Analysis
-
max time kernel
138s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 05:33
Static task
static1
Behavioral task
behavioral1
Sample
cec8c144d983dc27f71f3a92cff1a165_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cec8c144d983dc27f71f3a92cff1a165_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cec8c144d983dc27f71f3a92cff1a165_JaffaCakes118.html
-
Size
5KB
-
MD5
cec8c144d983dc27f71f3a92cff1a165
-
SHA1
d0fea42f284c2a282234dab3d405f5786432bb00
-
SHA256
e4fcfb5fa22e6fd1b2135035bafa5c4a42744e57af474e72a95584d090391c4f
-
SHA512
85e67592a198233c1b5e56c8c668007d60a7c05b379b292495a177e7de041bf0b38755b9584e6d1de6bdadb174bd43782bcf5d2f972571ae9b3b616896e56df7
-
SSDEEP
96:6usRe/7LFY+MvCN/JY0m2dTZK3JAHmoAbcCQWvAOaM:aezBY+MvC1sOSNoiXv5aM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000ebaeadf06c0e8dea6ebf5dee4a227d2dfc855c45328d1a25cc08030d6b233481000000000e8000000002000020000000208c7e8ccae4bbf84bab520f58f9353d0e925b54fb868f74976015c6178ed4c020000000c3c476973a593157fc4b750e358b0a64f5428258bef61d8d403b81a9f8bd994e400000002671460b28189633e9646016ad82d148a95ee8a58790c07b5eefd31ddeba5c2bf4d073e546613c8da7a3002e6006a07be55cec5e78121b1f6dcab0046478373f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10e92a9f1e00db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431762674" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8A550431-6C11-11EF-8AE4-465533733A50} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2544 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2544 iexplore.exe 2544 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2544 wrote to memory of 3060 2544 iexplore.exe 30 PID 2544 wrote to memory of 3060 2544 iexplore.exe 30 PID 2544 wrote to memory of 3060 2544 iexplore.exe 30 PID 2544 wrote to memory of 3060 2544 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cec8c144d983dc27f71f3a92cff1a165_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2544 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5414962d1a1cdb134e487523feda7f6f4
SHA15091ad4fdddcea2b49755b5353e88ba0831611d0
SHA2562c8d8400cba7153e175c579e83bdb4a9dc74652c6eea373dbb78a945bf36d46e
SHA51204d97785365c8dced99462463516b6fc27aae5277c4ebcc05385a7190a7f7b774d5cc8e34f469d776a110909a769b7941d43bd903620d21fe400115977ee7d16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a48b93fffd1ac55baf983652f96efc2
SHA10220e3a4cc418e4fa13c9dca4374783ef7e24268
SHA25620a027c8713a1b33c91d9847239444f4ce7beadfb0173501721778da081afaaf
SHA5128925efb08788e118ba772175ea4f35615caf99780bca203e44f54c1d4517616160299089e9346719ed5e64872719fdc7ba04a1180caa95fe665695ce94a57543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564ce0742d1b15605db90d857b3710e58
SHA1f94db19b5788c24d6d0b16c10ee653873f031fe3
SHA256830a094ed56f858f4a79376e0d046e3175cc3e62b0d3b1df3fe867b8ad48d42e
SHA512af6d20efe767562595f643a965535677a81bc7df56b5597a8c522702346509f61feed01583ac5e507bdcc2125767771a4721d6061737997510182c719bc13c99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c4248ca1545cf8bae0cdf14e148a5de
SHA1e468a0dbbb9aa4e4c90d7ba88941a51240e0e6e4
SHA256b09a7d43f9bf7ccf3714eda44d128cb22d7256af28d4d62877e98b73e2e3ca37
SHA51243a70fa0cda19918598da5766a3d8a63f904678f2532eaa6cb0de4f76a8582cc0aa8759cb9ff2d5a7c4d2cac2d2d2c312f4a4998b93b45c78564b1615f0cc082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507695b3c52af3121d646034a84fc763c
SHA1674b5b618641e5a4cf636bcc819df787c40e2ee4
SHA2569237d2c5965529dcfec8a8eda93dfe4bba464b461b5cb316e15cab3c7e949db9
SHA512d01669e2b7d7a2d123a8c0e62b16ac1c61ba0ca92d71fb9db012d73c2938c21260d851cd89779f2df1a38db53b09b6062d7c699cbd365a3bb7c2f040f43e972b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0d51625e335f6b7c32dc7c5b2e89d09
SHA1217b05261228b3c63ee0181e315a5b820ee2eca2
SHA256fff5ef4d862abb8bdb214b802de950ae5feb97a98857f92f524761dc77033b4f
SHA512caa1d716d97850ac6a7127c1d9a32c8a3c4fe65ccc301e450e16c42ca68e44844cbd2875a6ae8a9aced2c254d9bba95e281872c03cc789f8b32aa5a1f91ba6d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9b92ba754b0526a4716305aaebe4ca4
SHA1c62642d09eac36eabcad291e7a70f30f5ce5cd68
SHA256cf377ee4b80fa0c6d5c591fee0121e7d91cd9b8e7edcbcfe5b930f15f1f84caf
SHA512856420b1fb8af7d52b47ed8acedd6947e2a90f2a7a4dc9570f887958e938342485b27617233e954200fc3b835e4cd573142750f385c1e2e0d16c368e0eecb499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d576ed4e18b0560452437dbbeccd3530
SHA14a9288b5a938c780de33591c36ffaf9c4d164041
SHA256c9d817ea20eb2875cfbb4509b36b97a2d15edd47529b6f7876d55a77cc0c4856
SHA512ba93b1c07ed37a412f397414cea2be9f719b2629a6d5dd757450c9114c990e04044cac2afa02ae6a71854ab59962beb340c24b227a370dd0493e7d9ce423f668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594144786c74acb8080b63bf50a773e89
SHA1f1ce6d28963707f47e0448f41b92b40cecc5b1ec
SHA2565c25d21aec92356da64391d53f583cff5e45852d448af945520337a75560ebd6
SHA512b263aa61b3749ae133b75496bbeb76d7cb8333d06e6a79a6a3e6042d6b593b6ea1ee85c0d457a2a7ce8e29135a4b45dbe5bfce5ed4daf3520583cbbb9e1c4dd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569a6bb9cf3138776c8665bd4016a12dd
SHA17215681c4d858366aa28232e7567dae704e93843
SHA256b52acc6509c80fb07d3707f50d9dda067a9aa01dd5e212ee20a2f076c792cc84
SHA51211e9043b9899c6bf38cfabe20a87c125222ceb3398889620061800a480d581c32e22e96677f30a4b6130f790f3de050731498e59e2d101ae307794edbb1c9880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f0deffb3efe04f3a2bbada050803bc3
SHA18a7cb4c9c7a7c159eea8c6365fdf9e6bad6ad5de
SHA256e085997f0228147525b2f785319c0b7ed16616b289ca080b9c0e020a9aa1e4ef
SHA512bcef5f3f5bbd1aa7474199e5f41fd9d0deef2043df052a777c06650607f764140c7d7aec8b9385cd372e74fd54613ebdf6042c04ad93e3050acf5a01cc30e893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c97a5b8cb0bc7bc9bd72090ae26f5642
SHA1622b8c8fd583454ff7f4f5a26c5a8641253bdb53
SHA256232da47727fd5e055ae9a4d8f1ebf6b0e1f3936ae5f50631eb98f27e3d7c8abe
SHA512393ad4d92be0d212b53481c3a0dc3eb70699ab03bf84bfd50eabf8408f0382270f20f3f9e5fcef173f6aa2987a4b539e60506b6b41f9756d439e59e4e00ec970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58802e37babbad9599090b4df94b3118b
SHA1a7eeaf94791c88a6810ef2c97e251ac85f3a3bac
SHA2563181ba6135ff8b463817130df059d0ef32d97f2c333af473d70f9ab25e8f534a
SHA5127a45304c066ec4fb535645a90031ff55c6d5c83ac49e8b763cdfe715f54f36900864f81f5c141bcf6e9a904582c9a83546529a0adfc1e661f3f861f8010eefb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa22b6e79b8b1f61bb6bb1bb16cd7c7e
SHA10add2c91c00db37413ed858d0648b262d519f1db
SHA2567a4e1e4d7ef6844d06adafd0e4f88cd3844295feda062e4f954287d3d8c5826f
SHA5129f70c81a5008ec2b20c0be5eb890ef0f902414c6dc43b0521fe03c02833adbf66e8896ed69997ff09f7ef3ef53cffaa7f41c6ff79442e30357cbf2f93a165ea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dad3fa98f19a256549780a6bb6cbdfc4
SHA170ea44ff928e92f628d69e6ecdec3bd2f80cfce8
SHA2565a6499c14232c077f7ca292433a03a7533691396fe5bbaacff4def47f5fd75d6
SHA5127a58ea53eb942614eba943b099a283bc2f8b468eaed9f30ae1af8fd76c601bed76170df8a1fd6e9a22a2655fa9739d6ef70930a1ac95efc64f38cea7c7a3448c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd22a21ea57fddbe94df0bb7fe481d5f
SHA1e49f85699357f13065beab848514bc5ac0acbea1
SHA256c44c6996140f51a2ae55d37f514cb20ca91bfb1537f1fd5dfbf241067eb7edaf
SHA512a619382293865ab7d0d93c9c11912164e1f5cddc3c6e0066274a4c9dae8121c52fb7f88a6d33a28bacdc1dd664146d5f9e5e011ecb4d40ae4dc5b9f68ac60802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580c331bd1dc370b9cfeecd51c82ce40c
SHA14d0e499eefd6316a4d835d8f0f0e2463eaa90c3f
SHA2565b0381089dbc464e3d131eec68bea54ce02bfe1be86e1c471ceadd3cbdd75346
SHA5123a467a4aad831315f2f820aa349da8b71cc2eec9e453b8d3562305b5ae875db29a48495bf31736fb1bc0799caa853c0f1c237cc8769f8c81696f5ce5fa38db02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbd881d35f6079bc326fd4fa146e9bc2
SHA18bcbe3d0e7566e6b66bbea318c78927a943eb3c8
SHA256cf6352145b509ad280c72cb15715ed22ab4bf8b50577ed681efa0f36b732a876
SHA512a14a19db04d11ddc0292d53bc0c743348a67c474e9f0ca60ca842c62857362c167dd59abb9fa33eafbfffcde1a50d812be495f6e3576432cf289fb3a7bcafb38
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b