Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/09/2024, 23:01
Static task
static1
Behavioral task
behavioral1
Sample
ce1ca2555fabad1b1295af5fd4fc41c8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce1ca2555fabad1b1295af5fd4fc41c8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ce1ca2555fabad1b1295af5fd4fc41c8_JaffaCakes118.html
-
Size
13KB
-
MD5
ce1ca2555fabad1b1295af5fd4fc41c8
-
SHA1
5b62a315dc8744c0a2d6a1ef5a02322077bc8c87
-
SHA256
c6a2255b5ebc4d08f3a7431a4c9b8e4917ab288a5a4f23e76a487b386f898a06
-
SHA512
4b93fb41c4754df9ec690228d958fb8fccd19ea8c3245c8fa64f95bc5f453b0748c23e59bad0a95724c547265e229a773bb3e1ad2bf569f6e808df688cdf9188
-
SSDEEP
192:B7OCLlhJinhrnM8DWMzLZEMZqM95H/jGS+r/tpzkMmrEGZ5qTS5SM:B7OCvJihrwuC65Hq/tpzkMynqTS5SM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BA376DA1-6BDA-11EF-A6EB-D60C98DC526F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431739131" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b05ac08ee7ffda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000c4c186de340503b8753ad2cc23c86cf620b88e884396720210f4e7da339bf256000000000e8000000002000020000000f22ef974bb14e12093b6ce287019fedcb4924fa5cd81bfd1d80a455ccb257585200000006f806e2eaa748a8a333d356b8181f4c8fd30703e31c2d4d29714a8f5ef794874400000007c645553e417a242854e563c7bd53fc67037ca6d867fa1d168b3d4f13101ff6432235d481030e141eba8c0c1e54f0f78c4ef12344717cf6d08efbfcc5b6911b7 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2372 1984 iexplore.exe 30 PID 1984 wrote to memory of 2372 1984 iexplore.exe 30 PID 1984 wrote to memory of 2372 1984 iexplore.exe 30 PID 1984 wrote to memory of 2372 1984 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ce1ca2555fabad1b1295af5fd4fc41c8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de35bdf7899b861a8d56672c99669f77
SHA15cf39cb3c04c9bc9f80960221737ab80cf784c98
SHA256d4192217b9b6e0bf5cc70b5c0233857e619bf6990ecd41c338620c43b84cfd4e
SHA51237c4a4ef8dd9e68df51f16b6c5ad525e35a918482189e209a4711e1827ac067212cc366e5af6666dd7303e12163504dd2164c08075622088cec7895b9921eaf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5b39b5540e9727c964330769f180914
SHA1303a5a4edf0448d0324a32910958757fa8ea3e80
SHA256a3131bae8b5d868a3442a631b2f0f9ccb011d9fbe84077a3931cfd7d7f98ed3d
SHA51293625106d5d1cde341884f1241d75f8c85e7b4a19755832ab8f52de635ee45aee540909c754eddb5e31260b2686221226cec4a36c248746b0730b9724a510a4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5309923b325ba6d16eab9b222764ae1a7
SHA18f40b2f9c4d49858ba8fc6736b81a948570232ab
SHA256ab3f4d4fa6a1189ee9f00f2337ad511f20a5aadd4f4dc68bc6dc03cac8c2fde3
SHA5121f965ad594051d45e0d43dea11aaca3d943f02c86de864b92cff36463b1cfa16889be8c723f106b7ab53d4609d1a12e079350b70b89bb8a9c9986f3a4d0f6db2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586ccbf0bbcd9103fd54dc8ab8731cdf7
SHA1ffbb26ef7276401954177b9811a5b6fdd64cc53b
SHA25606326038ad91064d1b0deb9f2216ee99acc67e1749f36cef47c5d1db7fc73ca2
SHA5129ca55aff8c1fa2bee996089fd327091d6bd45315480dd6f094132e17d8b6b8e1656f823726db3ae73a236998d6a551e5869ea93ee83cce040df6cee913a4c9a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f74027c976a9fc6e99dc761e27ddd8a
SHA1b76bf073dd8f1ef2d82ae85367fc38352dc41e0f
SHA2569026e7584deb881fee540bd313a64af80392fb014cf23986eac6f031b1609687
SHA5122f94eba3f3529050515bfe06bb36418443b7bd93b4f85ac18eaf69950a7e2e33848fb59921a26eafb8370a5f0681942bc0f86707acebd1037e42d7c1401bd9e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da4f580725bddb3a981ae0e5dea93945
SHA1568e80ddd6c40a45c80d4949d7323956de77a2a2
SHA2567969c04f5d086281aac60725848933eabf2fb6568620a379f72c240f579557fd
SHA512d08f4843d14f28283883331940ca4fb595efd1b1b0cfb5ba6471cee9040acd9b5f5b28a30f5e61807d7973dbcfbc3d6dc45e4be4c5f272dda49177e69ae16bee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0326c5616689a7e4819d2a0fec393a9
SHA1f74f8df154f1e694253c1efe6ba0cd928555c62d
SHA2562f457cbed33e8672e25998310c6f93037deede4313c3b1bdc614ca366a92fa97
SHA51216a3bfeb33535fbaa6b30dbcaf9acbacb9bb23ae87eb431427931052a78557feab7ff4299fa72a5b2d2357d11df28159aead3680c3bb976037a55179b5510330
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6f2408f8b79aae320c70ecaf1a464ff
SHA1d0ce3ae4a6a477685065e291a7b854e54a083923
SHA2563a842c051157bb142509a1a8fb217ba049a8da163b913355ef1f93ee3b002a15
SHA5122d066ad57d928557fcc02fb23adaa41fdad1254901d131ed3fdbd7bb0c7c9e8246aa9e2518213661495351016b21642dc779c8321bbef8b05081a1714cb984e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a9d3f0b7187c7bd723619ab71703f55
SHA15f6effe85f1684e98056e1fda00f31db56658a4f
SHA256ebbcdbca5b369ecaac667d3c9dde4cbd1dca0f0a9a1262fa49fdab73710c1051
SHA512cb40a905b2e8eec7b864dc513012095e3df1f17100271a5004baa29756712ac4c786c7f0e830f28ffeb5c66e1233e9d022ff1a0c20a564eefb27230beea86db2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5870ecc44803efad84074beb3ffe498ec
SHA1d4112be9876e6f6c5d77ae03405050c73c22bbc6
SHA256b34261b5b69358f20a15a417dc9fbb23b6dee74574165e4d5f045a50aa43d592
SHA512905c2c8a726d5d5928fbc2830ed8136a1b73568a552a0f2e4934c2e404739cdd6daab34d22c4e145bc5d916957a8b9e42ac7b09ff0d462f5a64a2d67f160d5dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3bc706948269ceba1a44aa9ea0e058c
SHA1d86d434a035b79b8ea4e23b7fb9d66fd1b8dce94
SHA256b66474955a91d737827b978f5d2dd89f3765f73c146466b8b3d14419d16f4e2c
SHA5122f6786a49a754af983f4bec3b342c81c1c733aa404cc33a46417837da644b7bea01cb5d266d084d2a8f1d61f39802fa57163c30e924b76591be986a6b622dfae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3c54c339581dbaefb09fbb8a9eb1e02
SHA17fefdbf0b9693b158ef79768c7e384e00acf4fb0
SHA25654646d59a54720b438660082e165b5cef5b6a83ed791016685d3533bd6a8d23e
SHA512c224ade57955f7aaec466d2b21e18ff09d8049a653a6912e372db08d9c1c4752f843f2701cbd6e91368ddad8f87af958f77abf0deb13db28314496b308205d1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7dd01212eaa33dd07a9fad46b9ce407
SHA1a37f7e6d5a8a034b1e3adeae2fcd4ae2f072ebb1
SHA256e386279aa18641a479540ff714883fd0863acc0aefd9d5ddbe63df3fc2bff48d
SHA51259bc5760b470e375d1225b53b1edab59f9cf8cc7241944558e3c3aadf3fe167cfd150eeccc3e2aa6f0f81c568a2f11caaa6439bf609290a24471076edc2f79b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1666ca25224893fc552e6ddb1167afa
SHA1afee1cefc70150dd9faa50d0e0c8f1bc96b0b1be
SHA25653b40a2f8325d7b3ff660b0c11f6bcc7133c02c56f2f23c48b41dbfb56c16b1c
SHA512a3f640354d71049baa7d8dd6b882a791bf09fdef265467880a3d96d8a981227ea3d170b802490fb6e5a86a8e49c6836cc3ede27c33b8fd9465939e8d8cea8776
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595bad55da8960de61e686e59dab8ade6
SHA1b32586c3584d9e60eab7e92d3cb7c1f1b9e632ea
SHA256c35eb8c776c3c10679df3f859ab010cba6cd562a84d954e9651953f01027a605
SHA5122a65bff5bdbc7c90c29a698dc8c3346218ce8873ef6b7a5685c511ade9fbde7f3b286381bf437b9ee00724c42bac91bcdc7b2a8ec3d0f4d2809ba10fb25246d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e5014d57b5bef0fc2cd6ac0ae26e543
SHA1a10e5d27c36a92c0549fbc32c809cfd261d594ac
SHA25654c5875990c5a97917b93f0c4001af3565ac5759271bd312bba8a4b05d30877c
SHA512240849d11a0648e61f7e1eda0a9d087dbbcfa1c7c7f137082eddf220a0ec6fb1a3c5eb8de6c80da54ebabd171d372457ddba4b2b9603f437628bfe6c8821b992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7f5deb8dd44fbca21397b0b66be563f
SHA19c67c8b960ca4d14d920343339500383f52e42fc
SHA256fc3426bb334a6d2f08589544460932d792ac5a425bd6f2d5ae826c208ca6cf52
SHA51293377378d1323803fbc62809b2f7fa3a131c2d1916b8df4bee7e302ec921065347ad177e47e1e6062211c3f5e46e33a90bc43c48a14d21ebbdd883049562aab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51622733f4cc60f9b7fe6972e5413f741
SHA120f89f8e19527d8d6c861cd13762fe44529ea16b
SHA25626ccf9b13e111f4a4ef2df2665a69ebde73324ef649ba3e2bb534f26ebca366e
SHA512c26c5347c871b84d47cf1f080f6863fe9227a2e459b034539d16060c6a22b9b020c1c46c52358acdaa9eabb39093d1125f897635483daebfd09df1c7b36cd438
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b