Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 04:53
Static task
static1
Behavioral task
behavioral1
Sample
ceb3a00d0f9626ce70d2d05e223149df_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ceb3a00d0f9626ce70d2d05e223149df_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ceb3a00d0f9626ce70d2d05e223149df_JaffaCakes118.html
-
Size
25KB
-
MD5
ceb3a00d0f9626ce70d2d05e223149df
-
SHA1
7e60716bc7fbaf3f289d1f58cf775c1d898cbe6e
-
SHA256
97e752fec61f4a1d56b53485518dde7b6f1140a89bd346874d37c30ffcf75208
-
SHA512
a1da3db85787487e7531acf8ada4c7ba0c8221437ef5237c1d54e754e636f234ef654ff3250aedf10c048e82762d61060caea2f2ca09d2ecaceda62973fcc76b
-
SSDEEP
768:Sx3jNmBUECltp4m6bw0gbyEyt2dwSaOdWM7Y:ZCB6bw0gbyEyt2dwSaOdW6Y
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431760254" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E88A8171-6C0B-11EF-A7C1-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00f3f4db1800db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000099950fba3cf91bbfad33ef966dc0c0298c53bdb0a17cfc8c9264bccdbee69d92000000000e8000000002000020000000d492958f40d6e54ab582855a340d79ac043238419aeb09e6b5a0b0e5924b5d9120000000ad561718ce00fc464df9503ec2ded5f07e019a6999182ef9c5cf583307ff95cb400000000ef129badbfbdcc9f6c9a301f622b42346d198d1f4ca4315dbfef6ad87ffd983df077f24a7348f87733992efb8bfb529ad8017163e440593d40e34b1e03d2ae8 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1044 iexplore.exe 1044 iexplore.exe 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1044 wrote to memory of 2504 1044 iexplore.exe 30 PID 1044 wrote to memory of 2504 1044 iexplore.exe 30 PID 1044 wrote to memory of 2504 1044 iexplore.exe 30 PID 1044 wrote to memory of 2504 1044 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ceb3a00d0f9626ce70d2d05e223149df_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1044 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55abfd33a5da48ddd0dedba2282e64e08
SHA1d402aefcfc915173e2349c58ca9788bb41cec1fa
SHA2564052cf6b5419fe306ce44b1fdeb0c3b0bc168d0c7aff6eccd77eca6879b0b1d1
SHA5128f53140abc4921a3c0e33e6d52f09ce5edcad0accb136d4256ca46b2c26d335ddb5a3bcdcb5f0319edcc4190d8afc61beb11e9dd09d1fd34a08634e3c360c1b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c703b2660a61ddaeab8c21c0428e7ae4
SHA100133945a94f5cfe1a538298cd6b39267af71043
SHA25624b246af460aafae0fb724e06b4c89f86a1987fdf401e8116e93bba1e17f9ba9
SHA512411533358f68340a9ebe6c4e9773fee435193bfc5367f767a44515dac12a78fc8668b567e6725ce60da9855ca1b02b971a48ac8cdf58659effdb3cddac633061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a5c2fd8c6868a6f636d3b5217fb2f4d
SHA11499546df4694c45048d881af308f2d4f5e6fbc9
SHA25658669069fa97d08a53fbbfc0f8a32abc9ba66baf0bee22e8dfdce5c727c28f13
SHA51214af4daf42bfce12f27ece368374c596bab50960104c3fd979401497f367f66983f16e4ac6ff9e73b933466c81517aeba562d2fecbdc235855c0591aeef68ef6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570ddbc350f14ec765ef8132a657aaaf5
SHA1e64f534f81b8cfaded86feb6f7ca72d8879f3cb5
SHA2560139350925a8e6d531ca4d35f146c9f9f986f759d34f50832d1ed1d58e663f90
SHA512216e9f1535b307e7aee8111b41a1db9a51a3f4776c63ffd6c34372b0327ec870778412313cbc90bd30a42aa97dea33c1c1741fba576e6529224579672a59beca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b52334bb5da26f930f0b0c5657fd054
SHA1d699f979a37899e0a08234f29ff3e3fa0fcf188d
SHA256d2536384dc08046b0c8a325e80adb9de5ea7991ad1cf920e8b5212c7b07eb665
SHA51278571267770a78500b64843d67594f56f7bd5f29921df9bd6a452337349d2e77560decf3a4ff8072a002bcb0b5c45c93ee6854a85a4a19215e7a69504a939364
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585b1deb022bea5ea47b0ba77e1a3ec47
SHA11979467f2bae7eed955934250c8dd6b63a08519f
SHA25680704312ca405d42496460b39ba21a6eb82f2128faeffc18ea098e713bfb832f
SHA512291e290103808e8bfd1c08cceb37f1b0704034312fb8c4e956ec92222fb2044aa24a56db505a83b4d591d9fc49684d801ccb8261bb3c20a2bfb491fac8752995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e3e34130e31ede44cbb0977141feadc
SHA15c0ef481b960a119715e4f73d435136e50f405a4
SHA256d7072ca70893a19256a4d261920ba3feae32b879d6d0e32ba321bb0ba7d24e5a
SHA512456dd7eab966b4ba1cadd4e04ee7ca153529f926103e451219c4f005c7ef70a0abea50f2183694d70661f815308329d2c93d97b3c96a9f5b9ab577c7f665303f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fef3eba8f7336224b4061fdd07c724d3
SHA180986f8fe080278e381e06ca66d446c0dad77a01
SHA25621285795c4525df3ef0df1dbb6cdc4698e5c49349ce3e3b705a9d6610aab7f5a
SHA512aa4125ed89ed28fe5c48c7cde5f1672215da926dc8848da231a94cbedaffff18f75e515200631850ee0eacc14d42f8d3045c0aa8724f098fd9764a7a3654a857
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f76a4ad6ff882aff661d6e0eb0fcb4d
SHA130977bdab17ac1550290c67c0255245d209b4eca
SHA256e162dbfc21f3b2253c9697db8f89badd5d9f78342dba573e7c680b8620f7564c
SHA512faf06e264eb5d711caab91e788416075489c2201f59f9b7b90615d6e80517adf87310fa709c07d43fc6db6395e455419d504614c50787e8c10182baedc4c6237
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50712877cd21f48554d19af1ba4374a5b
SHA1d6dfdf481e655c91d2ba0b1c7d319e30cf3260a2
SHA256e4f6afb7cd2707f71c18ee8fb9483fddac8d15b84532f2394dedbac63fc11049
SHA5123e2d0583f5fcd68f3ffcd13db58fdcbec0d29c5b4a261412b8b2e0348f3bde52bece721b6ba7fe61a48228f67686cdd90c29b72572f97e4ce50662b1f0fae5e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a17dc95b10c75bc479d183036df481b7
SHA1f520952b037e075647c870afcf1eaf2eb751dced
SHA2569f64e67accfd24f8a66ed0405f0d2f166c6398e2f4c5f3474905ab6d721c1935
SHA512f33355c5301cd4ef9bca5c751a36d3b5b0a7777cf336f6987bf6dd1ff1fa22a8c86a24ce87c0a17cc9e203302d3b415a1a22405c4275c319adbe0dfaf1f3bb85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c477fddf5fb0612e3005b3f9b3d01112
SHA166914f96f62d95882a2335f780e578bdd56efed5
SHA2564d89d8e304b2188b270b105885eb10ff2c7df42c9027f5502ca7a89138650c8d
SHA512ab5105f39ec859b55aec5f21f7a34fd8cb8241a2a96abb1bc12b7b2ae20a65dbfa970891814e4761a2054ce80cd4a30972a2edc6adad4b848dcbe1dd73f16d5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5300a285328a1bf6de7c2ca85bed9ca2a
SHA1d65bb0c2e9b6081027a6dd40ad106f5184c3ed69
SHA256e08ed9ca12912a5e1ae2b454a24fec585308ec1db8c969b900ef49aa3fdfd682
SHA51289a8185ba95ceca81d84d6ef5c69e741fe321d0385c803bc23d723c9834100c8af1d4e1b67f6b474ed7e4cceb236ec03e0ab8eb8c5ca0f9215d756bdc4f813b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cfd50d9daee6d1392e652b4c80d61a0
SHA1aa576ef72049b06614f2b2743061fffef1d51076
SHA256ebe47774ec44869923e871ee14591b1ce5eb58746d31bc473fb237ec8cbec746
SHA512a624a26a22274c65c33032826baace0dd06352b733d605846f9292158a9e40e638d919551e22635c25b95c5806a48a8f88226bbe39fe9a65e57a94aa9356ad84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550c4137566d9dc3ac80986140547dcc1
SHA1e722fdd86e9502a782115856112e5a56c39b85ec
SHA256b78b0158ba18c40a0d48e3d60a323ac789e0f77db417e84cde5572542f5bb5f6
SHA512f7e0c7d635c86775210446150ba9a7c9c7db488e190b69e449300b45cdecb9ef7b3e57f9019bb78c5b44b569b172a8b962c4cf164805e76c418e830384ff8597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5835ea351f32e9a6076a39f5a403904
SHA1102f5433d7c9650d8ea44a5eea3e0806e4c332ea
SHA2562e2723448e48490dc84d015299342d5819684689160e59884248e2965705679c
SHA512959b637285efcf61748a1d7310cc855fa8d1302b613d1fd9df3e3b351b6196d64faa23bc3ff4bd9cfbd341f624fba55a6480845dc8058353d5a199a2fd8c99c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b74a4e0c4a59b92655ab9e9095364f0b
SHA14806c89f12c26b59b380d9386566158f4b40f3c8
SHA256922c3d8cdf8f515af8858f730d95dd3fda09e62f92a23a68d54524ccadfdcd82
SHA512d260166fbddec30579f5362ebd9215b30c85a3a78efac398b6de07828a23954c3c0c5a659ac42e61681be2193b83efeb205a8eb051335f857d0612bd16c3bbcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565aec62e1febe41d4aa6bebd0fcd771a
SHA1a1adf0f667677ff90f1a9e6ab2aa8eeeab825e1d
SHA256411dcb62d75f1921424393de48ab4e94fdbbbf946f3eceeb52036a4b49a0db9b
SHA512badb8c924427eca5f42a9fe9ad57647520f772d8d8d35393c9609ac2fbb40cc73729e23786fb22026191312b3ecce3ebcc5829f2cc787017e40352773fa4337e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5932eba3bb2df8dda723ecb1bf7a13d
SHA18efef2fa3a2772854ca56a6e9c893a5cec9270bc
SHA2566b24b7f5e5a8c14305ba14e2137e7345a6255fd56558030a397cd2b95e3c2e08
SHA512949ff87f7d54a750a0fce95fa652fb447d9f1027af63cf7c48a92db7516eb287923e941474626696526282cbc5df3886df0d8071f01a09f36a6c4f63b38aee67
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b