Analysis
-
max time kernel
134s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 04:58
Static task
static1
Behavioral task
behavioral1
Sample
ceb6e0d516683b2641ce478f3ab96eb7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ceb6e0d516683b2641ce478f3ab96eb7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ceb6e0d516683b2641ce478f3ab96eb7_JaffaCakes118.html
-
Size
123KB
-
MD5
ceb6e0d516683b2641ce478f3ab96eb7
-
SHA1
1a315dbb4ef00a638dca65c3131d93ccafb2c18d
-
SHA256
620e5c871a826b72f9e08217bbbbcabf1efa8eb4f0e22face4d714b8b720a9dc
-
SHA512
8f1f6eed44111abd1edb3058861508a8d96cb564a4e4ea812cd62ac967e7ed56996932837d644f9f72a6d56cd47f4e8e9828ec9725309cf893c649a8c9e2bcd9
-
SSDEEP
1536:lE96vwq4gXe+yPhmb6vHGaRrUOnC4mtQPZhmGE9nnF/DWK2:06ojgXjbQrjXO8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10f4fd9d1900db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AC9891B1-6C0C-11EF-9FA9-EA7747D117E6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431760583" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000050ecf499aae68e456790592c034562f3fee964998c4c863acc7ecfc788a95368000000000e8000000002000020000000b3cba0455f1a261aa1e8e390a7d009e384bde1bb8aad36d52c4e47d5fd2baa8020000000173c7cf6e7292802b6e6269b17ed75d49f90eb534da7ef6f9bfe4f803448423f40000000b5f2037912d5072c074c9062e7f7dceac3fde852e01ecc9fdb2f78a8ce19759ca5b0c065942f46b56ae683f9d00d5b6e6e63361ae6135e21a797ece08d1ca630 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2096 iexplore.exe 2096 iexplore.exe 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2336 2096 iexplore.exe 31 PID 2096 wrote to memory of 2336 2096 iexplore.exe 31 PID 2096 wrote to memory of 2336 2096 iexplore.exe 31 PID 2096 wrote to memory of 2336 2096 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ceb6e0d516683b2641ce478f3ab96eb7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a310fe7f4dd0232b5e8416383ae5beb9
SHA18fbff7d9246c4517f1ad8545d65db9075a601143
SHA256b369e9365b68575e7b49c7862c695b2358300480cdb589491412df11ceb2e7ef
SHA512d383efdf1ee7836339adcb933d4c0062363b4a147089c04a745c3b34ffe76e401596a7ce6ecd27490c6f927e92a64a81cc009d6cbe01e3fd8cd7d48473b03fda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501f8cd7b5fd4564c12f220c240473a60
SHA18a10db4c9be7edcf54e8ac3a9f96dfcc57b07080
SHA256033e6d012e9487d3d12b1d71abe1360df4bc6f41b8c629986134c71ceace79d2
SHA512e9ef4625c8e6fca14284be4e30c3e4b0b4acd27c37ebe0b9cdf6df3ee637be0ed7cb66a49394715473f9fe41a69d1651489ff953712496a46aae55abd8634830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4ad7b7e333ef748c885f79dd3ecbe3d
SHA1cb8b21b20cf3a0ca40fb786228f28e234e1aa04b
SHA256db13f0a14026ff9dac268d00d5d81a53ef918d4eb4d47377a62b0ae8dac2770f
SHA512254d5881be6326da826ba434bc5e752e1143ebd7af6c864d723db28cd25f274b6a6567f302690b05a33be7d613383bd0a7a4d27606886e9eedb2e25c40a8742d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51723003b18a2f608d32e895681ec5ccf
SHA10f7ee0203359f035a52c56082caa498a333f9a64
SHA2566c50e647e5efa73e8d8906246ce5389ca52facacd619e7a0b44bb1f92df7a115
SHA512499e868c39670712ab4fd041ed8d20817642ce7d7295b0b0ef67b31425b6882494fac340375b2f24a2df731d5ec16d56cb52e2bcd2fce8e89ac2586e2b7d90a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522e3a8510fa9a3f8eb5e572ea47f63a7
SHA1a6818627b24bbfc95919a701b699543e3f6843a9
SHA2569d373774103cc6b6f2e5f21e791748c36fa385d2d3836e73003cbbf25170d754
SHA512ca19c4934b2c1a03c7b6c2efb6e23cb50460913a5a67af4eea761708e0288ef3e95c2afab3641e0573f8b1ea72e492d960e9142de96d0db3c19c84f547acf09b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e42699c781bcbe10f62ef2f23ce87691
SHA113c6e7c7cdec058055cd4f76219adc6ef61f2246
SHA25675f4de2eac96cf79efcea0bda31fb115e91fb82f7710ec493d7448ec2ea129bf
SHA5121e1b157098a357babc9acf5486b3fa2207796b370efef0744a56cd7eb8ee515a01743ef2db09675eabba49593f953cf273b9c2f86455832b1f5f68363cee9b5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58972628938beaccbe201236c38799450
SHA12be1d6db46ae5e96c41cbe6fed084c7f15ec6f39
SHA256b9135065ddbd1a2935d6b102a1b9ec69ffd1531a312108472e9d4771fd008f4a
SHA512a318f19597101d8290e0b472bd80b3ab64f7a37ca1b4a291ceb898e66e707231a37ec3e6185ff8fc7b2e38bbddedef17be65f5398be9dff4ebb931d348184787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af19cb3b34d6dd8a9edf14c25e1a9460
SHA162d2ecbdfbcad85cb2731f0cd12dab4dea845321
SHA256ca67564f8e2d89343ba250e6f8129ed15ef00cad22ce4dddf80d39b4fb22b0ac
SHA512908840f0ba571fd6a761b749352f713be3a18f16dc6cb1cfd34e106e64c49671a010c584a084accf0ca3209622ac4f961011310a0de775ed5a66702c83f10a1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52765195b9056f84f3f745874be9ccf38
SHA163d0abf4674b937dfaa59c414013846a24827a02
SHA256201f40a213d73ebc3f5438e4aa67856fa1ede478f126d8ecd6ba90674f8edd52
SHA512418c1f142ecbe4ccde1dabd557bb1e8efd560a75cd08f7f15bdb3145051f60b8b012aa17a04248d98151f2354d4ed81d1502cb69c92482af492755f221cb6e88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a37720e6472d6d54abfd20c8dd21015b
SHA1a1e955a5fae338df4ebe48933f2946aaa49054d5
SHA256129c235033fb1af3c9fec0b2a826741d3cb234a8ba8cd28a09aae82547780a72
SHA51228bf6f47463d79fb84593e7ac9b4d7d604f4653b5cf06d3d77e1820b1111c96b42ba34d5fbd6b1e2ad8532fb2b2d12743f1b0f069d42c04e4c77b1fe8dcfa9ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3e5a3341fc4b631582f4596161f3dca
SHA181cd383d3ce991ec183d38d2e62a8b0206093639
SHA256fefff02e1dd7be4d5c45c15a8af08f0affbb6c692e192d43365c8bfe339a85a8
SHA51291d32031444f9e15e36ed0d928bf973caa67974a3194553916e8e6700ea803540fc210a9222f80e7cc26e4cae012822335f9087d7fbafce10e9c50451d48c4aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4a91ce4d947ba4f5259f813d30be0fa
SHA18bc8a42641fee68b6e51ea68e9c0f607afc33875
SHA256b7de406a41a88b29eea086f89963e5c2880431e630d34e8d3e1e13149abc772f
SHA5120a59b318a05ea7a5c57efc5a6b7a8404d9114207cbfbe4049f0457e6fabd50a3f8a15d995a463d1c3c586a115332141be6511d0823747ce45c464db9d5c7f90a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a63dd703e406c5f521d3653259761dca
SHA1342dce5ee75b13b73cded0dc962298b7ebde1ea4
SHA2563cfb7d0f401fa2a0b54c56af9d746cf71919c7d55dd6224610e410c0d5aeb9ae
SHA512af7c3c791d83e76b4bcdc07eda4c3d21bd82fcefc6328e9c7b89c9ac7a88845e201aab7310c27ecff494b1c01dd0c8aa3b71b49a3400630bf4305560509c9789
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c8d2660e075d5ff1ea987f7136efcbb
SHA12086415c903854e838526363f71637b648224a9f
SHA25649a9830fdbbb086583eaf1b17b65e79d4a541525bbb21fea8aa8f2d3bdb35c54
SHA512ddeb46f3a0dc89fd53a008bf6a647739d8e88c9e1ff3570a9d2d281542663fc81f581caebba1b65800f3db09e81ecd710e85fe6875521b7600f0e98779b0b412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2af95dc6499e6c1866818cadae915fe
SHA18d79d8d7c6891c79be46bbc27ef55209622b927a
SHA25681fb9efd26b149def0a3d728da56ee93dc5a7d822d6c82ee130dd29c35298b9d
SHA51265a2d7ef4a6e02e0d55a24887bd151e6960537cd3652811f60c207d038448e05b4a929ec51b3556840c22f89249fad748becbcde32cdfd7877655f02c96a6952
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5c978ccfe07e2517cdf2b80856c1f20
SHA177b46a145e521472115e70533cc519d7e71d6ead
SHA256557c254f028d62760239d9e22dd934c2d173dd0255f450e893b97843c00f7f04
SHA512d936643f37af14ef20c750733370d3c506c1d0d3cff04022e079ddba87d11e143a49f48359a24f09a7b9edf0f232ced10464850a5985edcf2d4355f23425e58b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cff008ae6bc6d7a1d81652991f111574
SHA1a4811bf485cee16717f0600eb4092584d02354d4
SHA256ab184c5c13b3d6eae9287fca6b7d554f9d10deacae73561e26129585d3bcff37
SHA512983710285413069bb375747f72d6dbfb3086409a157861a1c67559914b1007938373975b9ce62fd3a80ad065e7bc7910bd77c4dc88a808767819786f58c510db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598313960c51845cc540b484ca36f2b6b
SHA1923b89eb96266dc263e1aa1d6403b573b84b8722
SHA2560df26e2b240e597cba16ff1a127f65461307147726caf7a3c3a927b83dd88c6b
SHA512c081a77a4e5cd6d34ed2388252573c97553633a6b0ccc4219199c5b8670129fc5a50baa7582fbbc92edc909a8feadb7f7df43a7681374f293442d071e54381eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c87bee2124286c480cc443dd1618809
SHA1309db42b37ed5cafddad88c8c5e0be85fa014793
SHA25658c2510c089f50feee2bf78b8079786233fb6f8459430c8ead4d6f20f037925c
SHA5126d344f8d296dc3ee9c0c9f67adacddb7ec5a3a40ab5c8543fd3e1cf6ab7990864d73ab68a4f60c284cb36076479221c14ecfea19f694a1ac33f883e344233e49
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b