Analysis
-
max time kernel
133s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 03:50
Static task
static1
Behavioral task
behavioral1
Sample
ce94c4fb93e30ba9b1d3a487527166ee_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce94c4fb93e30ba9b1d3a487527166ee_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ce94c4fb93e30ba9b1d3a487527166ee_JaffaCakes118.html
-
Size
118KB
-
MD5
ce94c4fb93e30ba9b1d3a487527166ee
-
SHA1
a807f069c4ec22e7ddbcc37fb9b03fd5acf231de
-
SHA256
60abecdbfe5ed46192c3fec70664ac66a35fefdfa4a2f39f0b323c7bcd9cf7e9
-
SHA512
d2056d9f5536b1fe93cf1634b2a7523e171c91201b011296f93e78eee6d52753413d8c6e0af3e109d278122d021c63f9434d29a77f7a6be7afce08f35dbd0331
-
SSDEEP
1536:bW4mx4uvTMil07Ox/eDblpe0aaF5IwYZqo:bCx49iCDDE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000f2f22d14a0efb658e5b60251dd993e9cd925a23767a3d2f5eb1fab765cc3c847000000000e8000000002000020000000914a2c26e88c1186e632f3c8ab8f21996eeff6c1654271d7109e372315bd350120000000269af8dfc5e5172e298e3152b169fb3ea53bda259b14489fb83deae47a1da373400000003c6b8edd78563acb14d64b23388649caeb48f635669b245a70e1bc6ab9c3c79b0e0af97a9ed020a20b006ff2856c9b400d9d871ca900387e230f1990124c65a0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{32B6C051-6C03-11EF-923A-F2DF7204BD4F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431756513" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70202c241000db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2892 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2892 iexplore.exe 2892 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2764 2892 iexplore.exe 28 PID 2892 wrote to memory of 2764 2892 iexplore.exe 28 PID 2892 wrote to memory of 2764 2892 iexplore.exe 28 PID 2892 wrote to memory of 2764 2892 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ce94c4fb93e30ba9b1d3a487527166ee_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2892 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af43f005563343ded5c3f430b458b52b
SHA113c44714c864bc21c868b7bf4f7044e7007284b6
SHA2565f12d852e4c82cf43c2c19f99be7d994806cb6194e4b04ca6889568bbbe3fe2e
SHA5127411632a09919f5c7e35d1275ecdd3615551c81857b3adbddd9d472d9cbcef567d10fc6632c81b99a2216e0be2747abb3dba0e4bfb6e5982916076f1be0ab441
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55536603cab0d8fe842a8987b50703a85
SHA1a1d298b93fd4cff1a3f8582657789cdbcbc963ce
SHA2566cb95ee6ef15cfd9edd72647310854b0f590370a177cc30945919d61554a1893
SHA51253e5f10d34d8ae549e5bf47b6390751cc8603b980de61253a1520b6fff5525370e39e735dbcaf1e05e90a4eed869e54a7a9c315d98bb14e28158174c55b69ace
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9f03ae5c89f2ca5508a46339792419e
SHA1f9f8d0be75ffc2127539a5bd94fbbf01ffcf049c
SHA256bcc615ff40140d55eff58d443146a9b5a3e6d1bda57d5b38687f77d36fd996f6
SHA51265f32162bf8d5cd17da60ecc1e6e8d4daa9f9ec9d56cf5cb6dbb16692ce007ee04d644a435e03a612197601d2658e999351424a61a0338f05bbf3dbbffec8431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e2793cfad6448040dfe398909a5783d
SHA1f1046b3584837e065f7181ac2922df8a233e0a13
SHA2561893e6330b0acae2694073f0fa6c2afac0606e6eb4afaae2e0dd77482c8ee111
SHA5124e42863e2e2daaf1858875a424a7292420a80612bae5e0fa8dc2ae8c50964ce03555b1f3d4f549a0879233509f03e8a70b2ad0166e447c6455c36789897886fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536270485e3a9f30dee4dbfb7ede7595b
SHA1f288e430e9ca27d54a54e1d6bb0762b987ba33e5
SHA256013f916436af77dca15538ae12ce18efcd26c6256594445ec0a2e853362e7a41
SHA512678a2b1386e94e001debb590d59f068f9527bc6153252d6779a7ae9fb476f275cfd179cf9acb0e8363719ef62d9bdb7c89a6853d0d8a22900b483df92ebe4fe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed6be763bd4dfcd2f6a84e53535cd2e5
SHA105cb8a6bdb10644511ce35c76ac1522d6c43b529
SHA256913949f5d787ea9590e063ceb5a7885bf0d5547009e006152d355ee8986b47f9
SHA512319446c1dfa81e5006695860297b3547e31aceb7e35791fd3a7c2839393bbc31e4a09db4b1f3030329bc39242811ea0577ed673b96006d8ec66d0d781a386c5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593b9efec5324927cfd3ad44eb722f849
SHA16059e1efd61ac44d388dfedecb64c10394ce1282
SHA2561da5885d531587b9626192d0424b97a452f6afc39f5917f6542d58f1a98ea003
SHA512887799f656fa822476865c33a857bfec1d455ae674a4e34ba438dc2069dc2605e4c2d16d5e06055ebb8007f2d6c8c21300766443f2ad3949f5351886a8fa4e33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cebdba4c7c4d891a550364fe4b6970ab
SHA1b2418968aad89e76bbcf65434a1cc0b48cc01d00
SHA256b1ac9c33c680a905304785abca0e0b9a95e00ac0edcaa12df47c87e410a31187
SHA5122c3b59acbb6f1e052cf208e53c247c59df4b9f6b6b576fe9572e71af1078f3eddd3181a0544b32079fa7d94569d59e3ff36925ffce9545d250097cdb84f35937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae7466200ae52e1c27dfd175ceb9037f
SHA1e942477ac7e854c779e5b16de9cdaa68abdec013
SHA256ffcc02e90d90dd552e3d94afb3d2366a4f06e15d7f34b57e2cf295fca024c1bd
SHA5122590031c450381264b91f5441b07bd7d9d3b2e5e6fa30ce1d3174b8efdcd51acd619880316ff783e8c24af014638a280399072017f628972e14529db95f22300
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5769cd05ae406f9a2f6ad85a9af4f7885
SHA11135d49cd0f9f9ef1f8ccdb925d8a6a633eb308b
SHA256b5d5ba0f295a3070b0cce364fc4996ccf1f67fe1c1938b3fd7d22f6e769b4858
SHA51257369d4bcffa6d10782e077bcdb4c508d18139e283ff79a2085ef4cb1859a2945f0a852d0101023eecbe91ab72e9112f978232f1182288e8fb386753b89b7f7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ea6e41a011fd2795eb121aea583d3b3
SHA1dbfc6517fdc242d21bb1a3206b4c05d8d56ba2d8
SHA2566cfe39228d001f9d2ad2dfd49fa1333987951d7b422740da40942004c5207a16
SHA512857c762b99e3b12f787d4c06ee3da50bc4aa8ffea66b87cd73e95a98f651e1136c1d48691b8653c81d000df5318d0736ee2a5b3a397ed4e39a6b3549680c95da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5409a2c75401512ac55ae6a17cde7de3b
SHA1826c9a04e38faf1caf9b6eb98b206fc5e5c7b5db
SHA256b5de4312b2001e49acadcb523b1023724fd4fa90821975e62a25e96857f3986a
SHA512f481bbcd15dd40a8efe9c3a125517c75771d7ade33da6d6ea492d297941941ffc5381e8a18265f1277a94226991a8f07e878b1bf963d68fdd163120a5fa6cce2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fd9dabe8042b86ca9c6135cac52b318
SHA1368bbd86ecc6a822540665be24c4626603eed028
SHA2567389ebb9a022f985e0bbac68c15568a559962fc5d0b4a3a58ff6e80148879f5f
SHA512a1d538ff9678ec73e616493468dabbc05280c92c716d402661200d33eb209c613a940dad105d5bbb60ce0f25abe3c5393d6e237176db2a64d12a13e1203ea050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f15c5435c0e041132075d15ee05062b0
SHA1ff8f4e68053492c3ed5815ae95a77a916457a0c2
SHA256eaf8d9040d790e7866a8130f952bc49e2ca6ef4574a07d5548155ef1456f6676
SHA5124f6a557688ead3f082e646826687e8a11f42a69ce84cc0fd0b82a7a299801e18330eeffa1b5d5fdf5c46d03c1cf03866308c9a5daf327078d3d885c0990def7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f80337bd191627bfaee5a4ed2343965
SHA1f69161881bceadb00073a6811fb9b65948ff2703
SHA256b297bd7d21c79348a8779cc26a118c522c547a61e1154ec8b5be051b40497de1
SHA5120f29250ad093343a9f43a0c549d471a1f854c42750a5fcd1e0b7b19e283967b7a193f15f33a44fdd60b630e8460a70333c0f12f7ed6fc668b37502cc3af5a5d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cc2810b2a23fdb3637028dc528e2d8c
SHA12496ff5cfe80178506d642d814abb8512ae4b8fb
SHA25605f24b4c80ba71c81e7474f9cb14d7f2737c6087b31f522d512a92034919ebe1
SHA5123c905299e636ad65f01621b3e475ea6d7e5ccc6a73a78e51e98cf23b14f928b2ba1f83e17b090d274cc31dbb0f956b5a154a79d3a1ef9700a6ee5b6f6232082f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58529268de9005e937777b9d9208b7aa3
SHA1b23f9643d463e79289d42ec022cd5fc423274979
SHA256c1f6adeb9cbb6860c5b6e23bc804bc346c29bf3b37115f4d67f256f1393a5fdf
SHA512f322371f88798400a05c7d5c07d0ef43eb478e385fbffbc6551ad95924a4bc88a519823b3681bce636e7456cace8eea84b86a5bb6c8a8d22ac231400b5cdea28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c31e99f89eeb7bfd8c1a0762d122d106
SHA149df9483100e2d5d2ddb7d4378357805892a3eaf
SHA256dffe3eadbfc2eb30c240d85416c2fda37018efea376e2c9b268a8872f97f5320
SHA512645775b77e53f9826cbed639a1adae1a141f65102410f6964a35dd1368e004080909b3e4c354d235f553365c8c3c47a0a0cd944553ad6e45ce22ca08934cd10a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e0503883707ec7d6b87a8325b92f81b
SHA1381360f9bddc9ae001fc13d896b1f4148b5ba5d4
SHA2562191401047a36378cf7d0a08ff9337ec894704c19c3a19e899b1fdbcd445efab
SHA51292b42bb9d1dd95d6749e7afead86dc3ec0c9c0f2cbafae40784f67c0441b8c8e7a70c630cf18ac234ff64ea30035f1fddd91620feabcfd662a613212ff270526
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b