Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 04:07
Static task
static1
Behavioral task
behavioral1
Sample
ce9dba21e57228f2dd8b03d9151c8606_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce9dba21e57228f2dd8b03d9151c8606_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ce9dba21e57228f2dd8b03d9151c8606_JaffaCakes118.html
-
Size
813B
-
MD5
ce9dba21e57228f2dd8b03d9151c8606
-
SHA1
c85131a1bc36c0b83de9a2ffe5097011b689ba37
-
SHA256
41b6bc774cbc0dfa5d36b09eb6831b04faaeb07590a99ca623ad4baf5bdaf6ca
-
SHA512
907ee91861a1ebfcc341c1d52d7f08b96488e34e92b1a6ea339210d25954b7c42624d36b2dd88ad6344d77ccf4bccacedb3d80320e6df77ee9b835cd5cc518dc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000008887336a9944d5e0a713051f0828f3b637834cc495885f60bea2921e2dfc9812000000000e8000000002000020000000edfa0276d9b83a13716bd247f589de41749c08460c386efb466370906c67951020000000db4998040b77804705ccdc77d288bf9928b6a8966af941ac359d79883ebd665540000000b8a467fa8902d53ffc1f3177cfe633708f33b4336d1f81d0462585429531f7e14635478f41587d6cb95f41d62ca54d9d3a7cd10cb2d1d487dff9f243ef465d0d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431757536" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{93DA1511-6C05-11EF-9B14-7ED3796B1EC0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20b2ed5a1200db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 276 iexplore.exe 276 iexplore.exe 352 IEXPLORE.EXE 352 IEXPLORE.EXE 352 IEXPLORE.EXE 352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 276 wrote to memory of 352 276 iexplore.exe 31 PID 276 wrote to memory of 352 276 iexplore.exe 31 PID 276 wrote to memory of 352 276 iexplore.exe 31 PID 276 wrote to memory of 352 276 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ce9dba21e57228f2dd8b03d9151c8606_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:276 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb620f48f676a650f52cda5abf8ee421
SHA1366bf705f38e3b0ec008c09201c8170a819bfe46
SHA256fb1c16d6203abd3e97cdc6a851f6e56dcbd594ceb05e5059998a409448deb605
SHA51246d9b482b3fcae38b5d73d39b302c47926145d86aaf879ae9d9c3b3ec21d7ab4288072e3336b1eba55f1294292daf75b387c2e9c699b4212b5cf5444b869f4d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5640e91f35bd57a8218a1577bffb79771
SHA1f0fd9787d94619c8cea902a07ae2f061bcbf7d47
SHA2563436f0cad145e1212b7553cdc9eec2da092bcd3e8640cde663e8916902555b3c
SHA5120c28346de1c789ebf072b67e6eae9921ea926c10b800a507399fc29bb8e7f68d377ca895a5af69f450613bf01c5e809bf2f9598eb000b6e46a5118dbeb34fde4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2d07a7ce3d47afe02f195675715e9c4
SHA124d469f6eb8182a49bb6bed56164fa1e73bc3a00
SHA25654f9d93eb2e6cf7dae6ac3604eb70fdd2f6b93b36d0c04acc9db768dd3f56e18
SHA51227128ae37a0d49888836a3dfe0f00b395525f3726c3931adc5f40f586e54923081e83ae0dfacd7782743f549e54331753561d34d786b90e8dd4092473fa62c91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5221e11d683b68b30da1ffabf938186b3
SHA1b936c0cce23a98f6558acf492e9b1fe233195a81
SHA256d93c74f6e6e95cc7a46baa7c4be65ff69059280b7f41b6bceb187886c3339942
SHA512dcc3e97c5539222c345af18de816d41fb28c7b7d845ca01ee7628a731c5ca19d87d2b55825e2f4013f83cf5865b57d8f0f9843f588025b8b80470321a728f338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510bc6660878908492d8710d93a2c61b5
SHA1de51570fd1cca939772d2f7683b21a43a9d3277a
SHA256a5fc755250b861b49bf905902febb83d401dde9fe2f7ea30397e9d4577dc58c5
SHA512eae6e1149ea2d1186564bf049f4106c079b0f3e035162a9feba34f3c2329296b6a54c3cc6cfac9a9cda0d3bf1032228152d8f25c0574a6929dc29f7ec03fa5c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503a6b0e079c9930d3e25bac41df45449
SHA11947c494c08a9fb22011b7e190eb54ca354f22b7
SHA25609c306275cd1ebc812f3aa000dab9dedfb9744a3561e3f3c1f4961ceb2bb0467
SHA512ad8a27de9910c461f85b3040ae713ce8a221be941a5bc315af4055415f7aa17a91aa858415f5aa9dd33a29c4eacdc336596122ab31276a96f2a9a6347be51e01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac1eb0256f5104b2cdc9d79e72ab353e
SHA1c234a664e6e13599bf44c7a9b5be0a041b868a90
SHA25626a872b955e4a292ef03ef3697e7f3df0fbc6e5038f26a186ecc3d0a94743acf
SHA51252134d10b11748736dea384da9bcbc13798614317de4040ba3abf75a2961f706cd3a0d95f7f6ff003c4bab0a92689e057269841f3290e25bdb75f31ff718509b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6405f39ccba63f2ae33a8e7c2631a48
SHA19f4f49fdb81d95329ef01680a52c8a7d27d20b53
SHA256112b9ef8bd5e28b8b63877fc85beb0ef06270d64ee7077b794b970c72f82d67a
SHA512f50fc79023126dc5f714be7a6b18df63120b40b5063e65de6dee4dde62bbdd7e10864ca370d933c82f74a49c02b03c2208fb285ffd2e4d1de1b3d09a7c8027ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3af04a7db05c45cde7af54684f8c1e3
SHA18f2a596564059d55171ace4b7ae8e8a556182cca
SHA2562fcc26af13dfc051f6d0f492ce0cce428e26b1de0e7102bf00e89b03ef8cfef5
SHA5127a5a5a29788757877fb1b16d8b06e29c548e5d233f2c7d74c222a72d3677c39f193175ec9585b63117f5e388df8be2cbf1918dc41639eb00970454b065afcf1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545e9825bbe4cffcdae90b2815a3bbe59
SHA1640a32a482ee0870a0f51f4144835374610443e7
SHA2560e7f45b15df91c19c060f42fe4769d451afcc8a179284971ae782303e103db78
SHA5129f63e97288cfcc82e08ba5cd30a52de7b39be9634daa049966b27a6b679f93ad53da433ece4c5ab37129364eb55ea91a6c1a6c29e038443ab527ba7504ca6286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a56902245a25066ad340fc392f6721e4
SHA18fbb2396e01cf878c8f8232d10c4189be1b30473
SHA256fa185afa5f7c4cb7338d8150d666ec9573f344dece9fa79f29747d87b81e4449
SHA512767bb76d0db2b14b4553a50228dd48e7e13c42524bb5f03fc8bc944abf3d72ec6b85036c48f8e1bdac0104cde41a917c100303215ec6ed53ec35ee6282b059ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d87cd09bd7e47bc9c7a1901a3af959d5
SHA19b8ea1fd79cf6c88b91b5c761f9c13fa0051904d
SHA25614a6fe49d37d6cc22d1c06ee513e6cb9699c34ef581285b4f8aac4fce58d01a9
SHA5122b1f44b875cd25ad1e7b19279ff7d393b373a33e834e9f2c64f7889ab541cb6e1793d7b1c762fe7403c70dd2c1c320a53e272c68245fdd68f26d72997936ab3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ab84000e489baba279ce5b11337b099
SHA13def2704626efc4b5f75e8cd23dcb3c54896b01b
SHA2561ad63dd803650067d2a1ce047097a1cbce1deeffed7334ab78cd9c5e40126de0
SHA5127ae6b98d99f4effa1ed3fc29efe6ea4679613020f92a13c218576b59acf5dcfce4bd3b217a6b7b3bc676b4e1c12c4916ed65241dc5f61e974acc787d5a723280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569064e63b9d566d697f691b9bb3bb507
SHA1977f69c66cc0783a80c26ccc8f1c8fe29a84b555
SHA256aabccee9afdab9836e27518cb05901f7e942577d825f813943262131b78a3dfa
SHA512be837aa4ebccdbcaf0e8b1d79df2a016da51de6e5226f8dba4f842613b67ccaf633c1af0d4db9ffc1663bf7c1a5b04a34b2c7293fe4e8a4b70a533e496ac39a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f27f28537ad8a9aadf4181b482aad240
SHA1b10bfbd4cf5fe7b8a5253aa7999bd0402e7791e9
SHA25613e854bc5a6395658ee47506fa11a816622d0713753f85f8fc37387794bc3c23
SHA512ccb22f25b39567f969183dcd293ceb5cce3c705980da456a5bace78f9e5d04be7a00a9a3e8dd0d3728acfa287e9c8a5b7470213f0f6129edcc1739e9fa18371b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbc7316e413ff3db833cd81377e1e718
SHA161f062979a58c674539108473d788ffbe13e758f
SHA25679e5d46b5dabcf38c34f46a21b4978789448042dac21765b5f84e919d7c7df28
SHA512efbbcf362699b9275219cf06c6f8853720236fcbbef5258990e80927bd76c3d9e1492e0c8e030162bcbdd9eb2df63a6be2a80d42af20e3fa3432f8510de1787c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5130ac2b76053b31a9a0c384b4b089f40
SHA122e57cff160f544f53691677b970c90d10a92b3d
SHA25638e8bd25fa2d1ba5527c747704330ccf0a0329c3ee2ea5c39ff50ce903b88e14
SHA512e2d99c90be73b695e4bf4487e7b62c8beae8d2629820b7c99d250e607c505fff0728379c444083927a2de593dac3b8947f967c855c70ce4296b3ff53ceae8ee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536e67bd3ef3557e3c2b5240c718a3004
SHA1d5b241fb11abc0420087e7fb92b927e56a432492
SHA256e57c7c791257edd04a6eb35390cc8f3ff42a04661578d3649cfc323baa16037b
SHA51298700dc9d8da7e14fee184c53de3a248dbb2369bf6e4e510455b0d756edd9481a702bb72c3ee787a9b57eb2ad9ab7b037c7e49f2828b097e7ccdce222e29dd99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5464ae3f8822ce74243f77d89b1ec1906
SHA1625cd8bdbb95d17a1294a662808d7de2b94f63b4
SHA2566fd45a1ad34e6a8e92b1311d0c019e779f5975fe3c288a9f42cdd3bd4dd2566a
SHA512fb3ac190df9d0fe7242a9223beb6d6f3e3cc69a1c0c3f766bcd9b2ec872806e75e7991dc04abadf53c7a54aeaff45054c011e387aa0c18f7c718ab937fc5deb0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b