Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 04:58
Static task
static1
Behavioral task
behavioral1
Sample
ceb6edac4185ea1e11f21b76dcb5deff_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ceb6edac4185ea1e11f21b76dcb5deff_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ceb6edac4185ea1e11f21b76dcb5deff_JaffaCakes118.html
-
Size
23KB
-
MD5
ceb6edac4185ea1e11f21b76dcb5deff
-
SHA1
92bdac54c2b5b5becedf19ba90789255eb13a951
-
SHA256
85830c07aa2138e739300c25caab825e032a933caa88eb1da6530a5b0ed021d3
-
SHA512
c4ba19b6a0eeb4d7023222e0e0ba91976708601dcd191ae913f685ba5d6ed3310ffe9c2ae5aa63cab690566fb3b5a78340e96ed5ef2f6cb67bdf9f1a994649b6
-
SSDEEP
384:GdSr68wWqHLHqCa/euq0/ejzbpAbPEj975OHNCYhCI7gdEpWBB5OtK:u8wWqrKCMej021RtOtC2CI7gdEpWBB5t
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B02C0141-6C0C-11EF-B12A-E61828AB23DD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000ebd2dac7c0659ce0d78aaa30f47e05a0a75d085bede99a334679f5c1b8df9541000000000e8000000002000020000000292517e65d9ac8be1138fd10d15ca5973f913ab2d9f520b7926ab97add7ec4fa2000000022a32c027f19babfd1fdfa1db037acd4366b82ada1de8814fdfe6d58b18211364000000052560c81c422bda04024c0813d62baa1a14a65671d1605f62575e282b506f3389f79bc3cd91167e8b64db89f0cf9bb8d4e943672e510043f55dc50e0bfb5bfdb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 903f71871900db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431760589" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1884 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1884 iexplore.exe 1884 iexplore.exe 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1884 wrote to memory of 1808 1884 iexplore.exe 30 PID 1884 wrote to memory of 1808 1884 iexplore.exe 30 PID 1884 wrote to memory of 1808 1884 iexplore.exe 30 PID 1884 wrote to memory of 1808 1884 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ceb6edac4185ea1e11f21b76dcb5deff_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1884 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528e944adea35525e23bb75734385b670
SHA14e5658a7f8de9a33dbc84ec8adc944c4fe1ecedb
SHA256dff4ab9fe81baeea7d93050d4018140fe8d6338bce5846437f2094b07e5654a0
SHA51231cc04a9fb86843d6a5c070dd5a9d807f81ba4181391ba807df606b3ce57f3e8d302d09133fb907c2190168f403c9d7347ab6bdc6207578e03a1136f268f23f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560967137ace3a3009511a51aa314841e
SHA11b6bc777f09b7462c63c358c6a96fbb8493e9886
SHA256790c0234694bba738b5454eba4e17356d223292426aaff018c78b0f4935cb54e
SHA512926f76d713a7e7d9e771b5de2a5efce8e6efb40a348d3e7b93c2e0f5d38714bf34bfcbe5b14fe200c4896d222caf485797573a271bbc16dec954fae934a7ced2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553378a286677fdbc804f572fe85613d1
SHA1bca683a0a7c41b41fbb314cabc55588bebddc255
SHA2565df928e36542ce749118e69474035ea2d63057aa9cd27b64a145b1d9fd758432
SHA512fdcf55261c265a33a3202f0bc2d9cc40a4d5e4062a90bb3711638e1c90879de59c811249b9f40694d517425ef62bac2648add0e4c3af661286a4faf1a73542b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54982e6553aa0fe588a3a1123d76b30f0
SHA164f5fcda5ce9124d249061b486956d0d43f2e751
SHA25677c464e2c6948d0ffaee1976a001c25339e15a59b2d3b7e35434f2a87a242598
SHA51226c77f52c7237f3eb27933963329780d057fabf0f80981e0e3236399c5a716a2bb746a740814ea6bede35acab3b8845efd5f2c76b907e19b4693a8ec6ec553c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5ac3b6821d1dcc06dabb9755130ba48
SHA14a9d7de75c41993d0d4704941188be6630eca23e
SHA25680e9ba41b9d84fde8f90163304b8bbbb116c3f627f09f8a186e9aa8424419420
SHA512ba31476e03aa3685a2861fb152e987e4e0574a743ab506310727ac954df63a7c83681550a841237f6ca24928d3a0a4acd93126e7af221dd3c3c80e484aafcf0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f4d51daa88e37d5e0471fe4928bdf51
SHA19f4877a4038a5392f6ac6e3c2aca0579a4fb1631
SHA256f635b00904a49f1d8afa4f2a15860a765390f805cc37c6050cd359ed6d4795f5
SHA5122f7c4c4d9c06369c31e1ccd0afebbdaddef5f142fe8ca3627b1f6cfc3e7b26f4bc42c01226fa3a834ed9bf1695a683bf687d3c460e394c9c7c61cdb8533ec39a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2f5fc11779e00a4e8c3b267ad491844
SHA1958f1d6eb1f2dc1de5239e634f2387517dee33a0
SHA25670c6c8e4bf53862d02ec7c872dfa17be47f2660bde780852c37ad63dcb34e865
SHA512cbc6cd55c47b2db6a12a0f5082866466082d760a18434593cbcf1594fa7215db178db4a8710042e17df90344fb87b52370ef8016e7fe9771db57dc8f113006ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c312a7b1078f434fc4a3c91ba6489140
SHA1958d09473c8d51bbe6bb99c01103b621c21742d6
SHA256943eee7b5e5f16a9c7ddcac072b94319e1fb069eaf95ad13515ae848b818f498
SHA5126f4344d41098f9b43ab354b0ae5a05319ffab32c85f3edaafa0a56e202b62e2415e0d8878fcf9a38a3f38574f8e4b6f91fc018b217d5f8266790bd6d2e6e251f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc131f3f20d42c62c1ae61d926e64b72
SHA17750f9eaeb43d1168b66f3ecfa391d31d48aba83
SHA256bc5427e5459336b4a6716a3aa33eee42f25c3bc09586cbd5b465bd9c1c8148a5
SHA5120e6d5b092d6cd9aecd9dca69a7d5777f246c4f7e6ecaaaa2b4f5fac82470e02a19f6167accac5a2840a290c7b4086242717c0b5be99e2cbc5566256c83398815
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecdd6b6896f2cb32c637531dd2a7b991
SHA18ffae7993af0153a4553e208dfc76c1c6eb54e4a
SHA256c973c25f962994d0fa473eca5968933a2607d9c7fa64499cc69167ee9ead395c
SHA5122492c04bb4c9827622411de3a6dfa1fe6d9099ddc3420da3fd8ec76c992310ea617d74d1061ac42fffed6d54e69ab5f7289a28a68e91a47e9bff0efff04e3937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c16b26df9ea2b871760ae604b9f7bc2
SHA16100d1a5e705b3d119f6b6fdd202c7eb7284f918
SHA25617fbdaf292ba002351e90c02b2997c6d8e27481ea2878e14c6273d5d0b881a69
SHA51245eab6ac113503c56f478d7fcc2e50712fcd87f98a310904a166b3021f1b8f7949e7fd0f071fe8b65f938c345928e80091f62d6c0ca81b6e2d53a59ffed0cff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fce05c2001c6f08d5a68681708de191
SHA1188ee1c059143d12d8e2d8e82b7a6a7f621a1b57
SHA256fed615cc68b48635686a28672432f5671102d8f33d7bc91aee9e06cebcef0431
SHA5127810f067969231418551f14bc61ba950819415a35c1fbe178c31582a20be6257928827f83398838dfe392446fe12d6bfc644720e3ffa8252881826e9d9a8325c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5329eda25fa78d8991c7a95f154f06d66
SHA1be9210d64cfd691881ffcda4e176813635f56673
SHA2567fe6b42a1a633348605c4613adbad9e72b5c70b625747a2364ad795c6ffc0f02
SHA5121081c39fed5f0647227d8b19097e3dcdb42ed9cca33f9c36a5cc723db2fb9d248b6598f8676b7d232fe04268f95e328c9bcd8684a3af0a439fef7548320dc92b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d75c12a7e71cd195bcf5acdf73663986
SHA158b54044d49b2902fbba764a55a300b069a5d8ab
SHA256d4b7e170fbcf93f24106230f82cdf913495395c5efc8a6539085cb455d7c6cff
SHA5129c87608d1b720ce3f9d16d4be3ce608a97f1963efbf766c000ed0ab90e3200b1751e46646ffc56235fc82215c8101e42773c87dfbf2166e2b2a9a91f90ea019c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5296593caadad747e7a64ccadb0455944
SHA16660f2717afa5e8640abc52e94f9efffbb572733
SHA2568651f87bca34588fcd5b5378add8ff1bf1e67faafbe6f02793f53d1646206aab
SHA51258c3a87a462b99218b78901ce24489794a5290b79903fb3484e575b98e6dd9e912c1504e2bfdfa69b2c6c3712d1a3dc6db6aa2ec7c40feea11e5955119bc658b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1f84db300310b1f9a0c8bf3bcbb9630
SHA1c87d5fe8a2d55d18356ed32d89984b06f5a16537
SHA25698d4eb1a081970d2aadb2f9f7dafb784b55b25b697a755297dbd445444982167
SHA512e266df581781bcf7576e53e08d00b63e311463e0535e0b5d981132e10cbc5b3baff62323bf8f4045174db8d90b617160f937f975cca8d299a4f5db0636aaaa1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5955f70425d9024a84a2568988234b441
SHA1b9420d5b9c2119fef7dd4238dee9a1b83e587704
SHA256cf95f32c8d567d74c940a4b3094a454e94262092b2dd34745cc9c96353fe1278
SHA5120d0a4fb393672b1d5849eeb0bb021cd58aa921140d4c430d38b0311aa933c48a228d75735c08bdbd977c2f12d8531e9fccd0c2b2cf8a68a0a27e8ad1652a9bbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eb7de6619e07ba950a5e3fef7fa8888
SHA1a25be27b0656dffae8a9b988e64d388f4265c263
SHA2566115c76b4e74513a0cea7372b69e526aa64250e4da62572217e4e9f008fc1fd6
SHA5128ccca95daa009381db4b15c6914e7673c79f05a78c8f10ef566a18adf0823404ca1eb7c2a07fd7ef1197b7cce67bedd2f6130cde35401ca969f25a2252edf32b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b5964269271f4ef2e15b36e047e1146
SHA1646a622798db608d741dcd0f20e75a95cb4b2684
SHA2566645960715cfb8de31638036c9e27b41d8373f3effe2e0759f4fbc9de55074a1
SHA51238dfd1bf4820a7ff218ff6d6fe323a0be720e1b79238b288bfa0b9a6b533b05c71c3810b4b460aeeb649c9c9d325da6a6385677c62587229a7d661d0451e9d40
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b