Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 03:02
Static task
static1
Behavioral task
behavioral1
Sample
ce7ee7ae2a23472ff9774d9b0ff57261_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce7ee7ae2a23472ff9774d9b0ff57261_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ce7ee7ae2a23472ff9774d9b0ff57261_JaffaCakes118.html
-
Size
17KB
-
MD5
ce7ee7ae2a23472ff9774d9b0ff57261
-
SHA1
0db098763a26862fff258b207c25bfd050dd4193
-
SHA256
1f6903c155ab454dc2b539e3b59555c08581766f5981d42f70e332190701366f
-
SHA512
5020ab02324e9bb6a4e0584a6ca1a176e140dca10ad1ac0efa9eb872385a85c44b37360cb0d3a1951abc8d96d29aa702522f88dc88814e8ed55c48f0057693dd
-
SSDEEP
384:Rmd4rem5wDiQoqJvZa/jIBod28qTHn5pdwddHBDjJMCMtbc:Rm2rem5wGDqJvZCjIaATMzlMCMtbc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50d5634f0900db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{76EABA81-6BFC-11EF-8320-E61828AB23DD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000002b063294dad95708d529770bd5c449e308460b52d63da9d59eb4c217f6cad0ba000000000e8000000002000020000000e31a86e9d45ff87a9cd5aae0e3ac1099f99e259cb27daa24ca7e279f8bd4026620000000aab0782c2f6a40a855ad9a04f5b71cd1004646521fbbbc295c403feb259f39014000000031af70c6a517d84b18dc4d58e99f8e89606824d3c601171c0f780a0e27b437ecf8594a1fec10fe341be180823f806ad79bbc0452945e4cd08803c587bf7b0d69 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431753622" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2404 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2404 iexplore.exe 2404 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2092 2404 iexplore.exe 30 PID 2404 wrote to memory of 2092 2404 iexplore.exe 30 PID 2404 wrote to memory of 2092 2404 iexplore.exe 30 PID 2404 wrote to memory of 2092 2404 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ce7ee7ae2a23472ff9774d9b0ff57261_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2404 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6DA548C7E5915679F87E910D6581DEF1_E78AF556B931B27E99E310A416718F29
Filesize471B
MD5129275de62084b02ddf0e5ab89af9713
SHA182f1e2a2c8ff97a56209fd7fbd25c28d27484ad5
SHA256a847c0d6b1144c09661c0c9d161ab8a45121df0c939a3c4cb039e7d9add20fc5
SHA5127f7a3da0540bef0fb1730a4c51d04e946af16b232a1d74e9a91b7cfd1d6cabba04327d83969e7e97da565ebeec5645eb81c9bcb5894273d6c29f37f832bf8e13
-
Filesize
1KB
MD57fb5fa1534dcf77f2125b2403b30a0ee
SHA1365d96812a69ac0a4611ea4b70a3f306576cc3ea
SHA25633a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f
SHA512a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD5a39f413d541e054cd1a06bf888796ede
SHA198d6e00efef3e58f3d0569ec0197c9b3dac96930
SHA25647eb4d6fc4ce8298b6247a5b2f3cd56f85ffc8f7426c41b35ef3e2e84a61c148
SHA5122d25baf5dc08a336720010a423c26353f7f947e8e520bd302344ef3d376881f6d5fa21d65d8f6e7fe7d338ce1e7b2b03a027034f007e0d3d70c04532a82a20c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fc40f99e6ba7c7ad77d2cfa9bc03414
SHA14c229871557499a419b81cb6c1363788a96e2223
SHA2565f507d31429f5f4399000d5b63d26e5202501f550b6dd41fa608936ec3e51cd4
SHA512694a613323efc7087aa9148b48e6eccfa446ab5e4afeaecd30129c60b00c8d7a78b3b435b8c2a04522ebe202d0cb7484ac5e017648ec8a6a9d19b9a00c117a55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5684c67f4b55a95252c734c1b9584f08e
SHA19a7bd31ac3a4faa4ea7674bdcb846c3093211ab2
SHA2561fbe6579fbc54701554fa72ed30b1d17f47a8bbd4cf67aca897eac1fc7484a70
SHA51256e158819f6caac1fffbe8b473af60a066268eefc4013f02b3f30b346b71a844fc40de27b022d8b444847ac3e627b1b360a3c2f3f00a1389e7d6d71d240ef6b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aaf7d52475a356a7b4cda457784896d
SHA1dc993c3d5091d6d50af3665e1e915fd2b795e70e
SHA256b9799fccd1ad596b120740d11ae4b7bdef862fd97adffe9c359278b6a66f55bb
SHA51238f59ad8bbc81fa01e4ad1293ead1913183bbcf1353518a061b00518185c146402a00ad2eee503d9dbf6fd54ef4ae202b05f6a18980014865fac72aaf27990df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56400d696721e7179e71eae6fea4163d1
SHA1a691dd6ad3632c140b36b3cf0b28df7b37d03da3
SHA256e6226eb0d2232c2d932ac467057bf9c4987cbbf630b9c14d4255b253318ded0f
SHA512227121eb9b385bf0367e4c4cbf186061da8313dff00950841be5188bc556991c5190335b7177d495506d113a08036743ca247643a77c2c54b5cac7e777317f33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b00a1512a6211ca05157d5143b2ceb77
SHA16ab33fb9faeb7646bb1e825237843fb83a5fb4d9
SHA2566fdf02380ce79e437044ab227a38e8c536aba8d109ab98c4c68aca5db554b6e5
SHA5121d850b6ab78b0bf7f0a2fc1d757a0bb3e0c235ce7546221bb37c737a39756e1278df0792fb0b452aa46415f7918f6a8765154c011374380b4691962b99ae77f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3132494189c2b7899bb424ff85e5d3c
SHA10cd90ddd69e5864250d08cb7060df6669416648e
SHA256d018a312efde70add2242f035ddb456a732a5c2ed7b473c6a00562110ec85419
SHA51266d56ba528e73b202f1ccf67906f91db988a0f25dd51eee92cae1d305ffd36b774435547fdcb487e720c6341b02c939215737eaad6eac7f49646e10b5075d7de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b977a14f96fbc4566629a47c0a594947
SHA1353776da46578b3bf0ee4b9761ff1885df91b04f
SHA2565f431da7e56e0f57d5d223b4fbf90f80bf39e10f487026a25cdd55e702ee16f6
SHA5129855d0023f0855cfb144fdd69be78beaf97d4d552cb5f77ce82905c89be616e9b451b14954b91ce40f71acea1a28f96ec84d057f58a6fef2b31a0ccd2c8f562d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce2cc2b4efd983eb3981bc69df599d39
SHA1af62d250490035923bc3ffca58622a36b6f866ef
SHA256ef682b792d0fc832d3ac50c0bf3d0923eb85766611b20bc08c3c8c93d993657d
SHA512d140e057c4f934b4c3166c6137094f8bd60b856e7f85dcdbeebbf8812bd3e47a03a3fd458266b0db1bf7f9f116173c240de7d44ff1c433226305570e53bdbda2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aed936112affb1b6d51bd218513db814
SHA131aa9dc21c6052e537629b3daf66ad37df54298c
SHA2565d03715f87838650c51d8d97376bf626607fb64d0e6d512c96ff2d24c83f38c8
SHA5128549f851423a57230fb02ff5143bf83c70468372f421d45ea4f1c0f900cf4fcc70345d07f13e613ea00ecd5a2169d1e68be1956db4d78320ec66ffc7fa152ee0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be4b741509ffa6d8ee7183ea16e3fec6
SHA1cfdae422c1dcaba79495324bcf8fbb75bafefc06
SHA256631ff711c011a0d0f1c32b2c7036115bdfb579995e9d41a0e7bed9e89f9a1856
SHA5122f24808a8e4d17a49c6351c42a1f9338394bc21b0dd49b03131acfa4cc259d28560fa725a901af123c8a1b125ab1a1c699466c258584406cf791fda71189d75b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50144b88e243de216759f0bb7a4bed76d
SHA1f153cd23b079e6dc71d90c70a07027a26396d3fb
SHA2561acb248d02ef7803ba10385f2399a624ae44ec05ed7125ead2594564c9c2e2b9
SHA5124ed5dd19452405abf1b4f522081bc64b0665a61e3cce1574a7e6175ad2a7f875ae8dc2791d2cbdfc6c653ab1e93d4c8d3e9906adbabea1fd2223d16541d93c7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57167d5b003b2b27bc32a6d811feac302
SHA1f8786e15f62cdfa9f4d29f4445a7ac83147fbebc
SHA256fe6ea20bc0f893f99f6a8f2caa83282fef2bbc04bf10b6a801639f0c4ed3aa52
SHA51261d15ac1ab4cfa91c97e6feb706d2635bdcdc1052d9cb49d63ad55f3608968cce28b1be58d9fc30da7c26fa5dc3d08263ee4605db9e4a416c2d8c7ae124c06f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5806422abba1d51b3d32a44e91ffca642
SHA1fef6b8ed8dde842605ee783d7c387494e92ec2e4
SHA2564aa600cb44bd818a0ac587648dd1765f067b480b04312a332cbcc209b6a677b9
SHA512cd5b9c32e0f509fc13d71b8c1863cd324bf67dc17bf226f8673a9f33c4f8eb208f648fc66bf9d2ab0299718f596f1a391a40a5ce5b5435bbe3229e9df99cba88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582e5c27d0c9859c3938fa6f674abc567
SHA1819b9415e95bd3b94c99d147a0ecac7892b42f63
SHA256939c7a7ecc571e3abca911e7576ffd557c34bf1d3350622c385b04e914bc1628
SHA512dc70eedd0a7327eccd29df1d1c9a400a45c71f1095b7a85b9af98bc2c8c1d9316125a16cbed9f72d84e1c737a0a40a9509698524afde152081f5c1821f854394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a72d0e6a53293fcf55c16c99845a05b
SHA1c6c194ac0f16d44658959027363cee3b183f188f
SHA2561e844726c4d58663bf10ba1613204acd197157ec15e95b9881d7328a6b82a01e
SHA512f679a8c5931527f7580be55ccc1b43e7613b1910d6b8359db0edc43877d7e7a6700661f387b8f3355d1a626af9a115355e73aa9807104e36144820ed08394d20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8
Filesize170B
MD5288212abc0b8b771d0480d13abab8782
SHA1e3230f86e89fe67d1f9f4977d1dcbf701bae6865
SHA256d4c90373c982d3bb3c00d8195f27805af5b4ea7520862cb97e846e41cc4589cd
SHA5127d3f5985bf88c9fcef8059c9be739539744bab81f1c51be023288d7bf4d124204c86a912bdf6d68e897fd09736edf7bfb6e11658dd312279313ae85a475fd369
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b