Analysis
-
max time kernel
135s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 00:02
Static task
static1
Behavioral task
behavioral1
Sample
ce3421ba393b240ac434b8ce57702b8a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce3421ba393b240ac434b8ce57702b8a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ce3421ba393b240ac434b8ce57702b8a_JaffaCakes118.html
-
Size
905B
-
MD5
ce3421ba393b240ac434b8ce57702b8a
-
SHA1
f58f16be64faec4b8881a0cce1fc925b376ed0c1
-
SHA256
8456d9822b1306f8fa7aea90a15b84e0d2ef0db01f019deea0e59e34c37b5a1e
-
SHA512
c14529a4faafcdece1f8488d381500133e4188ad23a322d6ba88d33ee081f3f647b93e371cbb5a3251835a5ab8e91abf997b8dc2907d2c99aa04091fa9bb9a97
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431742803" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50ea6709f0ffda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000ca8b3ee6c54afc2f3f4fddc14a4f61cff6a0fa16a1cc3fb4f999a6498376fc60000000000e8000000002000020000000236a728c221107cf3144d94d5e442a2d112eaa258752864c4a7262153d7bbac2200000009077a6ebb94cd5a47279594e75245a2a8a32087355681fe6307df83c40fb2d644000000040f5260c17c21a2d0f8f035eebd842296a82470b1e82daab7f6bb197c1f851906dd141f3c3e1827a0f15120cca0a9e18049bfb079c340452df04e9de5433b0e8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{458A1C11-6BE3-11EF-87F4-7694D31B45CA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2776 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2776 iexplore.exe 2776 iexplore.exe 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE 2828 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2828 2776 iexplore.exe 30 PID 2776 wrote to memory of 2828 2776 iexplore.exe 30 PID 2776 wrote to memory of 2828 2776 iexplore.exe 30 PID 2776 wrote to memory of 2828 2776 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ce3421ba393b240ac434b8ce57702b8a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2776 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508318a93571d1fd4e27acceb56ff9412
SHA141b18413a8aabd2b20bc7639052aa66b67520eaa
SHA256089196b040060a3af0dc60ee2565b504c820f457902e0f9c7ef7bfd723c7c68c
SHA5124cdac5eeda7ce2af26eeb8b4bf313c48b5ef2f7c67a23b2520dc32376d6e660691f4a02a690f83c93b9a379d762d479eb52cd8be716cf8dee3bb53861c13b774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bca5a7c202933db0b0fc8dc1ac3c38c1
SHA1480b8a1c9ef10d004adbca602b1d8a38a7d84219
SHA2565dfdbb5dd36cb7a88cfcabf3062a1f9fdcc57badae8bdca5894f2c8b82d5d3c7
SHA51222f8de164d550864b3f87f4bc76b3a475d3df5887c2c1c28a09acdcd75dda5d3475e8d5bd0a58b96275ec371fc36c0bf3378d837464ddee411e14e754bdf607e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d004ad130955fc6c9098c83075b36280
SHA19a01a2744b99d4869fe25ed2431f04887af0da87
SHA25684fc46128970f0e49be577d45aa5f6e12c9a1bf9c977bfdf0b43fd74c6be218b
SHA512eed92cf8fd4ec0d8a35911d72fb8d9af82853da5c47b1667e120cceaf4f95a9040e80593dae87ad12000815619d19676300c024055781689d08ce75ec989e6a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2738e42d6c16501f6b79c48697eff7f
SHA1cfb8211990902028cf8de97a8783e366c9edd610
SHA2564519734e1f3beed5af2a4a2a2d5db4d5e44d39f43a80563db9195fb6a25f2950
SHA512e338411bacb9018138fb1228ba242a492d6e71d4ca7480e141f741544d535ef9032395c0d94df57721640cde7139a5c81fe80386be7d5b76c480267caa05f45b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bbefa2fe87bb4e951bb844d6ca653a0
SHA18dd9ce981ef36d09934f9effb2dfd04ab6edcd17
SHA2564bb31de3165157e68f40f6b53a395255f90db591c79a3bb941bf206307df6972
SHA5125492afc9db415a8235942e6a6057796e5dafed3e386f6dd424e19761149cb7b37247272e49c01f6d421c8be032ee63959569bcc2096e93e8c10d64d9a68462af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f633e961e4efc82d7175f9a22274d262
SHA19249625a72acbbd318d778cc68a846c0f5d87bb2
SHA2569cd8237a97bfdd55a12abef259642031957603e41e762d6114cc048bbe6c287e
SHA512f740e1eaa864bafd1ec597fb52019582a9276854badff1b69082bae2e556b19e1c4a5016487d3ff41540a164169aa40e55b1b7c0c28d266fff8324a5823acf58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8e81ddf5a5e839da3c50a41516432b5
SHA1e3640fbdd12cfaf1998f1a3237fe219f1bc65b85
SHA256b0abf3158080be8c40cc413177927f31aa55aeffd2da5fda5da17e68b59e8595
SHA51242ba105395596e9cabc80eb2b8aa27054eed551a5848e1c6507d4f932ae80b3c835931bd6b593b6a784f4236f69d6048a7a13ff964398ca3a70e7883a4efed6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de6d0e2cc2c7c1340578faf97f4b8117
SHA10a3ac4d622d4a65073cdb111c95f3d4d02375def
SHA256c248b7acd9a96b9d1b9800593e6e07bf9640f913e3b4b38bd9dd9aee853009c1
SHA512f0e6af79d04070919496dae5f16ec092e51c266361bd11e4c83d091310abead78c5b755b306e5a70140ddcb250de5f45d144c3e888fe257f62970ab974ac90c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59923a03d36c67846f076e924c2ed2dfe
SHA14043845f54e575a08436eb97662112f8791b0ed2
SHA256a3f7937e1fd03ae1ad29e3a82b82639532dfaac75f8a05c354c201e451751831
SHA51268d9870ee0dedb44a02a0f124cc632c6da10c5f29f04c72c84fb7ee9cf7aa28c6f2ae626a3bef7f37db385f2a6592096531e324b7467ac3e9451a7e32dab81d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d1dece84c3db9dd6efaf8cb84c48fc5
SHA1653e74fd7e86b97af5641c6adadbdb35a1859988
SHA2560f8affdc31d54b71e026720f7580c087373b7dfcf1b38978a5f757a182143585
SHA5121c5f4cc54695d96a829ec7ccc30aea41812e1b1bb87cb0ddc942aec3ee0e514b98ed8d70cb862654172cb3da1e88e5b91f30976e819000c69f029814e12c4cc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f67312f9dc994821920f35298175d1bd
SHA13c044d4e82a3e6e40f5901fc7b90c149fd6f7cd8
SHA25667023e7a8c7b99d4ae19a51877a72b4794bbfef1f199fc94e82883000553934f
SHA512c99bac22786592559752d743b70c4ad318c584bd3044b677cc7092dea312cb080350bf24b932fdc22f8a030fc17c7657e2a3a354cc66d471cccbf722a0adfbab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edb586fd36e1b796155773d0f9922848
SHA19d5bb1cf7ce8f1d1d5030c49e8a5351d8232d661
SHA256b5241d668f8b7345aa4ccfea7f7c7800599f1b94ed25e335728681b28e4ea6ea
SHA51218294f509e822e986b728b3542974b6f518eb6d51de9092de1a4abd754654609b6f39fa6fbf93fbee548bc92f5d66063f7404f262bd070dcd7e78de6453a54ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c354fd97dc34cb41174c2d876290ef0
SHA10f5094459e923a649132f00f4cdd9952a794709b
SHA256a981c150e9fa3765cb968a50107ea3e71b66fcf128c5c23fd4328621342ec7a5
SHA512a21af15e5f79b713d06b50a5f47419f5fbe380f92f2fe6d1ebb30f905be5d8ba199586d70e8ad20d83f2f9ba4286786f1a4c8c61c9e5cec117ab57dae08dec06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50518838dc3ea8ec9cb68680c989e9120
SHA160a7539397b1b12400e6d77f72ac6ecb4667d671
SHA25617c5f09bb96502445446de56985a4d5a28a0e4af77af521c6a2aea159fd743f3
SHA512857e46b9e8e1b680068707071a006f0c6eb1820bf9e7061ac2fb014ab9caa0f5915006177c9a758eb7b414eefcd2d9327f82c2d83f80006cd655af1ce067b6cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5534137e6b6751ace8df3f25e27137b62
SHA13dc0b7d6cc743edfd9f9de6e2c6f81241b52ec43
SHA256d6e8fc3463f7e459aeab7722a88b87a7bdba5d1a7cbca0609abfb37dcafc899c
SHA512faa67131b95ff5a96c9729b6a2374075edf8b9f2292f5f33a926d693288c457b82ebf37f4d051011e357cb253255c25a5b0d36fe6d57e49988227df8ff2f9622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fa19afae11ea017a5e01b59a5e33983
SHA1b9d3ded9516b4ca8aba754df5317fc1739245262
SHA256f3407ad85e1ba0f9d3d0a861d04def7a618426ee98ab9c3a8cab8ed5214a9b4c
SHA512ef50fa2e2ff9f6940376e41d8cac63dba068cd39095d3e137eca28331b6703f24033683f9a0f585d57116f40906d25c9fa056432b1c37a621dd8be6022350408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e63c4f912ef18d42df62ba4c1c293894
SHA126990735167d3a0f2feb2e9a748959668087a451
SHA25668061941aa6f45663393d31a02818395d653efcb00fce7c2289e3321aa3024e6
SHA51221632d4dadb25545ec840219addf2246cf8d1c2b34303b507d2abf0a3d15c8d2684bb2d4bfb4dc2d08c1886f4ed5be517475488115c25c48699e8e11c790d8f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53363c4e76a185d2a11bf83501690c56e
SHA13c12a087fb4ca620287e50c1b7159fdbcc53fa53
SHA256a0fd55d8f9d30d3da00f23372419f77edb9151e03caa87d97ef4e94d7ecc8f47
SHA5123ede87bdccaf56584c8c35c442a69dd5e9c4c6c7aadd8c96fdca83ea2c867e5e2112529fc5bcccf3d1316cdc7d30ee5eaeda155105d220dfbb7e69b88a894e7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5998af5eb719fe7319dc6438b972a5b7f
SHA19be5b5a59de0d4816549466efaabd914c1c639b6
SHA256f98ff5a477067e6a43ef30cecf173f52a22f006ac95ed42fed6828b5f3b4bbbb
SHA51211a9e1162266a1e67b7cc6c68fc64973c910c61b8b1d2dc85ca1c7d79b732a46aaf64446af32e84b71bd668e30ae6a63abe7b0b83f657b7085a8aa3d0dce5717
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b