Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
05/09/2024, 21:51
Static task
static1
Behavioral task
behavioral1
Sample
ce04ebff47e7f170dd315835764de12a_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ce04ebff47e7f170dd315835764de12a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ce04ebff47e7f170dd315835764de12a_JaffaCakes118.html
-
Size
5KB
-
MD5
ce04ebff47e7f170dd315835764de12a
-
SHA1
521ef65baa178ab7c4362e7f08a3b7765f4eafba
-
SHA256
a74ac9a962f44867787f7245da748345ac3e1ae8325dacf512a6b62879170fc1
-
SHA512
97fcd8fff13fbdb7b53ace5a755025222b2ef4e99e24b97dd73e70a08252afd508f3c336748ff24d713011c06c44fe9ecec2cb63c18ebb91d202e98e5ee286cf
-
SSDEEP
96:gVf6wxDSqgjhZ50io7YMtF+7SqgjhZ50io7YMtF+S:U6wxuf0iUPFRf0iUPFF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0B3EF151-6BD1-11EF-B856-666B6675A85F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b00a67e2ddffda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000693d71449051107cacf3daeabbd7ff707f7bc06320f1487f444caacf08efd15c000000000e8000000002000020000000e9260f3dc25b34f8c11e069db670d60118018b1dbd4b26a3747b8a6b75f516ea20000000acd778933b033c83773712ec482b5d0b077459de7b742bbbed6b88b320629f5540000000de9bb3ee8af4fa7a1d06bc40c219f22e7dcd7c25fdf8710a51816f5adc65a5c2862b7e7894a27b73ae734e1b6e1a88b55caec2857e94b22c187d7b1c235212e4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431734972" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1200 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1200 iexplore.exe 1200 iexplore.exe 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1200 wrote to memory of 2304 1200 iexplore.exe 29 PID 1200 wrote to memory of 2304 1200 iexplore.exe 29 PID 1200 wrote to memory of 2304 1200 iexplore.exe 29 PID 1200 wrote to memory of 2304 1200 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ce04ebff47e7f170dd315835764de12a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1200 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a345a7385dc442b02b07f152897db869
SHA16a985d3a53792b5ed23e01bc96ec19e7fd786c5e
SHA256a59c2938bdf8251c40a4181c6e8a420f745ed566232888380324f415cb2a5c72
SHA5121df58de715a3310bc52973beee0bc9ceb4c62d7fca88f1a67f9423f406084b812c235add7bcee4a02f43e043a6d4a42fa65a369109ef2c496075a28189abc32f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5289e6b4a9d18443d155b85d79d627b98
SHA1f24dd1c492a20be51ea5b9662c52c1e5f35b5d88
SHA25694bf2078b37c2b39695a1a2c73f0402197cb42dc9a3277af7ad34e5e0c872f4e
SHA512ebce15dbcdb77d733bdfe745d0b4cb1005b166ba2e1392c3f77d32a0d6a9dbbd995b9a4a727efe3fd0d5ea8d27fec133b0c4ededa3565d1a2e48184446cd0f5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dbce7372be6f377f758611e910133de
SHA1d6d52502c26cd887cc9493abc7b1503a1cf310c9
SHA256b6306271877b004c154b965e217ec4618e90e24be30519d09aa427b180c20130
SHA512b587c43535eda119d17af81bb0298cbf102138d2f2cf2b0be08df76fda98a7ddef18bb38b958f19443598263fabf7976d7fc95bdf26c2e83fefed7c622844a1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b674ea6da7f133b47b7b825323db4b3
SHA109efd2d5ec7590bdb94a424cb4473ab2c485a395
SHA2564662880315fbc27a645f2a76d72fdf2fde3e6b85be73222c6760b33ee89c42fe
SHA512ff629fa7860473f25fdb1753e018aedd5952a36afd4a85891fbf9fd1707875942bb06771e4c172e8513b4410b7f227289a59d13ee36b23827e84e25b9aa9d608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dd6bb60788d8b2302959fddfd79799a
SHA199c42de42c4fc6e436b1b76356801bcda33a9445
SHA2564813791456b13564e08db2c474743bfc9e31cfee177b063d9d659f4d2ff82fd7
SHA512548896f06052e8cba93593c318c4195c33b78848b7d84ddb7a4ea891cbb9ecec9e6e29fdaba627120107dd7dc43957e479dd6c57050c349f23664f2909b8b2d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571b0ee8e025fb12a17ee682de4607c5d
SHA1040b577df6aa49efc2364ccccbcb4aef77d2c052
SHA256705dd65cc994924137a0f26d97310f5907ec8e1086c57d93b7227c4aa8d08610
SHA512bf42d1947607e8d72c9be46c2171dbf98d092ca087fe6c50a335d684a2eef2474ebd77f6c9bf722a011f42ffb9c425859f09524ad9e4a7f6353d8102b5d96ade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f7f5669a8dc9aa22a0a4c5312d95dda
SHA15e4f10063229197c35b5cda02903366d9a51ae66
SHA25667cb440bef5f1afcf618e76cc9345bd787c93aa20b399955a03480e96ec76578
SHA512a40a854f2761e6158df4984e38625609fec734ac627b003b86cb8445259cd77c5554a402576e118914944a586cd219bdf802021d2ed9a1448ff1a8012dc305c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5297ee68626c5ea587d5946d1081d585f
SHA1facdf8b2d15ca8ed457553b9896314d35af3808d
SHA2560d69ab5ede6770bd81a67dea5470f101bcf7e451b8cd128015460d76e7f405d1
SHA512537bda5d5da7cafada849e488d99ef87e1fcd1d19d65619c1f9af28de994be0f8631ad4e66fe24b169a278d4cda6c38174c11014f192193b33b4a42d19e94146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594ca44c28bd95eeacd7e202a76e093cc
SHA1baa9988b5d17e0e3ca838aaf38d48f4b77cd9469
SHA25698f70ed64a995bed31fe10578916a4a59e8169a443a7bb2c27506f525d5c0717
SHA512545b8de890a8e96c12d17d8f4397e38f98d562480b0d300d295d8ce71f10fb51083c4058ad3285cd1cdfc7af3af7ee066fb02e891c234c05ea43c0a4e51dae35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5205bbf122218df8fd38e7bc8b05fa44c
SHA15880e99767408fc9607e6c60d12599df3fd588c9
SHA2564b73a9f5d1cca74e202cb76ecf6a06c4e926264efab0342125450530441c7622
SHA5126f11aa1804a448a451041444468dafc8d390482aa05cdf561d55ca3a6deeed2d0e6b5bd6e29873ff7a4500337df1880003d9d563e89ed7dc88122480ab757b7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f776c8b7555ff13bc79b5c4ab90f142
SHA1961d096e1b644652d960f2424727552cc7cd42b8
SHA2567dd792835a983a37e99c936983157ae068c8b326b55813f808df29c72fcfe70b
SHA5120e87c39bdac31c50def8ff35708d28c22f0ad933d7647d58ed4e47a7fbf82c94023ef9639a0eadc5dd89ba78752ff6423aa79c8d3307f80a546b88c5bcd34972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513e4458100a607a8171181ba83785a61
SHA1f1bda2e30c4429c8a580cd5e1a7f1601dfd701f7
SHA2569636660fce17c8347b3bc796764c2aa139f42955154c5a511bf2c5a9df6a239f
SHA5129a90add2d56c4e2e72124c85dbbcc93cba679ba7b0e3597ef3390c8f3744e682ca521074c6b568d1d9a454dfc0adfe21813a40a6c73658ffbb94cb13e076ad8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518898e711cc9cf1eb83e17f79fac2751
SHA1696038fb4a07cbf34deef3c74f8b73ce731667b2
SHA256c0e07f339c0cb49b7614b9506e380dc6c969887e9700b4004da6ea822c8c3d75
SHA5121e1d5fe3487454f578f2fd7f9a998decb8ebe9b475ca1a9890f801f3e7dcdd15454ca0e6b9079f6c901967daac5e13257f9a1fb55e6b7e9f4c77093aeff9bcd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502379c4b8695554d72088fc6df9278ef
SHA142a242707325f73d5156efbed2b0819b3f7810f5
SHA2566e646b254311bfe8be9dea1bdfe5d80f344d8da825154f46b091243f0df5344c
SHA5121f739ddf3dd112f6b3907bab866ab711f9f9b2cef335cd4bafe4a0eea55c5440f693ba1f01cc29186077d73b5d06e83ef03334d5b62ad37fe9c0e9bac6d4abbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53356fa87758ebc54b7d6580169f5358d
SHA1b686d8faafe6132c42ab54fbd55496e742556e19
SHA2567423d0fe0ca73ffba34a77fe157595ab8fce2054e269f71e1194fd66200d2d07
SHA5126142ee50ea84313976a2e2784d049131ff801835f61bfca338f02bda9f08432bb5acbcace8e033e357c5749c6ab1b7bbdcd2b34ebf4cb3ac0129f6a788512513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a81a467832c88b668b47e5a20fd994c
SHA1ab33f3d0dbf01b82a82e0b0c766d5a53a0f9cb06
SHA256cfe0686bed9b0485b80e8b2aa4306bd025de2fa0c61010809eeb023d0a338caa
SHA512ead060cbafd15b3c6a58978cb89550f01f8c7607193794dfff9f5d2ece20a2e579665bb81c38d5d0343d0f1ac913c104b1e4e85cf2301445d6ea63c2a90c59dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1df374119ecbee120e5523434de718d
SHA11918eb523630f961f97054c83d30692823c440fd
SHA2562293ef463c8a9423e3fde21e3a61e4e2211eacb05bd0d91c51a08e8c7a9f6bed
SHA512b1421776d4be600ee07a8995ce8ef3a9c500cb8f91d1651110a2471e8c367d43f428208b123298adc4aba2a62620e0adceb327f3a1ccbfc6b36811bcbb4038fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57320aa3d9977d182a0b5cca0d99db774
SHA1415faedfd42cfeac40655cb9f08ecb71aab383d4
SHA2567b1b63b44782a092991d53d08cd0f4bbfb61cf5319021a013a93de56bfcc1620
SHA512a6f563c6fd8ca95a757f05ae80b49a5915081948de3163a0d23c72ab33e37941ad3a123c473d2567c65ba251e5f5e299e4c7d620661bdcf23e59ae8249d14ea2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\40WV1DY9\js[1].htm
Filesize114B
MD5e89f75f918dbdcee28604d4e09dd71d7
SHA1f9d9055e9878723a12063b47d4a1a5f58c3eb1e9
SHA2566dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023
SHA5128df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b