Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 00:39
Static task
static1
Behavioral task
behavioral1
Sample
ce42f75720ca3e6a5b7fd1f86cc944ca_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ce42f75720ca3e6a5b7fd1f86cc944ca_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ce42f75720ca3e6a5b7fd1f86cc944ca_JaffaCakes118.html
-
Size
461KB
-
MD5
ce42f75720ca3e6a5b7fd1f86cc944ca
-
SHA1
cd228f8ab2b66a3ca37d2db1aa3d13db2697c61f
-
SHA256
fbd00ede65a9409a1e90efe8c0a0b817d8fabca5d2b50734367cf03af317875b
-
SHA512
fa0cc12909a67dcf0b8e39ca7bac1fadb2f295dad9110fe9c06c67ad65c9fc49f97987254197fbd60f2530fbfcced4be79cf8f54213958f6ed6c11a69a3ab55e
-
SSDEEP
6144:S+sMYod+X3oI+YdpsMYod+X3oI+YosMYod+X3oI+YLsMYod+X3oI+YQ:j5d+X3l5d+X3A5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0da5961f5ffda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000094468c4232d31be9b8a8a9df7151d342c4ea3f4b0dac39f5d68e84287b0c00d3000000000e800000000200002000000010f6bfabf8f79b4201ca59966084afc3bf6a293bcad77b2ba580b3bdebd85a70200000005289902ffdf9b6f1231d0dc5432df42940966b08cf10b7f3007481f5212a85ba40000000813ea9e3ffefb72f0ce06a3f7c1f7a46a5434f12c9f8e4bf42310e74407528a6225eee0cf40ce465e1a034ae3a6f620a6eeb3e56f86120ca31727655ec452732 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{88C36451-6BE8-11EF-A4F8-F6F033B50202} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431745061" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2540 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2540 iexplore.exe 2540 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2744 2540 iexplore.exe 29 PID 2540 wrote to memory of 2744 2540 iexplore.exe 29 PID 2540 wrote to memory of 2744 2540 iexplore.exe 29 PID 2540 wrote to memory of 2744 2540 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ce42f75720ca3e6a5b7fd1f86cc944ca_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3732cdea1fcf27b6b0e0743e5c619a5
SHA1fa9261ebab15478f962960c70b9549d0cdfb5173
SHA2563bf89b3a13e4043215c134086e18a61fb64f8a12fa7a4107e8ac5ebdbf31cc75
SHA512267a681ed922187149acdf64b53ff9b04b36912e3e97e14a762d7c0b74048a601d3c712e9abd3c26eb254040cd168e1c0b577be8084657c8d70bcabdfd861679
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59aefc1ef9ef804f213829954617e1f23
SHA17bbd83686285c619b39c7b88f6de5b27da2cac76
SHA2567488f351cdfda3e1bab469869dc99a348e37c52a3f234390923fc3b64a620619
SHA5127c100b32744a8d4f16aa706ff861ea2373e79ca3b9c79bd59b6666bd58120be20e622d621c5d03305e730ec133d0d486bd71218675fa564b65a28f5da83db61f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b152fd685046bb92d791a1af0765f3b
SHA11324bded120e0f11502ca7790c2279ab3f3e37a1
SHA256e792e1593fe3121400dddf44b04bc018cf4ac8971bb3d53efd2bcf6aeb111fa0
SHA5121386e784f7ad9258fc813548a47fe16b8dfa6b5bbc5f45f363124219b0894594af2883f78fc9ff6bdcc829da9f9342545fd19e77f82310022d437e6540a0743c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5f701d0c80a021d900dd58434a3b684
SHA1cc910de373d829ef5316c3ed73224795b1f3df46
SHA256cd6430d2ab00478e1da497e5ada4b5a16320e44d0512f866fbc3e3f0bed88e79
SHA512c8fac2692caebd26e8b719bbffdf97e926b84c637b1203bf5255932a0d80c2d49fa3ad698994d31589ab2bdc110d8065c329841f70037fdabd34b6e8c05ae0b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a498c879c6048d907714b8d4a64b46b
SHA1bc25bb0537220bd6fbea932e7c56199faad448dd
SHA256f2ecf86b60167929490127963e682cb21f0dce22fc8f89a37e6ae3af576a89cd
SHA512fa9d878f8aa0ad3fedc31d0c67100d477aaa7f55e880bea716f829bbfe13cd34a92a6fc626021edb5084049cafc4cfe1abcc9d4d7c07a1cd654ca28dc66a085b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa8d545fa9e9fbd14c07bcf30f72f500
SHA11b80a49d7a8791d81ad99e0b2822e220280c8121
SHA256ccea0460eb9fbb8508c75207ff4d9dbd6b4cc6d6f1ac7956adbf526c409ab20d
SHA512fa6794ef1e7d7d76d80fb164f46f730126a062449ca2390817acadf759b3680b764d8324b8150fb73fb5bf941dda32632ee0cfa8d508f9eaedde9f08dc2fb9af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595e591a1ddb5c4ca2353e8330efba906
SHA173bad200b5c2f64d092ad02f719711b485ddfd51
SHA256d5e5384ceabe5f60b4049b3754e63c37c339b40bc0aaee1c2630fb2d0de08839
SHA51278f0737d160eb2b45b36f5dabc8ae8e2ed9163c5a215e84fb0ece24c1ec9b764ed7982938a59b03c49546de2291185afeb9339a49886ca61ced851989f78c08c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d26ab5550d2b92fd5b4ed6b80a2991d8
SHA1efd6fe1e3d5c10c82c164ce820c35e709b776f98
SHA256eb4ad25c03a492585a60a387e48edcab2128c37f9d6133541eb0a58ed5b746da
SHA512778ca4ca031c95de036642f0570b7434ac23da9af0d50d8a14a9c740ce136e163ace717421e13248a425fe3c7786d2991ad7089df1cd471dedffd3ddf1f7eddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe340d99d30a08aef8438d39abd23e53
SHA1be078ca5cca78210e4a9f1dd4a8af58592eaa58f
SHA256ee02b3d173287ac35c06f00c5108482bb86cdfe3046056f78dbb216e7036ca0c
SHA5125322392a4ab40e2c8e4c19d8e20862a23c2cb05161e5428378ec8ce4727585467739652f4a4c08ce5c09cfede08b6cb5fde72b1bfc52b31d668c20f201adb32e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541bbe013bd98355a923e18c3bbbc7a2d
SHA16be63e20eb7a78e8cb1da6fd68babe4ef7399962
SHA2565f943d15e292a8989728c81c5f403178755568506a97903208eecd7bb60f6707
SHA512ed9a62ac3ccb91401a77985abaa92357fbcb49ed7c4f5637ddf31e9f9580ba27cdc0d3a87accc05938c120478c53d5cbc2b09c2d7b24d0965135c8cf549e85f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fffa58730c3dae18421d471445d8ef58
SHA14122e165395d58dfd5e5eeb1b1fb4881bd0a9b7e
SHA256149d5f1ea8052bf6f59892ba8322549e59ad96878314cf094f65d938538e47d4
SHA5122a5039b2c9bec1a188ad085a9040b2865d158828a25fd01fee3c765c3628aa04b064bb7622ccb0a0a8c22225363c4e0e3324cce6e079b508b0406fc3c1480f1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514167bf8c51c7869ae612f698cdc591f
SHA13034b5153718399a0f9f298c23daa50316aa7ab9
SHA256568675e477b933e5dc8e235816c74845d42a983181fa9d6e75490ed95a78217a
SHA512f560a46750ee9985cb985b561e51b609520c88dd764f8b9789db29e538dea5458ebb8e1d62c1fcc5ebab0b9ca74e7959b81d28259ca5441dfbfd0ec021e413c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527ad3ba04c0a16c87dc5c56b6142dd79
SHA1f91525c0d5a6cd71a0bbd711b1e4bede3c9c012b
SHA256e015cbbc5a1643913475173a82b0903213e7905c7c0b60b506de5ea7c50be1c5
SHA512117e4f54bbaedfbff03df26210363ab8f3be7a8772e50fd5b3198b4354f1f4bc415dc7000933768c2b74f0fd6d150098d7bdf521e2fec1ad0030f3edd5255abc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559e701a5a2debe6b85691e92f0886165
SHA1ddd690d0deffc415ce3294ebea0e105c44c433f9
SHA256c75de2daa9cb0a900077da70d5009aa5a9b849329164976cebcc0755b407974c
SHA512692fdf5b93a8948cf2a38aeb54256ab0aa48c4640b14310c9a33f5204ef26658bfc3375f1483c05b3a52c9674d0cc54f164bdcb60b5808cd9353b9788a3ffb1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522c64c951832799fbd82e0d21442aca6
SHA14c9166b42c78c246a84ce111e6b16ee1af55eaaf
SHA2563105b7286c8577c0f3b5d9320f1e94659fc2c3daf2640c535d99cc18db37d603
SHA5128682a4e5b0ad038383e14990d65ccb4592948f54d0acf3bd8c094e6159899675263a15ef1e86e566e61decc51cac099897df41fb280fb16de1e452ba63799cda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2b0a9ad9c044e9cc8d3421e34c30f5e
SHA18ef440ad135d25a11517f7ec642561bda867e91f
SHA256992f1a6bc0fe7b10520f5f858c513659eb50417809c47f37d3923b26b70207e5
SHA5120e70221920e99760419e2a1cdf099b701f68ba5e834b6b6239d71f01c97bd0f83f305a81dfd901629e3590fe5290ca36eea75a03b4b1696236753bb5011e69c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525450ebdf8bce0493daa0096e461c3a1
SHA160c538b3062da89b4c50ec5e69bed9196c24709b
SHA2565e144ec6b2b28de0107cb848196eeae34691673e271b16a82724a7075681735e
SHA5122a128fac0e91c2cc01abca6a2f19eccdfc2bb30e0b22dc2d8efc381672946b987cd47981c52dd08c035e6e1ba4271519e4c028128c8857055d885bc24132f94a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593a5c731bba4d7da975bbc048ac9b58a
SHA1026e473f1218614f9148a558bb37bf2b2cd980b5
SHA25674eeb38d6c62f970051a7cbf04a42acf73b8da31c596a4dedae91addb4df3f92
SHA512ad295f2aaf6998ecb437dd1e155e8c6ca641a2eb7ef26e23b378deff7e1522412301ed522c16884aac2f69bf062c6a5755fcba5503290ebba31c2faf6aa89ec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511cca2dec7e91fd48f0b3e92cff2e628
SHA14192b76fe6ea1e75f8dae92521d59f0d2b2a6ffd
SHA256234fa4f0074f4eccafa572362d0d0d65b0488e4bcb2633d4f1d565a79926d11a
SHA5123accff8ce1930f1051faf54b3884a6e11813b2a61ec0f490e10391a32515ec98c063e9741db7b44996e5a31227db640206d8477fd3bae7ea7257339f341b0a22
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b