Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 02:41
Static task
static1
Behavioral task
behavioral1
Sample
ce75c32d71d82589108efb896af7a958_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce75c32d71d82589108efb896af7a958_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ce75c32d71d82589108efb896af7a958_JaffaCakes118.html
-
Size
72KB
-
MD5
ce75c32d71d82589108efb896af7a958
-
SHA1
1fc353f13b10f80b4515b1aee281a0d56f7545b6
-
SHA256
374b53ca68ad8456bcdc449507df72f8473f0f269414812e25f4df2b60dcc3ed
-
SHA512
c88331e3d41613c5eca61a89cf4e9f741a686dc377698f5886f8f838216f8544d19f5c2f9336218124c8856ceb6a25721abedd072c5f43d564f2048f6f86d871
-
SSDEEP
768:aW27jSY82QcnHQ3TQ9esuIb4dpDqAYZZGffrs3e0jzZ7LVy2WTe5x03VXalPmIEG:aW27582KrPIb4bDqAi0AtX1bVyf0wgX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431752343" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7D2ABBA1-6BF9-11EF-976E-62CAC36041A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000695676ebdb9573a62e44a423dafee57243c9673b278ac05ed1fe4670c535153d000000000e8000000002000020000000d66fbf589c62b7e649d3a0be2fb9701f717d018048c5ed96a46fd26ea3795e6620000000f3823bea21aaa3d0c67d47ca292c2aabc226ef237d8fb1557d5c7041a3c24003400000009bef7b003cc230969573c8917ce842bb16c1bb0db4ad70f2231c5804b6bfa9fc67f664e006f95d7743223e6a645d020d692e1f161bffd3e9eb040503e8f4afc7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0ed95530600db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1680 iexplore.exe 1680 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2332 1680 iexplore.exe 30 PID 1680 wrote to memory of 2332 1680 iexplore.exe 30 PID 1680 wrote to memory of 2332 1680 iexplore.exe 30 PID 1680 wrote to memory of 2332 1680 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ce75c32d71d82589108efb896af7a958_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5904b10f3f3ce872d2729bcc4be66536b
SHA1fe436e4c14f7a482dbacead42a9ea1c011344202
SHA2569aee30f4a99e11c43ade2c18b59306239654fb28f6bce72e8323a2d60142e559
SHA512c3812d89928e3429d31fe00284049a229e9a07c5f767952e6f55f7f469dd65714661b811d8c4f319b0d07bace9dcded731341b6770566d914de92c50e7b35d40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543c7a555a05bbefc0062d5887e4cb0a0
SHA15e3fa63080205c8e116e23e4f171ec0a3c5e2b14
SHA256ad20824b19f4c7ecf8659c26f07fa447bc1f5830b629cfa36ca7a8e00d0e4c5b
SHA512559389f3b7c040729dce49aaa1c1b734c08b77a1b9b540725970bdc5d6bf3080a88938f91271b22b6bda69b7a799b35369c41bc8b37230a5202042fd0a2b4be1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bca6e5129a05c6630ef98d3d41a3e77
SHA194477e017acfd4ea7cca159f4126c150a1412dc2
SHA25623a73df55e4d5d2133834ac068b44d4e652465e0db5b8ff10e6e921026e1c4aa
SHA512325123e0d80dd8b9d9d1ddfb1dcc6efa6d5b9c3f2a6a1dd5fe90f5bd32a709ab0af8eecaf2835a453f763db71b92a7ac8a60334c3800caedb1509e86dad49af3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57308aaa1947aa3fa97f69d515997ec27
SHA13c48273dfd4e767df779045e3ff7d1b3a891bfd0
SHA256eca42df07c453e4362047622cdd7b248b9ee6171aae871d7bce70358261c4bee
SHA51200aabc83e651f11600fa25a4313d248b363c2cfb6f4b54f913ac1433821736b0529d852939b27fe0246c31015208c7996946a8e0b1c78915fa9185a3881fd5ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512935f12f1ff80b0ec025e183dfb3eda
SHA18eb931809fcc42a212432e51edae6951a8b275fc
SHA256f240fde723edd0d3ccdb37e7b652d0c72345dc1b4b18c50a3a57618996eeba8b
SHA5123fe72afebc804d46f5a185fc96049a757233d3eeb29d2b619b3930302666995d0d17d6ceb16175a34a7d6981a2349d368472f7702b6db5557945dd88ef4a01ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5997bb992a0e47b59dc5926c68e6ae065
SHA1b139ff598924c31195291d6fce83873da6d06461
SHA256d6361ae2d916f6fd5339de83cd555c1bd5029926da030a07cf0d516113bc8815
SHA512e15fe5ca27f2dcd9a962a6b6652ac816bc82d18a17360fd568193783289b1ec98a5b1f86e4ab1667953c863f07591e47d4d3e060323c8366bc7d78707dd35539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cab021a5ceb4ae1cdc51fa5a91a929f6
SHA163b1ec557623aedeb883406efaa89dac7fd70970
SHA2568498532f5b5b162a2f9f5a1ea3589d1c69f54bed86648856d4b67d36a9e6912c
SHA5120e1ccfc362fd3eca8cf3697b5a35a91d4b72222de0a77e156b9b952c8311ff699cc777f133a225857964ab7660b71a18f9da2d0ba0027698e186cd59506f36cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55011ecbd8133ae10d5d22f08e7188818
SHA1c668b04d1af865332e4360a812331ff1ef244178
SHA256840e03e6a8f7fa03b636750fbd3cb19e2abde0b7aebc5d1fd16ace1337d0a1f4
SHA51274a6661c57663e8941b79a34b0aafd75a7d0915099b784f698a0b8efcc76fb9d43601127b89bc1a1581915db378af141b3a8d8acccd1f8e52986c5c99d9e9c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8e11a9a6587ee7cd29ba002f2fd1a68
SHA15aa75d07ea7cde2aac57708358832733a330e3c2
SHA256ecfec0a406f2093caa7f47a4314708812fb231ddbc1e38c085d2f6f1fb5182ca
SHA512722fb32c5952c7f57a76b2bb4a5e5f0e2404e11228befd8af84eb5decaebf9116986b347885d51ffd17513d3143b710f6350128f008094d64229e0eb4accc7d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5742aaf2127d6429ae7122f3351ebb773
SHA17ed275a788b77c1cbfd89301f35700a16583315a
SHA25607ea8e4e458fa412d9f2b41da9790363179f11a1e90cc96571d54bd04400a2b5
SHA512a056de115598d7ad9e71b84e60462c8ae166a6b9612a150acc493500381fb1aa5d9a3ac74e633a8395f6cc1d55c12b37fce2e4d46687815591de2d37bd31c43b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512699c385c2166ab7f324464cc3ebd3a
SHA1a0df9af04b8b9cede7f79d9a6764f3dc51b791cb
SHA2568ce1b545b44507bb209c65decab0dc806681490cdcc39c8a749df89078cf3afd
SHA51242f7c0753a9459cf5dba9fc8e4c48d026a06963dc9682742d07b5b85bd23becd138a40359465b44ebfc5525134722cc61f56352b31cfb9597d5b0fadf6179bad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d1cea33749041e9e9c7213a4763fca5
SHA12cb294b4bcb2e3f0ae8be74bcb09e66483e2f878
SHA256d5f49e3b4bb3e4fd2188c9184c01f4829affdee1f43a903c242a1ed7b7427b81
SHA512bf39a08cdcab925facfd834ee4b6271a244f7b5578c36453d42123d95aaec37a83bd7c1b8dada637f1223f478b566371df67ff109bbe5ea31e73353e970b7a0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53073c326c63f48a8b83189e02f9aa86e
SHA17d05e6fee01123efafb6e6063e1d03314f457be8
SHA256a6edf66c32f6828809d3e30d90cb665edaed2125f9d73e27322739ed237ac026
SHA512dae267060345119160d17b8e075b76cec998efad72c433e2bb4ba6eec438976a3b90c0f1f527d1dd99803d93b6a4f92fb74d77a9c9edbbeb9dd822b514181319
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52494f7adecf5db378d9a5eed26cf6b72
SHA1b682f177f8c763542b829e082e54ee0c53f4c2ef
SHA256ea7b33b010c4dc02cdb95b2a112290d6078f1a5c6a46e824c8696b4d82e59779
SHA51226b0bb4bdc7ec42d312c5a63622cf0f07682c1eb72ca11f2e4754c4b6635e31f57236263eda9da254218fde0c0079acd91818ec1609784c4e1a894ad94128cbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ee51b7c442d08e2df3ed2bc9a0e1fc0
SHA163705cb3f34473621215a264a3c85af65985a43a
SHA256330a19aad74d59b9ef560a75f7a89175bec814ccd94edf4519e7cc000864f392
SHA5126aa3f087b470c5ae5f1c851df47add487e8f0ace22594fa9dbb46968c996c5bf404b811973c9c3b856ea392f5c6d9290056e65b8c9d48450b7d6036d681c0715
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaabe80a64fa4b6dcecad81edafb0331
SHA168faf5b1c1d0c0b54f91f059abcff40599c03153
SHA2561cf70aa9f0d79ae115d477787fd87908a490450eac64a6f54bb6c78405201982
SHA512946bcd5faeadfccd48b593b98c86c4c6c97ae537aaaa7296c3550fe945f8ea50b0d90f6e2fd582274e6eebb12de8f557bf35f9b12184ebeb7a80c5879623006e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5736d3375b767e0143e24133f16cf954b
SHA1695f7e4f30360db2008d84d161e95aef96d41149
SHA256d73d86193b550d50f55a702e578355f37dd1c03d75480de356e5890a13f58dcd
SHA51276e2acf7dbb5c2df488677d0118e1e38d0761e5ecc9fa39c374ea6920000b848687fb975bbd8de760f2b49772234406b41dc8dabf23febd6e8aace38b698802e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab3d29cfbfa693c4223a5d57df45b58f
SHA1d2ce7fe7b22d40ef13c36d6f6807176509d4c562
SHA256df4595c1a7b99508a9308673462ecfd4e7a64f2647ba73666d694f21883c8bb6
SHA512058efe902b7e7b43e8abea24eb1ab23377709339fb166f19fb745fa332e4378f96f7a86e84b754ab94accc49528ed211d66ab129bd416cbbf131bbd63d10714e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beafed1e66db73d5c9fb56d30a63e020
SHA14ea424e5dc9679c82bb688543375b53b523d9278
SHA256c9efb944b6f758d93757388c5d2de470baec912d1389851f333954f5eb6a9048
SHA5129d58a3974a4579499b97e9a3c0d71ee64e829b31c3f5c424a86ca12df4d3e328f8f1b51d843cc79b4f5098bb94ef3582fe90513e385b807a5e3fb3c4ed851d68
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b