Analysis
-
max time kernel
74s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 02:08
Static task
static1
Behavioral task
behavioral1
Sample
ce67d16ba1a5f727be2e380d3e38bc74_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce67d16ba1a5f727be2e380d3e38bc74_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ce67d16ba1a5f727be2e380d3e38bc74_JaffaCakes118.html
-
Size
6KB
-
MD5
ce67d16ba1a5f727be2e380d3e38bc74
-
SHA1
22b23bc816f4f047231bd8d5440023703f445db2
-
SHA256
494d199e1a1a6fb0b23e96a4e98a13e2ed618fdfac916643e13428bf69d7b752
-
SHA512
1142e08312a0a5fd4b12ac6cad46e533586a62453cf0daf3aef64b320541fdb6a112171031c329d55f16eb8447aa133c6d644fd3cf377816caed891583c92534
-
SSDEEP
96:uzVs+ux7VMoLLY1k9o84d12ef7CSTU6r/6/NcEZ7ru7f:csz76oAYS/D4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431750377" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E845AF81-6BF4-11EF-B2A2-C6DA928D33CD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000008af151c51901bcaf2c77b2f02c18c25015ed7baad2652586b65db7bf592e22d8000000000e80000000020000200000004483aa7e00e6bdd1f5f90076388fb051b02afbf151e9c472cf144d612d229c892000000051a1c44055b238028e3bce1bf1eecfa4bdd73c9f7ac9efd0c778322f5964674940000000925668a0f80e8571ce3b1b75a3a5cb3b3bb0c2d7bc35296653244b2000f58aaa582526bbc1d5d5ae032d4b38f06358d639eea4728dd14bc8e860c71629f1579c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e08d55d60100db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2700 2368 iexplore.exe 29 PID 2368 wrote to memory of 2700 2368 iexplore.exe 29 PID 2368 wrote to memory of 2700 2368 iexplore.exe 29 PID 2368 wrote to memory of 2700 2368 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ce67d16ba1a5f727be2e380d3e38bc74_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cec81fbe5446b3f5799eeb8bd0704d9e
SHA136a7d437c0b4e6a5938a5f8dab9a09851e2970bb
SHA25615ee739da9539d172fd45fa5bb3111348e766a25b5ca5a70ee622ee2b8580547
SHA5125c1bf370f80e15f13c547cc467684f0696fcbade8d3e87fde3b474a85ae57043ee81b868cfb3849f39bd351e94ee72647a930f69e39b58f0abf1a4abcb1d5702
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59449ea8b44cfbff1f85d78559bbd18ef
SHA19136c46be07ad09fabd371bbdf791aed69fa1ba2
SHA2569e6e4c7a12dbfd3f5364fff32cf902f02aa73fd72dd541394411d12f223666c2
SHA512fb2f95a1e88600413eb11e805d8cc253cd21768fc7fd73e1eac240993eed4d799db9d8c725e1c0ce91bf4742e8076b38513ad6cb8149967491dcaed3f045185e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57906d87c4acc04902170d7bdfd0c633f
SHA17d585c4027d99f458fff15d497160c07773ef7d9
SHA256f23efbf08f0f6b2a32b0b15d83b62fdb1d8da2020b677ac6523ab20a5bc19f65
SHA5123fed71f50803e57c984c6b4926b55d79d43cd3f4139f65b26c9c03a2707cb127b4aedf3c87901b3f7e950fe47c3e233473d8840c6cde1fbfc33bb69f57bcdd73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a71df37bbd1b009cb1a6aded19455633
SHA1c2547eaa87a6e79715ab30206e24e8dc15cf5814
SHA256ccceba2065095fe13853ef7da64476b22129cd25b8c17ddf993507e88f401075
SHA51252f200c7f4314b26e4102b02f3d9f9160f08fd57d29955efbd98dc9a43a470d1b5ad9f1aeae5573b82b2c83c657b0e82926f75cad01fae6a16b38ff2bea9033c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d330809deaf716bc5b2be70d0fca748
SHA1c0c783e6130d0b3259bd646fc943f1d76c7006b5
SHA256668ce4883822a5160e29335a3f30821cdeca2c85fdf77a15196fd39f0ffd973d
SHA51272822ffb5668adaf5d0836bc2d7448ab87ae0b3711de6d0524e80c0eaa3aef3dc76ea3e385bdc4467891266d7c4de2cc5fbda931faca4f3159b19cd56da25c0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574200f71ea33e25abbb5ea1058ca219c
SHA16d9339049c53cb7b7b965210f564c69fffb21ae3
SHA256ea4c4fe0a500f341995dc3f5b517d7e3a1065c94754057fc774cc5042c5815fa
SHA5124a28fc3201a1ce677ad4b489b6610e5d9d9566ea638e57deb9e23069f473ab7a70334d4c022a3cf449b702dac4c0f4a07fab2e90811f3c9182b07e153b3b4953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52af28cc6afa9363b85b3cc3c90c03b07
SHA15224c8c1af90536f7d3c7f9b623e12b7fff34eb6
SHA256818c12e259062594e8da25b0421e38eed0042ba4180e8afa22023bb383e169d5
SHA512ef1aa69433e6f533e5a1558433e0937111103aff9a9724713c677c034e7fed7003c7060be849b9489f107f8a165a1bae9adb5d35e38935892214fece866d5bd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bdcd2f6660a661c708ffca7ba448220
SHA10dffe95fc088a03be729dc3888acf92efe104296
SHA2561ae2aea7523098a4c64c423d59be0ba5967dad94934567b271bf2cf3b999be4a
SHA512f3ab949a9fb7bcc65515b119cc22876d7d9ebb435887255e8700c61247386eed79ef00f8be0e19fa466d1470a3498a004f13347ff004bb9e338a13162b24a1a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522438b336e6a6957d4b17bdd679731c5
SHA1367f846abaa12854d8c27bba275b781516ddb782
SHA2561e67bb78ee55e13339e191dd3bbf0f025696203a0432c6ef52243e93beae3b40
SHA512807d87e97d041f6bfcd8ab8f0130b8661d67d9b16e23e1dd53102fa1f0ac31569fcd5faa99fe424c8281338299f397f034edb199786cdb5434c00eee100481f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4ed045c988c99650f8f13bcb9438a00
SHA12e189ee705b1c0ab8dc11832453614b02e4560a1
SHA256bdc320418ebb18d56a76a9640eae6389195a65e71e9b45c0dbc2a9cb333e78d4
SHA5121f18382ef00a77f354a8a4eb83240550f58484b3143cd47e64e434369ce4f4496852fe7116b27d9135ab3901b274012ad6c5672662ef13ded0a675a164f6e5fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587a188a8eeaa1b349b76dd05e596ad40
SHA1e07c514e2a917b3d384becaa975b41cedb8bc5a9
SHA2567085d42469faf10f584d449bd6f554a2af05893deee7c40515d350f62c0ba46e
SHA5121f47ce7bea31d8ebdcc8c4716ffac61d22f2d9b7825d47753a1f134082812fa884b3bf38cb5e95df8d8a81f1edc91a71c9f7f4f16ca52eb15d19c63a18b1bbcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57513dbfe7234f5853ba713ddcef962bc
SHA1144c34d311fae64cf68cee539af84ae74e062578
SHA2569b188db32520c834677233017a013af0e4d5c87e7b4a54d7733ea10988466d1f
SHA512e64c2ac32559a9f1aefce172bdc98a670a6cde9724f980f7b7dae9cbacc8ca99bfc80e42581361218492ef89703a1b3565edb1e6284145f8ce05b1225d2deff8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb7155408e9cbac5ab1b183e3c092c98
SHA1570e24046d00b12dc98b206d5a83579fcfa3421e
SHA256ffc6118b6030d56f2d59659808c0379b243a35341d62fc16aeaefd0d97e5468d
SHA5129d6516b9bf398c49394ce2eed7be5bb33f4be9d0792f2c2fba87dc5df0c13cf834f87a5debb72c0cf2e5cc235096220afc69aa8233c7043e44e19b6018a47e4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531031acbafb3d267f4094a8489064191
SHA1e3aae59f481d2b92bcb65e0aa94320b0794a9f2f
SHA2568e35162b00db577e1643af14e0ccb973baeb65fcdcb3ae60bfa6318e99e0ad17
SHA512c496db17b9ce11fd88d9fba5a2a1619d0cadcb75aeba7c59cfcb61c3cdefd599c951835acefc4ae74efdf93cd6f5173972a367318812f804dd8dbfd46fdcdc9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6d8f6c514d3f30a2dfd67b0032ed2e1
SHA1e5ed9c6d77bef351063d42175a8441adecc9f293
SHA256ebc6b4ae9059e1dee1bfa005bbed74234e11470d334f2d3b72118d21913f79a6
SHA51219425499a3295bdd3e513c5b371c0d45e48f34ed3ebdbeda3020bf4307f252f923dc364d97e05bcceaa0e55125384ea36e314378f42fae6b33e08dfe9bdb9032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bad17313d842a80638319e0b62aa473
SHA1349f63e84076014c21b59bcace0a688df8bdb343
SHA2561a0cdedce16b89d0e7fda5c8848b1709a531446a69d4531f6dade55253bd47b8
SHA51237e022d92c4a919f5abf6f5b4f47b880bda6880c417f18a2d8aba022b429a9dfe81cf86107a690beb152169ab0b90fb250cc38ad221a38e0a6a9ee6b329900fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b242703a67bfd84e1b6c7035d82207f
SHA180644bb7a29efaf7bd6bd57bce8ddcdacc7a4980
SHA25614d05e811703111b4011b21211b28654755d486acadcdfd158dc76cce15584db
SHA51205db3e7ae3c11f6bef7013810e8565b712dc3da929cfa0e1831d1e16ba560a9c33ff1892a5f7cb709df91c7220b270c00552223e6a1c392f16acb98834d3ae2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5291e9f108d78ed4c162471882e172dbd
SHA1507256ceca3b5e5dc45c16e6b6c6659f5c496881
SHA256cef9f77c259fdc010f8cfad9c1be6df7583b11699ee4a9b869afc0cb82a644e6
SHA51235da1d58daa3fed6e94836423da80966c949ac095ff0c7f84d3467274ef05968dfba681ed6ecb70102203abf4abe8f3ade396aa6e36c40cc32b84cb8d555449c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a16bf7b15df6443806d55de881dacee3
SHA1fcb3ca0d07b64250974551d5d3fce5b06709cb71
SHA2568a1b69bed45da93e15317bcaf4f1bdf5c9c4e95fad6c377178ae42fb2748340b
SHA512dd622e9d0d142fd76b8da5d3b5789d8a7bdbbf82aa65da5d075a0e7586d0ecfdf6b731ef0c486697c14c577bfcc3fca31cd069df794906c85902121ddac03c8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5446bed9306e5397439e4c41a012edbbb
SHA1b555ff148f17f143fe98dd9eb93e5d57ec28acf3
SHA256d7f3a529891464d7bd4617d50d6a39b5d2dc7acffbd40078998ea8d99df2564f
SHA512ffe2175612f10e0b3a3e290c3b6359584389ebab4f053553ea1145a16cf1adad67fe67c127ff1c924acaf816572b11413be859ae25786c7cb4cbafb0c90aff88
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b