Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 04:45
Static task
static1
Behavioral task
behavioral1
Sample
ceb05d2a3469f4a8b70bdcc3940955f2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ceb05d2a3469f4a8b70bdcc3940955f2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ceb05d2a3469f4a8b70bdcc3940955f2_JaffaCakes118.html
-
Size
463KB
-
MD5
ceb05d2a3469f4a8b70bdcc3940955f2
-
SHA1
750856009c6fef4855ead14cfddbd9ee4bc7c632
-
SHA256
2da4ebe41db5c95d28ac2f02c98a0adbb747a65faa262b72e7ccfce53b3bd207
-
SHA512
eabc97d0ed4fce5aa68a4d4130ac60631c1b2f3764213aa1a34d21be8bd24281f0acd1530df6c8ae8a3996c89313117158d6d68c6fe3a9f201022da11b1326d7
-
SSDEEP
6144:S5sMYod+X3oI+Y5QXsMYod+X3oI+Y+sMYod+X3oI+YLsMYod+X3oI+YQ:k5d+X3U5d+X3q5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000007c69ba316866f36b82b5a0cea604b67eacac20f67106b4ce14088d11d29e5f63000000000e800000000200002000000027aa589168ffdeff0c3bfc6172fc0f9dfb5bc53c8891f5a324d00a491bd2e7af90000000e7f08482fe44e064b3c50d5ab75747f0e27768c84f449cad10b82699ae7b52e0afade7fa8889565ee1e1e20b80156785750aa6e06f38cd3e47714ddb02319c67d3615a699ca2b7a5754c0caa32d9e4c6272c91e5d42be16ba5398ee60254b2e92f2881707919ab3b9b24afddef3b5d0a9ba319e21749a6ed75d989f03df9fee6d67200bf612ad3319b064701c99ef70940000000d14d20042ccc90c75af79db3c83a03ae69eaa7becfb1962990724c5ee1d9d63de7db88de97fbefa72fc615f0a88a38f50e3236c22eccaf631711dd160c9aa766 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431759807" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DE1854C1-6C0A-11EF-A7E8-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000018d596e9dd9175bdb5a6038fc08cf8688b96c740fcf4406f562043adfb6dcebd000000000e8000000002000020000000143d0c253684ad31b4445a21a8e9cc29f5267ec31ac05fd32374ed75e2b01a3720000000fb5eb9c1bd253cc1c821cf677bea4872d54fcfea420d04674dde353b3e9fde6b40000000836b7998b911dea1c808ca2c420cf076a8dd46704065ed06581dbffc77e8d30306871ff80edca9fc3ef285166a7e2eb9a0d725ed5216bdaf8f5e87f918b9aaef iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90d920b81700db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2528 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2528 iexplore.exe 2528 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2368 2528 iexplore.exe 30 PID 2528 wrote to memory of 2368 2528 iexplore.exe 30 PID 2528 wrote to memory of 2368 2528 iexplore.exe 30 PID 2528 wrote to memory of 2368 2528 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ceb05d2a3469f4a8b70bdcc3940955f2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a60852ee81524456cb7800e14dacb48
SHA1aa7634d25ac84a255966040b957082f8a81d0a6d
SHA2569efba989d772bfb1e953482be366d76a5539f3eeb7f8fd00762dc980dda5274d
SHA512fc5cee5b401da0076f39d4e080704ed90f5fde477359d01d6b578c42a3158978dbc086495931d47b2e7e78e11c1f26484f607fc0f1b72e4cdf99842efb9afc75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9d1bf25374323466b9995fb35d59ede
SHA1776230917e4c1e266cb73d8c430d0a9d61976675
SHA2567c8e613e60f92601ddbb1f78bf81d426c3a2abf1c2557304a0045efe77e14578
SHA5125eed43676c93b6a4708b739cd16500a4d42afe86b45599caf8438ff3d5b019f080a30fd5501cd84e804634bb4253ccec07dca28d692e698f4a412e99f89cf8af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a7f1fe5ff5cf63d8adb719aa526530b
SHA1eb8f583bb1a3769b0ca19303f6c3e64023329876
SHA25669427979b6a1e57d7b7781ad01fd7ee17f878286fcb53d18f5f1716296915d9f
SHA5125f687114ab9aeace78df7229b3f4da47dc24a0650371fb45bafcef38b51377bf05c128845b4bf51d28abccb2be4fb24fc6487d2f9f2178f5b539dfa08b6b35b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510b67d2e5e870181f09d267c5c221412
SHA1465664e05cff538de38b4deb7a51568e96198ca6
SHA256444bbf8d5c90a26758e2dc2eb2b05b434bf2f58d4cd1104fdc9868aa8bf7824e
SHA5123deb10bf3c13977e88e8878364e1b3fe8d1c7182cb778dfcc2a681a5670ea144de992ebeaa713326e9ab5ac073ff9cea70f5281c1ae7591eb5f431847e92947b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5975cb86d5f0b66c8bf9f8c9c6e7c6020
SHA10eea3b50704fd267a1c511873395eac99a65d70d
SHA2568022a2bba9bee2e000057fb83a18ebc220284737998182a6c73c735e4d74a8f9
SHA51219bca98877787ecce04479e6bcb08f416ecb53c5ef62591e25322fed5f11c60ee0df290cca75012ccdd2760874830407445367dd9e966fcb208bfedb6186f9c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573c203930473cf86ebb1629c22efea7c
SHA1bd625777e2d09120536464be01c53059ba498b30
SHA25626e6fe986141fc40c7910acdc9cae9bafae4c7ea671c9dfa6a594a31eae96860
SHA5125960886630544e9e13bb5a2af1aef077233640a9b69e3ea5fa732641da0004dec37b58ab3d54a0217425db89d4183bf1f5ba506c9453f1b85a6833d0d8bb30f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5613f56f028252870c816ca01589b4d38
SHA1fd7eb50637da2bd18ae75b07c2bc52c971f98cda
SHA2569c7f16fd66540313162c43b5318a16c9508f33258f8d472a2e4bb14353b8c531
SHA512927c853a1922490ce0fde62812b94e451254b115a9286667053561d41a1e9acbbf3a6bb8069ae0167850edc6688dfc8f7fafb419a98a7e8fad4427fb043d3149
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fc4e2389c5882ddf5f9465c0e18e903
SHA13b784bfc2c34b9e6f7cec9befb7bcf9fc5c69cd3
SHA256a82be0978006c1d8f5ae4a7c2dc86a22a7aa829938ce4869e418fe51b4006ea4
SHA512aa185f5848c627d918ece641499207226df6a191b83357ab84a09d258881319d3daa8877fe8fe8555ab187cb7c685a427db671addb030315bda494527a7ad52e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8a9450ac7c4b532c4b24d1b883d1015
SHA16034cc65c27f1da5338827a09d57c4f8f98a7c9a
SHA2562fee11879e40dc641accdb3c4c5418acaa280d8230f571aa55735a092019fefd
SHA512c2fd564ae2a7ff4f4e89bd954033d316a79d1f4c2b30b27a39e7c7b5d376308d1d988e4378080e6017f2e2587f26fcbcf10fd3c417487034d437ad87c89abcef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e6767c779a2d74f7832d6162d863334
SHA1afdd1a2ee0a2e2d92a784173f8261e0c952bdd7b
SHA2562c3813926c4a2d868e44ddc94906dbf82de207b5c5aac4eebc44dac1b33c1f04
SHA512fc6eaa2e2c8276c9acf7162abbb2ec43fc2caedde93f9b156f09973264c0934aecac1f35547920d58095b3e7531b3ade471cfed8655b640674f125b816a95efd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cd7c676a753b39823a8f9686e143e87
SHA139143dc343be51a79d62bab31c710c6221b29176
SHA256dc982e366ef673d9a155daff9c1485292c29e07f770e6c2cd5cb0faedc6ee1e1
SHA512dcea337d0e4859082d39d58388e8921bd54fc11366cc0f558485b280f24302e03988a58726b775fd8561737d6d5ef84b54e004b74e8b3897192e72ff7369ef8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540901022dc4ae7c14bf1e0125e97defb
SHA1d92692b58d1682701a0911f820c2a870580ff331
SHA2562dfb9f590491cf15c022a28f060b041951c7dc82b374f7d340601049f44ff3e4
SHA51211d60c50595d26d4c09181bb522a27a88555c79f3af3a7eb8c792a44c0a38806155c74e07e450b0f60f32c6a675a46ac1544c3210656da3b2a3fba1e69c0215f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523684ef9edc886182cdb1b193c4ae25f
SHA1062e2b17e32727f218883051637cb38016f5ed36
SHA2564f4b800eb2de88c36545a83db76fc1e7b13341a2bc380d98108ef82237eaa881
SHA5128233aac0cbd54ce2fea713251a3d271b559d5ffd1269dccb27ee87d9db2e01f92518290546053b7442979d703af696f4252dcd01e14e95b9d5b4cf7a986bbb70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57abf8ad85730cdc41603411adbda2eed
SHA15a0c6416acc823ce7930f3469ee04b4347876c41
SHA2566bb738a794ee395ea9f5c8698439ed28826dab16123e33c7f0ff05beca78925c
SHA512b58df3b207694fae344ab6ed31db361c9a29c635ecd101c81f7b457437d56ca5bb9e49f600e352e118c19c3ac01812e188a5d87647e4bdd1110b4592c8419cef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f42c057ed5c8730abdf1c2de14853c5
SHA1273d98e225291852e403ec3c791e4aec84b4d2f1
SHA256e55fe4340b8bac4586dcdb1a6379e8b3213c08258d54ca873a1c7b53839d734d
SHA51238e7974915adde7464cf430f5d1e7408d94a4aec05fda8626f375c5fad8f6335ee9dc0037867eb7cc1e442a34845d11811e74719a35e0e3569c6433697f82f0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5124559e5fc65912b5c23ed6f7f174302
SHA1e0a3bac0ded92e6e174ff107397f42351521b393
SHA2560844125c89b444457210e8c45dddf1eb0dbd2af6100efdc820247dd56e1267f5
SHA512070bc3d33f9d913b806cbb2d49d2d1fa590d9793c500d8f7248898754fd95a7e84dbf3a23f42650dbba5f9d544f7de8c38307a1dc53aa28cdebb991092517dbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533398ec031d5697969022cdf1445c11c
SHA1a37bd252a5ef6e2560019adb0aae3277603422fd
SHA25678afcb25b95f122c0f39d40b30ae20aa467bfd7716400d3e3751023542e377f5
SHA5124e3699225f8966290c9efd4fc15fb632dd1e1897bf250bb66e7cdad5f9277edc1e678df89a402d2973ccefa55d494aa23caecaa3e69e9ae1a7415b15bb5f277a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b17853835ac702f657b7b0f10a68e69
SHA15c633c88e24348dee0e591657142b5a85977c13a
SHA25607e8d6f0e243cd556a77e4039f01eea12b12cb778ad04e7170a8b23929eef6ca
SHA512d02d97fea0529c40e3ae875c06a97b69d17c702fe2202b998c05fdff3f2832e42ef77f82d98cbaf72468e5f53116d2fc4d36a641b9c00c1536b08eee7b44a94a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b