Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 05:20
Static task
static1
Behavioral task
behavioral1
Sample
cec25890db17da22881ec7b9c3a691cc_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cec25890db17da22881ec7b9c3a691cc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cec25890db17da22881ec7b9c3a691cc_JaffaCakes118.html
-
Size
3KB
-
MD5
cec25890db17da22881ec7b9c3a691cc
-
SHA1
aecfc3a4bc49744bc0e06a43ba9e4a0afe59c043
-
SHA256
f9a5d56a0cdb3af40907488c0864ad627ca8bea160b32892d2da2647728e91a7
-
SHA512
597a183065029c1f1a5189d8e7fa379fdac50b1d85954ffd1d0d4b4c178a6f8750c333a6e0288ae2e64c76d5cb42a7ea9a6bf50433ffc2c621bca1ac68e034f5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 707a089b1c00db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C4C2C231-6C0F-11EF-A748-EEF6AC92610E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000049a9e18eb711330f22581b16e6d671bee6493cdfc9625f635956fb8ec1663e57000000000e8000000002000020000000dbe4838337747ea126c20035ed54fa2c8e76aa3a530a2180821c336d1a2600a52000000047db424d4a5a70b7b59038b2eaebbe086db2bf27045d0b5b746020fe73c16b1a400000009db69c3191dfd7266b371a9f716e64e8cb7f0715e4e526296c88a2fc26c6b6bcd42c9962b88e0752fa9fb5db29bd507bb5d290cde978087f4e0dc8db9ee79bc7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431761913" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2540 2080 iexplore.exe 30 PID 2080 wrote to memory of 2540 2080 iexplore.exe 30 PID 2080 wrote to memory of 2540 2080 iexplore.exe 30 PID 2080 wrote to memory of 2540 2080 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cec25890db17da22881ec7b9c3a691cc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52462e6b3bd35b5f38c6b0f316a3535a9
SHA11cad00273301b585beb24278c3240d2b0d442678
SHA2567fa0e5deaea4c87c9bd1088899c0da0308d9da51683fcafbc3ae8d1f4729c9f7
SHA5121d9128b49062c47c031bc9009e017a09781c71f43e69a6cc2a99d52554e0fc68428903a4ab70346d39a49c1f0d2294b90fd80e446110ce7b62b9be0120f9c322
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562d7d7bd6123a9d2d818c24a91d4d6ce
SHA1ac8a68824e556757e04b74813cfdd715b0673aa6
SHA2568ad71bbd0a04c25a7dbdca5f3444bb55bb03a5622bf63edeb0ae9a9f32935b44
SHA5128d575dafff0aee0451912ba69545abd5e640ea13b49b992143f7f6238cc54ddcfc0e7c449dacd4308037904b6e85fc527f8b571d66039eb4bd3bf896bae5a6ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6d00ee848551738e1ebc8190835ecc8
SHA12b5eea65c129836a68a2efda6ca9478f3a1b48d4
SHA256f671ce0f7534f0be982b92e7503e0f8a4217d268a053e391fc5a0ac507624dc5
SHA512cb70ca8567ff1d5df5717ce1853922c585685fa55d5ac723397a0b5a5326f63a07422d02f184c66c80b29b93d8990eb6479f5cbe4f79bd70b8c6357299041e53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5715c53ddd5080aa37a49e0b987f0735f
SHA185ae0e459999764548b4dfea350be9a9752d3bce
SHA2560fbefb47678543517ebf2888a6251017942f03546f15d9b9b7c1ba286b550bb7
SHA5126f3157b26b87bf59e8a13774a15ce230e6563b92d2cbcb4c0c9e1b5ab825c03337dbea38fd78f48e4258eead987daf2505dd9d70fb3b2b6a2d77513c123db21e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bba6f246af3f368646efebfd2b7f42e1
SHA12dad5cc79e47e6075b01f264ff779ff155d8782d
SHA256de304c6eee9bc4d9c54f823173b21546f062890ead41191d9d6082caa33033f0
SHA51212f37b168320374d680784a65aebfafa6d5cbf7f6960968dd265db9f120bd203f5adaa4b042f5d824f98b42c7800ee1cbdad95983bf378ff32ce718f53ec82fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4a798cfa889c80b68872c5818c2dce3
SHA1aa69280f7ccc50bf4c60c6ff9021f62f137169b4
SHA2563d2819a8b3d8647dc953cbd821f66e3436f61556d81e6aa246cf7724e060bca1
SHA512e09d40a0279eddf466b8e74d69c76527532b8d29b9fc8f017f751126ab61729ea176cba7c84169c461e7323200cbdf883dc6c3525d9b6a8010848333ee454819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503163c5bdea9a2bd2cb8854bf0422d5d
SHA19942e7fa9e11722a44313ebb7864ea1e811d85d7
SHA2567d48f235aeab66440d3cead57a02a6e4ade72aa11b5c1d80b5ea896517233b6b
SHA51290e792949c25cb5515f4b5cd5dc30e2a49a044e64aef0f078cdda4958143b444b63f16625ed51f30c9832f91b5fdd7d2bfe0da055a60948bb9ed6cbe985aa4cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6435affb20d38a64e38609a317d650b
SHA15f3aa3aabd720cbed197cd614261afe8d862a5ed
SHA2568051d8b36dfc0b0f3aed9ac50db77104792caacb0134ad60c8e7f3d6f65e1f41
SHA512d14768bc34b913e8a9d88b61d1333ec46e698569b1c759bf67d405e0b08a9da9fabcf7302764e3c1f84729ef08f1a670f2b5d8ff84bbe524409ebf56b99952f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2d4d1b0ea777704670866de18f5cdc0
SHA1e60f8b2655cb61ae7bf77d27a94a0ad35de23463
SHA2563c825793e4369a8ad202386d7f5dff65fafce0826bbb9d47700eb4096fea2bd2
SHA512a0ebe2f730a394829b707c125a7a684fb26eaf5d6f8c8def944770034b5539580bb77ed8ab877e59ccf2de3689d37c40890b60b6db5e2291e7896c69cc28b2cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0762e5c09fd392a36b117d7bfa4a24a
SHA15ed5b864434918fe5fb41b120cfd3b5b682d88ad
SHA256bb4777cad4a26af5fb11da40d5af3058c178a864f3aa6f7472f54ee5e6eb1399
SHA5127c52423b3f4c49d8985640b8c4f6ff73ff66614c1726c6faf7b9380d79b1b78cc436d71d6c985ee5646e918f2a31ab7fb9d4838aff674a51a55fab837ef21bf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea5c6cb7956333f5e15e8a9fe9634bd1
SHA1915fbd63e1c288006a2ceaa282934b08d15c966b
SHA256ab62cc34d679cd083740419a2cb8e9141fd733aba631c07ada776f14b72589c2
SHA5127dd77bc7a796bd29c3c2b808dfc57bee0083de460b31aa7445a543d8893a30737978d7216de6a701476caf7411fe8fdc2ae5864c1e22e4720da154cfe0727fbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fa7abc3c3e575e417232ddc34054764
SHA11640127e8b4661ac2ce4900cbeae01e465e15329
SHA256fa1a15619e3e13ab5d19fa89dc35a9666c9142d973a061fc12281a4e15784252
SHA512ecb581405049f98c24fd013cf342d235272d649695a467a2f96dfca38cd093f840a181ea160e54bb621f6ef0b0ba48bd4540ed8877dbe7a66fc3f45ab8e1ca0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd8a3e1777a2bd5f461620c3a77b84f0
SHA1f184bd467a0f0dc7d4f2bc54e4b0d898168208ff
SHA256e54c754eb64751ff101dc4a678c4b17b31c40c1c5576641f5c24a0bb80db144b
SHA51243f5b3d84daae023772626134692af6109dfb8bf91e536890a94a0c9a7ac9008269be51e52b11952a22046f4c55d838ca09190e5828a961bac4dafffbf180f85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54174c78f994dc46c6e5db711c3f0c693
SHA11b655b57d272a995230e8c85fb186ee8b1e2fd7b
SHA25671a85057228f8e84ae7989bdcef0d4e883df01a1de8700e2764ae86d505505f2
SHA5121c70e707bf1daafcd748b5471ff80d6d4682892ded049823c8c78ca46238154b21e8752b01205f00149b28b7833a08fe805faab1e28d08c2fe56d86a8eef3835
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5846c30641b434f609b304823adda59b2
SHA1889da45631a09f0e54c9b8816600a23b6993ae80
SHA2568b3ba3dc10440a49a9ec29e5f03b96440d85b8d3e2f41789c6e1736b07ff066a
SHA512f386266a5d197305853857b71bb00ae060a05a604668144cdd5da3b8e855936cdb59ddeac7c1caa76504215a87a14b5cf9da07f3199a7fbe1792c78764d84845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52edf147e9b506342b2390ad3f726f9fa
SHA171eb9641e919e5987d653f1b623cde96840c43e8
SHA256fb2048ad174ed98d79b0b8a24a8683d76337c6b80a25cfb7d9e4ff168ac4db40
SHA51206e43a142582c59631ec61946cf9fb50edc4338e2c2418c538c62901205ff9707479f4a2f81fda8075b2cbea13349c53a917de63fa6a83d64dee48f52d5fee4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dad954f65f6a7479255be46398ea48f3
SHA174fbf217bbc5feb41c10b191c5474642e0bacbcc
SHA256ee1106623a30badd9d67bb0dd276fdb9b822196704892d96eb819f6f69c50d79
SHA512646a88478a082a537e56eb01afa54e90053103a46587672ddb29ed968dbe71fb53ff4d5824f097844c2152e2aea7d603a3276a250124959de04b8f09caab2237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8f63599452d016d886c2f9707d4e50d
SHA19363197478bba75cb415543479e144e82220c8f5
SHA256115112aeb5a83741f8ea184c619c7c03af2c094fa6819266ec49e64e168b39b5
SHA5126432d79a397a7a89dcc05de7479125a4d3ad41661ce074b024b9b6cb5f7e52242d19d5c37166ba0123127f9e2886669f6b70c566759d0348696e3279d62b4d9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc22ce234144d47bfd95da7db0d2d9a7
SHA15bc3cf0956e70d13e943ce7fbdce313fb1bc2ebf
SHA2566558c88f28bd370fc2eedf23ade8d1127a00ad511f9b8174f0dff1faa1fbab5e
SHA5120e1a035e210ddab85ff27dffd18e501aeac6a06da2976f7263f1d89f244137461d7987c6646898d2aa41114671016f4d9c36dfc0f4d8a95ef91b88adedb7be4f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b