Analysis
-
max time kernel
66s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 07:12
Static task
static1
Behavioral task
behavioral1
Sample
cef7cbb052b1d744d2c61d2f9b67b705_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cef7cbb052b1d744d2c61d2f9b67b705_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cef7cbb052b1d744d2c61d2f9b67b705_JaffaCakes118.html
-
Size
4KB
-
MD5
cef7cbb052b1d744d2c61d2f9b67b705
-
SHA1
0d5ba830e1b5da0ca53f533fb18fa960ea9c3b3a
-
SHA256
d8a217dd2524d5fc95313543ba6ace035a90219cbebdf5356867ab03f939f73f
-
SHA512
6f5938539350f7939858b09d84d551a6df999acb013204d76d8865d83728c0248136f22d6464153564baa721f0b501c24e393be735d3585404ac594fe3e32bdf
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oqtJ8aub:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431768619" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{61D67F81-6C1F-11EF-9AE5-CA26F3F7E98A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000008bd492e029d034746266d2023f6ed6d067c7b15e0fd3a78b7f60930a6938d73000000000e8000000002000020000000b25a6d8fd12100c8654597d752d069fc5e642b40bbbd1a78566f2e44a15e644120000000e477c3f59f8d77c3750c91779e28dfd83d82c51074c97645bba82f2dc7273c97400000004d5b1743d19d058710680121b45fca05893449fe9b3a6c82b508743efd654f9a4cd5d8d14ea7e753d900da6237c274cac1d7b81ef868851b8449e1c0dd97e2c7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 203e4e362c00db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1768 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1768 iexplore.exe 1768 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1768 wrote to memory of 2428 1768 iexplore.exe 30 PID 1768 wrote to memory of 2428 1768 iexplore.exe 30 PID 1768 wrote to memory of 2428 1768 iexplore.exe 30 PID 1768 wrote to memory of 2428 1768 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cef7cbb052b1d744d2c61d2f9b67b705_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1768 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f427adbe0df0645fc761febc65bdef26
SHA159bc94db86e92e04f53b631b053b4e9583de519b
SHA2561cd1ccf03cd35fa22bcfa428b0137810a9f52737fa3855f7daeaba73e8dc4bc9
SHA5128748e312de74ee93cd187ae945c6774eeb6807fbcd700b39a5e3d55dc32f17e691bf20a1c48daf7ae91a9182e4ffda5e4c8babe122478c820f78794d4030ef18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab45596ad423bb99a9843bb340c0d0c7
SHA18763c4dea7c30b38d7b75e484e623183a006f135
SHA2565c8dd7380a6f658b23523e7e88b141a3b3df2b9f7a3d2b3c89bc8cabe01eda29
SHA512d87ba7a1343ea667106a7521196e641401d3c4a36a42f524842d39b78789c4737c567c74d243ee7a0c6311f8a169e884e99d759cd2b27631539853dc273608af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a333a8e637cd0a0fbf4f92aa50c9d23
SHA188f5d5d2a6a3290b1e0f4d5336c0c64c9577e64c
SHA256ae5e7d58214dae993587e156626350a41cd212d73e6f8aee670f0cdb2715679a
SHA512e8d5ba38e272d607ab09944f16a500098b0efbeae563529a26b569e06f1b8bb3136bb8cf40ebb4e116ccdabe2697567770f9042ea5522ea64799f13a02fd1bc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d28040a11ab8a7539e8d58ffda5fab3
SHA1265dde308a93ebbf0b8c4ba806c104e225c89388
SHA25662ba0626ff770c5cf819c1bbf025727ad480cc04aa9a1cb0dc0565356195fc8b
SHA5128f229968ce412fc7f3e4c1026b21143c17501b97fbf8c7ed83e8a62f07a74e12b25dcd8c43bd04970dbe6951f48ee52f6c85299077d7bd6714fa72e63b186e8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a805243c487ab58a18f13bc37832d0a
SHA184b7078c2b8f78e356f091ab5ba060dfe8234662
SHA256ac9df473b8a73556c9f3d3376e10e61e9ec1689c58a9ee923ca5ef86adbe6aed
SHA5121fc3da9bdbc0791b912856cc4664900fa848282b9e72bc3fbd52042699686cecc6e6bdde63d7431cdba710cabd9b003191a5494559aec05872bc25d9b96dd196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c62003b66d9578f2c10de20d1ce48d7e
SHA18d42323a4e8d850bc19fdf7677c7a67c4407034d
SHA2565c6ab92566c3996d282094f143a620c17bcb06a107eca5f281661af36a497bd9
SHA5128cea02a2741670fa775309025e40f3b60df0f2db0d7470922016d47613dfbe9d02ded675aef6c411c5bb5a3bfaafe5586c46a57102ea9b1a1f05a0ff48b6c632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc76923638bbadeafe4fe3edd7eb2826
SHA15a09b2b9b793b9970b88e1d9edfb7b2982c9c486
SHA256a9f8a23e5933b83085c73f1b508f1eba6c9644ab492b0e0918452bbfe4bea65c
SHA512d1247e7d60bf6fb188aa25e040991190f9e7fe24ad50cb6657f6c82d157be4bc1c46e9b52765bc3c0a4aac95ce83adb852d70fad1450850f8272172a971e3456
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516e97de70805ce0d9ffd83ac52f183c9
SHA1bc624679c50d6029332119e7a57a4fb44b1dcb6e
SHA2569d5edc0654bc5c74b9e232391210cbaa3e6413c95a28c0897edffd4f5b71d017
SHA512ec8087e867c2fcaee80da40f16ccff0c025b15e6c65b6fcdae8b37a168782504e6b3d6845137db22d4aa4838cfc1b6440a7fa384ea15ee22a6957936741d7df6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa3a2f298f3cca1853f95d7875bb7245
SHA1e07d333d020e745bf7bc533b41443bc68f3b0138
SHA2569af9ffd2f1a5352d360b855b8c73eb8c3d8945a055eb748345b34024f69d7e3f
SHA512e1822f29bfdf23fdeb7157ec308b7e17d24ea2c6cb597c2f5ddecd37708c6cbcc51880decd28f436425936062fcf749d5ecb4467d0c75f8d80024848247c3f10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5307a771dfd4108c197e684d06b3c1eb6
SHA10db40889a86f6f57d278634dc67d9deb507af984
SHA2565b02927f5e13756d90f5e877b962620a87271b976e04ad73de0ab9d515133030
SHA5122ba6e7a0f001c8ac169c132e25fc4519fa0f4368261954477b0715576796660aacdb8f6c6b457190d246a24c1235e47917647a626e207a96ebec7b7d2373c4d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5441441cd8fe4118dd72569501587391d
SHA1e16c8309dcb0a790893132541cb65f10427d0c89
SHA2565023c765cd95e0f009ea538ff63fa2dbeb004090addb4ba9d8dddba2816805b1
SHA5128d01d2ad15b09f729dce3481ec5af10c3c68cae4a64dabf153e2ac98e8218069e3bb4192b21b3fd30c02063353f5217cda2a417bb03f6d6488678ae59e586410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52be087c7f92f122a8e1f180b1107fb16
SHA1c74cfefc44c1f816fb89977ce9dd792f62236634
SHA25645c5dfdd11171f667caeb0ac05c87648ca213a80eb5fc69faf2744f427f2830c
SHA512e625d94cda5ca12cf92e30e4a901ae7bd994fa93c424d0cc4f2d6f9618768cef39fe3897bff5c6998fd35fad595fbf57250c98f71450289316455e2d6d7f3c00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529bef813257ae73d29a4744c8bf3efb2
SHA170f1c5819429ba9d05f21084e3daac410f99e818
SHA256089ea3f3e236c2c52f0f9578b774f1934ed9836f220186303c93cd010cdea63e
SHA512c336c6847fc74a3a0c281b4de828dbb86a02c44025a87f43d785ac152b338728881543e5aa6d7166a09fd6bc88224914c4c3166885042e37b7108df30fa9f501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b7203ed2d42358af2535e27a0f59180
SHA166c2a8ec6993d46e55de1f4a563868bc6780c828
SHA256b86ac5abcf087551d8b36b6addf22433e3fa84cbbfec1eddfd1ea0dc3b405b31
SHA5124336e4fab5b5ef5ea4e61e65f9a04a7384b820f0e1a37ca4d50b8f0249fbd3a79398d315ba44c3cc301d2397bed5521bb6eac3db424651e3d9e7c2a1dd8e080b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d18bdaacc15740ce2ef076c8275a65ae
SHA1dc5f96b45d3ae57089f412d8a8a509e215ad487f
SHA25651f942c4fb9a9c5da277dbb92febe4e537f57e686350829db101f886782630ec
SHA512ce94c1f2a866cfb1e005396d5935ce59eb60fbb3cbffdd69b67d0a32186512a30a46ea7c5ab257ff05163171ee214493482253b80f9be0d6e5ce58c463a5b859
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa30765abd08983f9dc8fb6a683d1e2c
SHA18b8eea393228a9bf6b621b9d5809256df14dc95d
SHA256bd516552ccb7816888bba3369827a7f2bcda5dc2d470c06f36b7d215a26d6f8e
SHA512d5c984499596a18ecbf74631cd12e3fb873d6841b6fc8f6d2b14f16291f8de668dfa24fb852998db22096f22b12f5481134942b9a904695af08edf4718a459dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5605b3ee201d341c21581b54484d2a91b
SHA1bd720cdb0288ca7e20d672d10b35627a4176ebbe
SHA2568ff9233d127f5511bfcd21229afcf4a25f693113fd4d6bacd9ca802dba0fcbcf
SHA5122a61203fd5d98a584a154b4c14d04717712cb922a44a2520f88f0c4d8dfdc2b4b78e9cc6e713912f739ab3b681f33df2e7ca8b648d74542ae94ce3b2826e6552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbc4a284f3b9dc282094f72303ba682f
SHA17d5c413143177f94ac02d9bf374c0946a5accb02
SHA256bef014e18044452b0da0536c250a2385ae6974cba7479fa916967ac85467e501
SHA512531b8c81f67d3ce33db1c9de8dc9d526c67d9ec7d1bc8c86c9acbcb9f390be851f2eb963744f52a5f0b25f86afbca6e1ac5f4fec22d048c3b689478615fdd0b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c5b65e745f9125725ca148652469af8
SHA1ba4e56d33d08fdacf3b6893f7874149be224465a
SHA2564c29f445c241b6c70f9ad5a537bdc862a355e14d7743b81d6da8bcd731f831a9
SHA512f803024b1ed30b520756abdc84fd9251a9d38c5d5fcf5a07befa2c3cd6882760dfefb1af6ae10a1922db7b79920f89ee81f558df324fd9084a9201145da58aef
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b