398defc0fef5925464c31ffae69132c99574ae4f17d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531bf0d58da6c44bb4205ffec0bea3e21
SHA116fa86a092b22ceec2b9676e314558bcb87bf917
SHA25672692b40f65ddab6f1311eca0f6efd24ec10f79d19684a494ca51100faaed108
SHA512c9fddbd48e0170115e38b70389454471f8e6143bec0b0e5f3813e4593e75e96f90b0cfdb82adcf25b4cd9d0dfa7a1403c437890db35c9f66015bc7b64731158e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfd7f36b0910b4f0cbcd573b333aaec9
SHA1f2fbebb8226be0dcf8b601dbbe188734da92e80b
SHA25675ac39a5a88039cb3229959c505163cceeda433e184f74d0b9452de3123a0a4c
SHA51227b60a492010326f5986d6779ee834a88a53c267bb2d641d53840971e969cad9d41ec5c59db01fe6f90a6607088ee978099f649b3fe1b8997372205422dda3cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD580be9857826dc0745290d25f1c1c5d92
SHA1d1e6bceb973a6e35f6040801e0bfc12cad76a927
SHA2565520df1d01ccf85a39b7176655152517d4835c5ae0db0aafcd262b5fd767792f
SHA512a3c5fc2e137f223fa84b631b0b4ee802be19a203ff19b3d193cbc7884bda49bee9252465fd69933e48226f982d4339c1190d2a30e4f74db9b94cc3281e879be0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b