Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 00:54
Static task
static1
Behavioral task
behavioral1
Sample
ce4869e45d197d88274d1f45d2d75996_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce4869e45d197d88274d1f45d2d75996_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ce4869e45d197d88274d1f45d2d75996_JaffaCakes118.html
-
Size
2KB
-
MD5
ce4869e45d197d88274d1f45d2d75996
-
SHA1
4c0ef9db95dd66a9079feea39f227ba235d59c24
-
SHA256
03c599f1db23376f5787fcba4cb5b0797db8a7fca4f8f2a463c756b5d17f9c92
-
SHA512
ce43d9f39294ce509b1cb3b6176202f4a573c5d9b17a7f3b9cf6c43d13ca430e0ea4591e1c1db8a6fc6314260f0278aa8ccb7d96706f242c2956afc2c476901e
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8EBF55B1-6BEA-11EF-A96C-C6DA928D33CD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431745931" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000eaac0c5e2b5b932e2756751aeb7316771de7be9a00f82f140efcc1c5726c262e000000000e800000000200002000000041e6e413470f4c53abfdb26c13bf6eee9fbbf70d182d7447a8e5adeaaeca0b6920000000b37b0b25a1f39b00a4a749e33c151ff8e5a89eed047c61c6073837e59e4ffcb540000000d7f29f8e466e8d0a9d10beefd39a8dca3761c270540b8d5221bb74bc69649898aaf620aa7380919ce7fa728919fef789bf528c15305e956f38719427ca82abc7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20854b7cf7ffda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2692 iexplore.exe 2692 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2668 2692 iexplore.exe 31 PID 2692 wrote to memory of 2668 2692 iexplore.exe 31 PID 2692 wrote to memory of 2668 2692 iexplore.exe 31 PID 2692 wrote to memory of 2668 2692 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ce4869e45d197d88274d1f45d2d75996_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50da87a8c2d110f7989f8c1ddbd109ba9
SHA14a61f8517016533a58d02e4774513d33528c36ce
SHA2569f0144e543841bb768ee3a31a460d14bb1db543cfedba515296b9ecf3a3d2c4e
SHA5128662f223b8366fd2e7e116e4c92f500fc43fba118bbcaa4d039a1c3e2b2d5a338a79ab8dc60a653af29c35869e01f49c898bc97ac0ff8e0aafd7fb774fd7f1f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d447a2ac73d8c36c6d0191aa1e504218
SHA1c4d08e94b860185f75f252d2036880562e8c3ed4
SHA25657b0d15ca70ddf51c722eab5e1ead26fe3b8ca671c4d2b671396fc0673b01f5f
SHA512327a1fe2cdd3b827d46ce9a03631bf47d1a477cf0ec71d2c607e6049b4fd1e803dc320492a36254aa0e116998d75fdbbd2fcde519d4657d9e0dd20a126a7a8d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510e537308c28fe0da1c8b152700ee5e8
SHA1c02e0270d092fb29a4fc2d291b21dafae3d872ed
SHA256fe02abe180804aca737342c4d3962253015e3e5504b82880b0b2f367a5b1e08d
SHA51206115ea677ce83a4eb365418108e9bfbcd75db79119ca9c8afc449db8a096840437977b67b04e0b0d086b11d98f94bf2b3611b956516189866b8254ddcd25052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534661b4c40998cee4f42da77f8f1b14b
SHA1c9d85bc9c4fa0a1d7d71b533f8af972d2974f096
SHA25624d2853754b396485f61338aa2af87316d30034eb82b5baaa36aa5f384165ba3
SHA5128d94b53debec5cf6444150c89f5f5d1bde4911d26a87bece89be9154552807b21e38f58d9fcbe79ba2cafd391bea6122d14db7f1b1f731e65c61b8efa06b5e4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bf789cfe3311a79c5082fed78d57e3c
SHA1705bc4111bfa9e47f92cb96bcb600903e57da07e
SHA2563265cceaa4ad1ecba36945b5879dafa20f9f620ac2a50621c7d159f03d1f0c6d
SHA512be0b6c7819cccacd313945db203f1521daf7f50d2dbe82b923c1392784d8b215e873cd400d28524d6f0b4be691fc66d5b2d8978ca7e7f719544193e62b075ea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af6c762b0cccc9b4c65584fd1bb9e743
SHA1f516f87c2d419aef2a221fa570f68c1001267996
SHA256f22ade256369c500d8d6dd23ab7821784683f672ddf262540ab65d069eb3634f
SHA512dba533daf8b3ff2e9a376448e1016d274e67832ef693b423cfbeb8ac50d86e3ab07167d4af3daee0685e66056eaa3727157ad6f4f244e5a5c2ca3f99eec4af2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff55cca6e2285071f63f1fc9a107d723
SHA1758bf6153b6efa246eefa9b9080a60b800ea28a3
SHA2560e5bc8608d0a5f33c0a9361d65a2e1cd9a3e833479679749508ada53476631ef
SHA51265b0e9e49d174c0d27db8710da59815700d32991567b50cff88ccffe4ac5186e3abee5324b709b5892e6228b5fddb2726bb49f3992ca8741256dac09c34095be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d963c93b82d141683a1a7a47f2a4ce6
SHA193c90367e4a5696672ce5800d018b6de55dc2f1a
SHA2560fc884f08a847c53a38a3c9c45d3d00354283ca0abe2456e6cf3907cbd75da48
SHA512b4fb9f726f6338e74f8fa9d5e1342a7f77ee5f9f967512935b9e53a40c844795094fc6dfd9cbdffd394fbca581e01a47e826c1aec0636d8dc58baa63cb566b4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f824295e1439c3089f5e964d081bb00
SHA1a8ea62a0299825d146874259c724211bb135c259
SHA25682446a50a1be93892cbd83b179f3f0bc64d42343b5e8a3a2a7fcfe768ccb3d4c
SHA5120eeb3eec3f5746ebe38e137912723f57bd908cb88211a0dc13ba382710da330118f0c93f16c50620a55269ae50ad403da83fff9ffa32e98eb2f69921c4e06298
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52976704588e6ac040ac2f2e4906441eb
SHA1724d8aafee6ea3d9aba4893e1a68831f8cf2c6c2
SHA256256eac8ea5433877495b4fa734820eed444f17a247930e9472fee9cf18646fa5
SHA51281a9ef0e4aca488c009a0299552ccc36a99d17341ca1492980e0d8ecb70792eb2d5ae38f433b266dd02bebdc4278314e8a27d62b78a8fbc8689d61a933d1a4f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54de71921919881aff99413e48b04932a
SHA1810a794b9687cb06b34819200318204408bf771a
SHA2560a88ce23b224a178f77e893131f30c43562c109c5e0fa86e2af8729e320cb8a2
SHA512c743b1f376983e0d804feeaa2b2f285af9397d0b413561fd7c3790cfca5757f67ae88812b894db85b2ac8af2070cd76d58262b0e10df2b41f9735790f00e632b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ece8c0a0445711ff58cfcb9bfa7d51fa
SHA19ca4fc93185b8666fc898454350a4e79685764eb
SHA25671a46031002668f5aa825076ec5c76f1beec0831c435c3af43ccc4390440d44b
SHA512f0db0062a37098f0aac087c1d1e444782dab182746ab6ebec640c6e20d53bdcc17dabfe5e71897c00d67710696697f9dd2d23e6cebbfae0acbf9fba0d5eed983
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c5f449077a871eb44b040daa2cff76d
SHA1634549faa71cad9a0c28aacbc782945ce270bc2f
SHA2560897e9ee8b31675881f7c01790112c13331bbf089c4b713882eae12c4bf7b06d
SHA51253d12b4c9a0ba16ed6a4828346e7bf3a22a23b1e43fe1507b2c8ed9bac86c3bad198ace2f592325439ea5aed7a930334252dc06c497b8d573a53abdecfe745b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503bd854b2c1eb3241625786753134d76
SHA1e5212c99d80cb90dbb2bcb6fc85167651014dc8b
SHA2564454101a031a5a3666007dfcad026944112ac05c47b82d328842ab8ec77f9eec
SHA512e02d27cce741dd2328ad2e19e0137deaf3b9ab04964b6d028bff75e716b05de7c2a182da583a5f058aa055fbd887a5953eb270cfced82e4d14a1903f5511cf41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57276e4633f35cf9cade44b27c5af68a6
SHA1089662d94b59bde615fa09674b61a0c2425ad571
SHA25646f76954a891a85ff2b1b22f47ab8698130006dfbbdbd3c8772f45d1c4f2f981
SHA512ddb748efd641005338ca5f12374e724d8d4607b3671acb94c7b797e700ec1eb94b1609dd42370af45a4a68512f9eab2bf80b5e22623e9ff26c5faa0f405ff485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fcebff959337a1ca9202278adf5cfbd
SHA16f70389269b52711fb62aba6a02e5d85170e7ded
SHA2566127a7013a25750c7cad5685049876d95601ce13338276dc13acba4a4f17b73e
SHA512cbb3c4b78b8fb9c21f960006ae6ca8afc1b3d8d5824b35b649edae6ac44415cf673931c010fe1d3deee074bb0a97fcf051f0bdfd8f347f07a20ade8826c26f6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae23f88f3051c8953b26c8493368c9d2
SHA1f6f164c520365c0241aa2873f982b4d01a4086ae
SHA25682d75d18840f5970c4d3d0e27321ca1e2483a34fc7fb3675ea5084ccf60f637d
SHA5120d274139c92a0fc8dd852a4e761d0698ebc8defc8725c5e313ba2193f424368ade0860123c9f5ca9c6045caa08539273ee1a197922a771a8a19dac0fba07088a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5518618cb6c786c6408dc4c00e3963983
SHA136f843a48cd1911a0466c3305dc0175f5cd77fc8
SHA2568a9152dd8b9c3cb9e7f2e5ab8dcc85c73a7a7b373a8e82fe407a14f056de722a
SHA512f03d874dbc70d0234791c285003def04c95347e2ee9f0719147c2b7731a64e6a7d07acb07c192084440cf84de2b6a193ecb3ec400c6e038709e4b22f8701f0ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526c762cd631bb8850747e0b2feb72063
SHA1a7a3114c3d9eef57bf70a9d2582bb66cc6d79c86
SHA256b1fb8e2bffa18a3c2c001d33deda1cd1253db1552765d98b22e7fd728c0bc1fb
SHA512b5be3d62a3952c8be38e7fa501c0d0af5a0bfea9d7cb2bea6189ec5c49d9135e76cbd13626d1a5dafaf1155d6eac37752bc20ac0dc581182d976f80490fd90fd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b