Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 00:39
Static task
static1
Behavioral task
behavioral1
Sample
ce42b3c8c7e303bc47ab21407897d5cf_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ce42b3c8c7e303bc47ab21407897d5cf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ce42b3c8c7e303bc47ab21407897d5cf_JaffaCakes118.html
-
Size
3KB
-
MD5
ce42b3c8c7e303bc47ab21407897d5cf
-
SHA1
89fe0a74bf5e9ef5094c3ea5160d7f13de4865a9
-
SHA256
60c4c807cd3eba1844c0c9828d63e7fc4278cb38b2ddf13198fdf0ad1f6fefef
-
SHA512
72dbea816c96a288db55954cdce752fa423e0b82e99f5d5f51092664bcea6c51ff2ea628cc743bb9ce3d38414269d085e63ceb6e8c3d22122adae9e75860e438
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431745019" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000882b413e6019fae09f9c4177446589a057ae9c3aa3ae39213777777879ee536f000000000e8000000002000020000000b857b024ae95fcabd7c61af4ab39b6d88857f12cfcb2c5eb54bc8ec5e4dfa8512000000048697f359952ffa15b6528ecbd29cf5c0f4b511008d44bf3ca3c167d6139a5bc40000000161c52f5c260d7aeafacb4924b0aace6dbb1205be418bfb85c155c046122d3a37aa02e857bcec77e43574ffa5b9e698e97f6891f19ecc085b90c120a33b9e245 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6F2AEEA1-6BE8-11EF-B4E2-F64010A3169C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00d8e943f5ffda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2756 iexplore.exe 2756 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2712 2756 iexplore.exe 31 PID 2756 wrote to memory of 2712 2756 iexplore.exe 31 PID 2756 wrote to memory of 2712 2756 iexplore.exe 31 PID 2756 wrote to memory of 2712 2756 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ce42b3c8c7e303bc47ab21407897d5cf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2756 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5568b9764f1e68ec60ee27391aaafe13b
SHA16b96d5b4ba944bad4cad3378ed9dff56607bf941
SHA25681dbfbda34b8c41d184d5d0d1a1cc1b05b3ec3cc8b4f402298c34493d5a34ad7
SHA5128050e8000c01757a45f7c9455333725238c30c9d4295057562a2b7e9f7dfac30a8e4c69a923cb55e93cdbd3fc0c3ba80860e2b75ee0df767cb31c6aa82aae621
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4b2099e69bf300ed7243c898c78d69c
SHA1b4444f7886bc95c22c7be3c5f6e44904536d79a1
SHA256434d133572d02c556bb111481d068b65e24259625fd020346ce52315450cc115
SHA512bb21dd14b172335bac4f45222acc759f91150a195df99ec2243e7c89056df9c56b9f57284d3a901417f1b5a868cc4daf0b55b237e1b1322d042b5b907303dd17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faee63256c6b4aca09febdd8e624fa71
SHA13959fb9970675991756ead90b0a3d7e77817936e
SHA2565e69e30ba18c00e7ca477d74f54d90528fa42bb5c991ad6262aec44977c2fcf6
SHA512a004868b7970dd024c6ac94732472b4c8dcfb7513f92157ced4f1a733e5f07b5c6cb5f95c1da730a5a4a5293433f1a6d19fe70996618cc3e3ff4a924aa2b55b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5611b2688d683b84636d427c0687c85bf
SHA155c17a6efbee6b3fc4a6427cc08a3a3de7ad1f53
SHA2563c744a618173f6ae6e5a1f394c217f14f6498780e472b4ff8b583209dc99e1ea
SHA5120c383f1bcc3a399046652a52e47fbbf0c0e5cd173b7cde8ea36c5655ab9463bc419fc0269b129684dc0eb2752c37abe8d17f1e8150b5e386e528e9885c49fd4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574ce09e28a15da798b8cfd0a1e5842e7
SHA1eef3b8854e86e713c23f6a87c579c2dcc5c00014
SHA256a511f7382d7202ad071a54598a7877052042d43dd6903020d34be720d22fb330
SHA5122290b39b6fba88b8e9a53e38f335c9f5c7427a8b58a513f232a3f0260bf704449f898148adc13a29ea766546ff148e5dd75338496cd457ab4b2ea96b9ed4db6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587e3a327fa67e245b943f054ef5a6d4b
SHA1ac3062a2939b3ea795c9758cad30a8056a747657
SHA2567ab3ae1bfc11b60e1c2f629bd8a4c1b6e19d97f5947ee84ee7e7b208acfbe083
SHA5121bc649d696585d826af7f9e356d6d4dd874af7efebd6e54afa6ef2d266f42891c9c599b25c101ae00997802d8842adf4bcc2de2a152994c52104efe264e042ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c9eb8f314739018babe5decd3681538
SHA151e4d2d7a48385eaf657f78bf5275115bb71b88d
SHA2564a2de3bba0e40f4849b739059efd9d8d91a1d5a84f61fb55c9f1f31a794c4177
SHA512f2fae613b5a453e81cfe5cab3ca61684eda3d220aec89e9e7b97612ef8c5d9b77611e4d9e57865ea812e2ab000f8004040b522bee4ed8f307fef9ff7bad8e581
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590dc3a9403cf05542b018976827ac4b6
SHA1a8919ed8b2a828c8a38d6027b3e92d2fedf5d509
SHA256111e44edcfa0ba9ab8126cd09e2d405ce0b8cb86d11b5b69c44194f7bdca65d1
SHA512fab666f4a707ce624e0bb71c268829315c6a2b6b5340dd939d3dc49ee14aac47ef8c25053f6828aaf7d54754b6204bd59695348b8506b49d69fd37123615af62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56de6652ceb0b16cc2c5dae899af25da9
SHA1163ea7c26c1bb0b7e6419869d1a274b7a19e548a
SHA256f79648f44f1c15dba570c72aa5eae8b5a6613044de1f7c4bb4f50a8c58bf19ac
SHA51247745ef7b79da4e58c89e9bc69637efbce8b0f27336652a03126745b8da0a89cb9c3ea3f87549e421df3b845f854c95b875c94a0c5249e564b5eb17c75824be7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5203e697ffa3a997bf9a894d951780898
SHA1d37e84a70397a15674ebc253b049c57a54bbc80b
SHA25698cc82f21616c6af9b8cc08f2f95db9b136147c4165c25be0f481561c63c454c
SHA5126ef770efba8055f5a9bf0f62175ac195a8f53ed7d7770610ae6e083697c12caf53b116c96fefcc4256a8142a7d86a8a80cb94615836a62da9ee290274ddbfda0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d4b38187c707dce55a2f98f46352900
SHA1762811f9d4e3883cea70f4eb85966955893fcdfa
SHA256289f29d9f93ddfa443b00d49fff1fa25a425ec8d3563757f1611a105623b47be
SHA512f25c0940f1fa3c0ff675e0a1c9471de1cf3f75d7795c53ebbadfcf054c39a5e560219eaebd5095937e40492c52c8046099b5ea4a556e8ed01e732f1f597702d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5043e628d6d03edfcbf55b74b43a5efea
SHA1c5eafdc104d0821bfaaf3ab704f4986d454bb311
SHA256dcac9cadaf8eac141dfad8f3e78f8cbd64a495504a24f2794c681267fd8d4750
SHA512e109cfaed81e90758484820dc8dfd7d4ddf0ad49c632d2db859cd0c80eb286536187c0a40b726921cd02c34dc9d375de416a1bfde131f6728b27488eedefb3a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd53feec0e486f5215ea65d3271ec02a
SHA1895b71bb75140234a339ca855acf093eb3ddee80
SHA256ffae734486224d4670c3eb9419d3e5e04ff572b11ec260c84793415e8a205eb0
SHA512a8920b5dae39e9356f8fc61a287dbd533d21bc28252f9dcaaae591510c5edae4cab9284f5e89f1e5366b8af72ae3275490bf7e04881ee7b654a1cb931d09eeba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523406a52d72f1fed82591bef60cf9136
SHA1cdb013987a8448ba54aeb25dd158d0b669cb9f07
SHA256bbb2016a346da7e57d9a0d83ccc898357d305adc586cfd04ec20ffa2a0b7456c
SHA512b13bff558ca4847ee9b752319d782151e5d5543088c3bd84d6fa3479908f628197c53b40cf4a3a2f8919b71aaa6873e9ad551a94d7661961aeb7ea34f01e924b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5399b966765d0b33d17c57747fc90fd50
SHA1e2183d69af85ae88861a70879aee79ff6ce71793
SHA256ee73bdda454c0bb2200813008959021e5b856a88cf75ae30ed148e8f0b9ba047
SHA512571ba496cb855702637ff0d63849a8e17a820dcea6f4e93d11ff2cbf99b2654cc268cdc282195b81d8693ddeb7e374f1ac4443e4fcf153fe7728d5d47eae2ec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509db97e99a51af03e17950a57fc166c3
SHA1ccc6abf771cdfaa3a7a482f611f7d11f23588033
SHA256b065247b8aa42dd8cec65e8217172050b71fb993b4d7c1ec074e65d7cc481fd6
SHA512c7a2ff321397bcee62c812e3220efc76eeaee9b796f6a82dcdc2e40943bd3770026721c7870e9d114c4896cc32bbcf2230b2f83127d7dd7f74a8bf9d947079f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567728547b13efb8a4485183540571596
SHA18374ae89a3c0f9368a69851e3dd81ee1f1d85bed
SHA2560b7576c4f4001d1a9ae608d1d82eae76ceb3f8e374064574cdb2a6f2f015873e
SHA5129d4b01df6e8a5964f1b630b57d0b62afc55233f0c45bb0ca098ed56d7661f99b1fbf7e02199111eb9a9240f788a875944a3ba8debe2b7297231505320eecf1b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5960b299a3ad4c32329ea7e51c19f9124
SHA1582f62dced06f6a207cdc881b3d073447f19b997
SHA256ecdf8f2bb168ac1f012253fd7efe9255c4236034f7175c2d8c06226b88ea1ee8
SHA5125d427119e34bb1dd362e328583508ea8d00a0351cef2909c303ca8afc611e93551fb4da627756effbee52cb3baa5cb848ad3170359bedf5b4f6a205531b6a1aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b