Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/09/2024, 23:48
Static task
static1
Behavioral task
behavioral1
Sample
ce2dafdd412da9c99e15e340b330bd1f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce2dafdd412da9c99e15e340b330bd1f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ce2dafdd412da9c99e15e340b330bd1f_JaffaCakes118.html
-
Size
715B
-
MD5
ce2dafdd412da9c99e15e340b330bd1f
-
SHA1
8d926be9f676530f987ed5bf2f921b0e482f4b67
-
SHA256
d88c3af5bd3b24366c0e1afe3b234873a22a5777735447828d45946b019dc8b5
-
SHA512
dc4fbfccf0351d7fcc19908702ca7b825e4cac5a91b8ccd50f9cce9db460ec1a75ff2accf42a750ae7cf040ff8350751c578dd0cdbd018bdd04e2edbaa24c7a7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f04d3c1aeeffda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000793975746bafc0fd52d660f2ca5051e5f681d4870e33cced5d9dc969d4c5d92c000000000e8000000002000020000000fc4226d3585ed176e90f78510fad2b6fefd20b7297f2ee2b99098079260257b120000000861cd6993a3496173cd697714c8848a8af6cd8b150d7891f299c894982917d364000000002a6449befe945b54f0d41dda607513566166868cdcce6d94e967568fec60196ffae5d6956d079db002585c6b701b28ead15b84ca784cda18a69ba9359efda80 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431741969" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{55320DA1-6BE1-11EF-9CB9-62CAC36041A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 iexplore.exe 2336 iexplore.exe 1548 IEXPLORE.EXE 1548 IEXPLORE.EXE 1548 IEXPLORE.EXE 1548 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1548 2336 iexplore.exe 30 PID 2336 wrote to memory of 1548 2336 iexplore.exe 30 PID 2336 wrote to memory of 1548 2336 iexplore.exe 30 PID 2336 wrote to memory of 1548 2336 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ce2dafdd412da9c99e15e340b330bd1f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530b4ad340ccb220e9ebb25f20c7e16f5
SHA12648df231a8be71e594373ce6fcbd1907ec74d49
SHA25664b8e671a246af81953cab7699f4c62bd02ea2dcb0b02c69157b601d31085e12
SHA512bc0b89d560b3a84154252e4f254051fa4aaa0b3f23a21f99d1fc595e63ae1ecd743357db73226877822611579b90892076a021b5ea4f833ac1b900fdad7fa9c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53634b36c7553f3fbe4231b20a18ad4ee
SHA1f22f1e086c24f07051a88fa7163332680f2690d1
SHA2568fbe183a345326823159f983e9e33e41e345402292d0383182975998aab491ca
SHA512337eadc1b19e7425c92c239b5c49b2e245b8c34bf7c0baa97daf5d4661cab4334cc86ae25eab11516dc1ded43868186dd8a557af85482b35fe97adf71a13707d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5bcad6327026ea76af061ca3458a486
SHA171c31deae295299e0cc114bb56fa22b8b0ee5c90
SHA256800d3836f07397c1123eb437752fd6cc1f1fd51cb881c518e71eda94049ca693
SHA512cfe1130f6b3e58d20ec33eb436c3ff2f8a09e2d46132b72fd4a8aa8ff03a7051af847d5b9b3e20e7db39e69e4f66d176bcfe50d7751e25b50cccafa4f3de8423
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea7b0f698c4c3388a257746c9a9acc04
SHA14ab9a5e6a0e3a5c13c6b9e804e99f350d9500aa6
SHA2561877b372a34f60c2cc123735301281a80de73a96379d8bbc4336aaf4ef78bdc5
SHA512fc1cde70158116319ca4131740d0a71d9a05b91340ece3c7d14031f409d208499085fb63771571c9e93527896165ac978f0496c27258904ce24ae58fba862dd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfc968d451ad8854d51a4acee29372ad
SHA112f4f54d0ef4fb114ff6ffe4ab49a879efa0c654
SHA256f3d21cb466b854117503aa213bc88a9f1eb6820c4f1d522e49e87e90275be862
SHA5128cac7220c595baa64afd5a387fc8f5e2fe29ab9c53e746866a5fef28cc12d22249ad19f3b9a9bacf97109ba167d233893978854254c4626f86b18bc1cc12d7f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bd6ce0fafe0c48f19fc944009e21d71
SHA1a07febccc16ba7346eb40923191bf90545a45223
SHA256ade270b7e9a6eea59942ecc00af66380c7a6f99c80d7bff2e18b27bb3f00924c
SHA512fa598e108dc8f9cc222da47b64ae7e09a239d3e55b28355a2f4c156d7766ff84872faee84acb9a9b2186f619e7b703ff7f3ac2a33dcda5011d5fff7783ba1e74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5106431ffeab540725a44307358638f49
SHA114e3f7a6c255626c2c67de448778fdfc3da6bf8b
SHA2561568ba8783ad8eaaf86cd5017293c20a889cf532dfa671173f3662ca1af42e70
SHA51207038eea7d7b117ca060e1258d5bc8174038afaacedd224ccb4909215c69a48f38ebb79db14c31ffe13c9461b79d9bb0bd460d1c372b9b0ae6f0127fb34e2a89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500ac2fa49c66629b9f31bf01759a5490
SHA125a53ca6d4db301b9abfd6f3bcaf5dd31231be4f
SHA2565e48dcbc970b587d99e137673e689177528ac441e05e704d89557ea0e0dd0cfa
SHA51246c99a5939a2ec1e4c3d2850fd17405374aee7c619628b22a4876f15fe31c3c002fc79450a7932433a84b2478a1ad2fac38ed014ef798ae2737399f87c96206f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c631b7f417822d09fe201a36931c1c27
SHA1416eea1fcc70414204b9f2af0d3e69d7fd581155
SHA2565414e5e6b179138ca0473c36323cd6a27b3cb6156957913b7dc3ba6b4dbf744d
SHA5129e47af8857aaa0e219ef8aeddf492f29906ee969c55baf3e2db03caeee1c72f4d329570764387b0c4ac98a23d3fcbfd2d03a7f627e111c23ef348a517c8a2283
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5574cae314700ef20b0862390316344b4
SHA1545a6978d88443e6a23c24cfdc72f491386f8d55
SHA2561c64538f576d02fef82242649b04e485e176c9737ac9175ab0561f94bbbe39c4
SHA51278b39f9978333c8f9b43985f0bc150a468a97eee6fcf7663d4de2bfe2942543c5dd898b49caed90f79bf7b074706c27454b4c2a957a66761045ec333184cffc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5259c251ef035791f464a0d3375d1be0e
SHA1409eeaef368c08e3d21627460ab60e8e8a78c972
SHA2566dcc9f4523ae10536d5b998cad86c39d37348a5fd4fee5580a804981f2583ce7
SHA5127983134cbc141e8ded999139404e52e82f6afdeba756d1d0bade9393a2608610faf6e876787ff82dbbf90d181e55bc52a7cc71d556b9c8838764e3b70d775f2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0d423b076bb65cfbc657521e40de73b
SHA163c81ecb9e799fbb70168124a627d368662f5782
SHA256a3920a95a0ee11f3967d447d5303f1bbaae1555123d15da0a526cf914d035cb7
SHA5126912819d60f16c88e96af588e4b9b71270a2ac05698975272f9519bba84a77d8ec545f3215318336a648e91e1773b52c095a79e74453f0576ee971af188e2fea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1f520138df34fc5c0547145931ce5a4
SHA17b2da3d4ce7c68a85ded3108b572c1c06b3bcd78
SHA256c8b4a73f2b823fccb5b281ab2732d020e86053459f052fd64ec04d7d929c4866
SHA51279a664eae54efd00c7fc4d14cf04f9e1f7e1269cbb30c4458e7c615cc2a8242dae79926098ccafe89cb67664e18fc4d5a4b963b4152d88540fa2dc9bf564e698
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d7a64d2b3c16d861141e97cdb6da6f8
SHA12295e6e9ce893b8d8d571accfbb3fa82b609b295
SHA2569375a700510c221fdc84622e762f6aba07aba88990ec7b1e851d49a125a5c2b9
SHA5127df31bbb5168b6342aa836810c22f304b3766ff7611841900694f687ee48d9dbf881a303e2a1fa1405501c3efa546207ceacde9b90fbd38fe277c2814a56f2c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53023c2c04383fa3b3d91fed4d1715dc7
SHA175ebd49bae7a6e14e6b05ec6417e75615ad99ce6
SHA256fb3016c43df13d6419c5124a9cb6b8cc8db3d8a3b553b5f784e2ae590012a3e8
SHA512723315b6a28d96d31beb67b656e22c097a2ff74b0c5607e67fa44ddc975357b9afaa8d8e1e4eed5d4ed0dabe1053f95c09a2b2b577ea6c80591254e18106ac96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55465e94ef6bd8d6e49f7393a25bead32
SHA1963de3ac98cb69596a24ab59e052578254abf44a
SHA25653b61c7d25dea2c2fefce436830c95923edc7d5cf1be573309a9cd034f09daa8
SHA5122d0939248844036533a22b435cac1a8c588390b667b7744c022c8e320681a1977c5b7a3e57852424800cc0609c7f0be5f3178296a47b0baa6d7a3a9e74c9b5a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550db316ba8236ddd62bb48aa2ab48419
SHA132b63efcc2b152ff37a5e0245e8170ff30997c21
SHA256772a7eddf0e38bb218eb2cb2283280934ce42a2258280168cdf6563038826424
SHA512f7b32b3a0713a6fa5f7e2ccf7fe44437c24f28554ab94618636e9e47677624b280f0b2f3e486a604eafcb40591c1f165875823f39858d846f134a75d90bae708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd0941e26c0d709d3be5e296c07883d8
SHA126d3e15c9ec221be8423aed348f32dfb3737d90b
SHA2565fb043627f3a78fe6ae866f47021ed4b1be83cef13c8ee114298651463b64a25
SHA5122c65662f334cb31d0fd28454a129c332a56ba4357c403fbad2d3c73f611d69bbb16a5b6b5e22fb27633ad0915da0de93efa51f302ff34f5e82b4d45d89ad5071
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d136956888999415fb648df429828d4f
SHA1f42571a7980265600f91852ddc31c980845461fa
SHA2560371fdeea2483a680a6844a78c45b55b225003ef423dfdc8a744f4512990e2d0
SHA512ef2a0122ae16bb05d19a8137ba8d003d7a4a611b29fb7a180046f42ae4e04bc46c80d41b48b3f0da47f6f29fe0c7497e0724779d35c357ce2b16839349dcdf6a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b