Analysis
-
max time kernel
136s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 01:25
Static task
static1
Behavioral task
behavioral1
Sample
ce55005205e564f590b6464cac695df8_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ce55005205e564f590b6464cac695df8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ce55005205e564f590b6464cac695df8_JaffaCakes118.html
-
Size
67KB
-
MD5
ce55005205e564f590b6464cac695df8
-
SHA1
d1c790c7291349774bf7b54ef2038935483a47c0
-
SHA256
74026b7747f12364cad6f75203a86d8fe98f4c993f6262165253d8ba2333e7e5
-
SHA512
34ba37da6b55a51c4e52ec3511635d18705716fd6a743c4e960fb957c7d4f6aac9077a6d09996ab7952572c50dea280090da3c338732955b2734196e7457fe5f
-
SSDEEP
768:Ji/gcMiR3sI2PDDnX0g6sH6E9oTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8sM:JdOTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000006702782b0964115dc5884d21a01d5825a5b8b563bf5c21a79ed68c61bac8b24b000000000e80000000020000200000007a3b14c587352926e424b8c8cbb3ee5ba6c8a85eba0d86e2b42461a54d6a2a76200000004c9e9d4b9d91c37c02b8f37ac0ebae3be035c90b6045d2d720ff1c4875898c82400000006d13cbf1c2ff00dd8284979345bf46698bf7d5734c1941bda4b44d73565bc787262d432974b21d1f65953d241251dd276b9eae86250c8c36de86a65644c93eda iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431747770" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D6D87851-6BEE-11EF-9A0C-EE33E2B06AA8} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 909c0cadfbffda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2416 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2416 iexplore.exe 2416 iexplore.exe 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2420 2416 iexplore.exe 30 PID 2416 wrote to memory of 2420 2416 iexplore.exe 30 PID 2416 wrote to memory of 2420 2416 iexplore.exe 30 PID 2416 wrote to memory of 2420 2416 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ce55005205e564f590b6464cac695df8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532093696399d5342559568b3841564d7
SHA12c0e3bd944cbae8f3e05ad6b2d0a3327ac971050
SHA25609284bd75f6349fc45d7bd35553433d0d1d023b66e399928f36e360c4e7456a0
SHA512105260315c8d8bd9d603cf5820e2916c2a261e6ed1081c96c1872864385ba1f73b35e8ed1c219c8858aa751cf4e34c1cabfa9bd27039b126d695457395ea98f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df0b5abe677752f4c496e0233196c5af
SHA1c9827cd10dbb6b9a8d294bdb316f6c235cbe6b22
SHA256fb21559957b319e27faf5ceee608d3f93a52b261ce94fd4ac9028fa4dd4a17fd
SHA512aaa986f3080f0ff6bed2def7fa66bc97156f132557382c8ed7bb5907caf3f1c05f05eb039a316f63f37a1165eb23217fd280301c715c40dff3607762fdd3395e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ce2cd29baf6a47e12e27a5a6e5e6df2
SHA16549f06456d4085f28679490d3f27d70aa4e1f77
SHA2561074e4a34d3e4a4611dd667b2c63b5bb94d066308b9c7e6bdf0cea1efab009ce
SHA5123423596746101e0844a33cc076a19b25c691b7d66067f3c23876d3b217fe9083e928e688c635fdb62e4125838a112fe36fb1a4c1cd8d6f7586064878fd6d1b89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a650fb66d7757d3d6efac3e6130d230
SHA14dd01d9249b0ad0bc8d2bdf5ca93d9b4b94feb49
SHA25688f90b665793becd35a68be60f2961ddce73ad09ba42645ba120d2ed89a19046
SHA512d2b5d1b48f6caf502b77a769121b5c8a37a59f908dc6423b8d6877bde2b6bd71d7fca5d81e336af76720058f17c9bb098caccc2b461c1311f1ea0b824d5e6dd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8a3fadcb935a18d214e317461f655e2
SHA107901c7c99d98ee8a387c46ed1a71d7ee5c01931
SHA2563862acf11af29552ba32be5b614946ce0d71ad83d1532e0e53e90bec18321210
SHA512464395a6dbd3554495a21edba7b676be5711e8c77bc0beabaa7a9da2cabd74feb2c0db57138a638adbf5b0b984b60ca881917b7882f089e9d4f8bd4529b3f0ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d79a3dabf76d72e944123f53899abd12
SHA17ae580f144c52623b25ef2665efffedacbfd6eb7
SHA256f4e5eedb3a0781816caa440b5211895ab6641b6a3820e0a629bf7d55695c8e1c
SHA51202a55c4a69ffdd15c08724cf22dcdb86f3aa608bb47f1fc3c130f142c45b4042636989a91d7231b195c987c4da99103eb803201cc51b485e366554559d495131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d01ccb106f68602e134572ee98a7261e
SHA1eb4456be1000496326c0a52397f1dfd90d7ecf51
SHA256f122a38c399535f6ad7d0c2e9d738a79d6f169db69e94f38d89375b54f64ed81
SHA5125b352f65839c94dd6a6ff12ebc222d747bce4b5c1ee07f3d17f572e34c369018ac4a4176f3f75bb1de39491d91cd07dfb41c4884050a787e910ea64e3b3a61aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fe9729541ff37efc24544f2bf2be8a0
SHA13c6b7561bf6b4cf7dc7e0edf72ccc018650ff453
SHA256a8b11cdcca3b412f57df04a88812edb9f34640acd4218bb76b9a9caaa9d3df49
SHA5126d9c346bf3acf39f597692f41f208e7203e5d819cb8d9bfcd3140cfdcfe3dc28a076038b6fcf5a6478d6ae625186c96dbcbfd430dcb204b4007b37fb954b4d14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511ba935d2106ce856a9f91fc6867c481
SHA1e621ef124591e2e9d5b6011e33883b34114791e0
SHA25632340a700374250f25d9db1ab8869c89bb489b8010b14ad06355164dd2237f6a
SHA512ba420b5a1c76b0b9c546ad7122dd3f5f64d7e1e65bc10c00ac9864949685819b82f3bff212b43d01bf8b6ee672dcdb656876bbd57dda87197d91f84324e52dc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f4a05905c3087858486a7cfbddf21c0
SHA18d3648e2ae35db54b9e06d2c154cd2d4a4f8fc99
SHA2565576bcd3b8c0b7b2b9c9ee510b4822aa307c5727ede604d597d5b5c5b4ba2aeb
SHA51274d3f8e46d59b97161de3748383794a8b5182fd656c8e183204ea7fc49d4ab2c88e3bbb6686cc078aaf39b66fc860e2e540999983b08f296a217993c8f6e3fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e28eac8fdfcb06b02130cb707f36fb8d
SHA13ef0667d2e0d364af47ac06a07e247943492fbe9
SHA25681faee76d75b90535317aed0d77afc61db8b0968aa04ee8b478ffd0008804576
SHA512ee6b95b20cc2793e871d43a76569732e4d8224a0fa2e2facaf0d83317e4d505c6606c05eb6d05fcdbe76c6f7a41a5668325065c75a4a7ecdcfa6bd60f9945608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef03b5b5f757b3d154ea8b11a6a95a0c
SHA1cab1e2c24874b65bbd2e33d37b088c3000118066
SHA256e47319c7c47965e4721dfc24e893d2224d0ccaccec8ff4d045d869b1a5b0086f
SHA5128ab5e6e292b0b692147ea0cb93997793275129b4d664199e327834f9642d65c87f8ef17cf266cdabe77ec89cdbe5b7cd49ca4dc411e254d73d4bad596d1139e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59058646a38a60994b8fc3c22816e87e1
SHA1996fbd7aacd3f907255953cb89390f32d55ab52c
SHA256398648ca5b4f39915a0f41dbe5b3caac3dab793f03d077a36a1fa58cc8f7bff7
SHA51288efeb27d548c8713f30c1881e8146ab454c4b22aa6eaa6fd38aca77e752a9a08382bb8a5324ce5303dd74a72b7def00b029bcf09024d430f7b963ebe64530db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab082162eef39a3a96bb67c78b43f109
SHA14a7e68ec3b32048b0cdac5f61d3595c00266fac5
SHA256bc87597c53664e22947e6eb54a2bf270df057bae4b3628efd16f2866096f79c2
SHA5128c481bb4dc8c6e5b698e2f4012a30a95a832a6d1df23787a0e75dd9080b9e7cca219fd80aa80016cee9e64779b24017bb2afee3064a02eb8197d41ed54a22608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be9e8ed9f22de46ba8489cb94a0225c8
SHA1028676dae466e90ddc06b0a786bfde8a57df963d
SHA2565d0adda0a55630598cb40eb026d919126290f799809446ae567b19302e6819a4
SHA512d657d322fdda5f93cb32333568a035ea84c11b4508b76e80d16996c246ff64455ece67097d69f757446d8ffc5cad4ef25f1cee02930198e80de95f1b4717908e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500f22e3f5643eade4e849479bec67eca
SHA108a805c3943f51ae58de95d00f9e6fa6b76b7e37
SHA256fdf097e71dea9cd879e0258e729ca568b1a596b6fa6799ac32ace8304227fa10
SHA512e5aeb909c5578130f57aacc46694a71d0e9c39a7d85dd9983f6e5571cdd1edf3f1fea16bddba987a8977ccf8f8d105556b63dcdcd5c72a74b098a0d9a569863c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558eb4fe51d0ff171a3ec3fca4935fdad
SHA1b847b1bb33ebd73d70b95fba717d9d543e394b69
SHA2561559dbdc397238cc3fa158d37c82f5fa2a62d13c6d2b45bf83ced276c18e1a0d
SHA512e2794ba393666274add2870ac6f727248c7a5d3241eca21414907b46afda0f7ea10a2561ec7dfa2e5c5291b7d98d811705f09a77f5a3a128f29d3edeebe7e0d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e963d32e0bb5f63de99213a6d300ae14
SHA137712fcadf06e1b9ff41066e57abdf71966546d5
SHA256a9ebc70beea776ba3e399b00a4dd92ecee0f3f208601bc70666983ec9ab4ca01
SHA512c7df3506a63db55c171851e92cd721845418fb35ef718f556f75670058c8a54bca3d35ee74d604ca435f1dd016d76c647c9c6b207de2af9d300dc21e569c971c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5437917c6ea4ceef04b7344df14c24b95
SHA129919b07f198520547935e58cc88854bcb2ac04e
SHA256c9573f4208b73ca7612e0105eba7e9533f185f0d9083cbdc56b4b46c8abd272d
SHA512954977d8aebe06cf3bf783025b625af1a7de13f43a5d7a5e5cd41969b71ed4f724202cdf9643d47d63bbb1be8e000f09454f5673bee619aba3c5e82653d6704f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b