Analysis
-
max time kernel
133s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 07:22
Static task
static1
Behavioral task
behavioral1
Sample
cefc8f98275e701efe3146da264654f0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cefc8f98275e701efe3146da264654f0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cefc8f98275e701efe3146da264654f0_JaffaCakes118.html
-
Size
4KB
-
MD5
cefc8f98275e701efe3146da264654f0
-
SHA1
2e666a3e98048b035891d5586648286302c17560
-
SHA256
678cde386ebe1fa6d632904846724cfce3f7e9801e94b92f9dc8e52ac0744b96
-
SHA512
ee0b29384cfab4b93483a920afe6d142fad4930d6d887059c7d41972c7fe8aed63eeaa39bf99156a0ac9e90a96e997090202b08fb3cee91e45a8b7f4128252c3
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8ozZd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000fa41c28bd9b6d65a8ebf213f89fe9e73c6c5436e8729a5e4ae9f48f45cc02c64000000000e8000000002000020000000c79dfe8b52612357773f94a0365e592f14778189952a0dde876c6a0cf027323220000000b0013adb669bfe0faa7541cf6c6de1f4b96b0e02227a080b05673f611b1f41be4000000026a2bf4df89bbe806bfac4695058e843614890991cbdbc384dd3cc4c5c063eef70335785b2869f89251fdb8663a1211cf44c8e2c62807a76379325084a20ce0c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0fe11932d00db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BE9250E1-6C20-11EF-81C1-5EE01BAFE073} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431769203" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 320 IEXPLORE.EXE 320 IEXPLORE.EXE 320 IEXPLORE.EXE 320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 320 2420 iexplore.exe 30 PID 2420 wrote to memory of 320 2420 iexplore.exe 30 PID 2420 wrote to memory of 320 2420 iexplore.exe 30 PID 2420 wrote to memory of 320 2420 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cefc8f98275e701efe3146da264654f0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb6e21df578bd81edc6945df0d605cbb
SHA1356015c237af3eb7300612e1826302d65dd3846a
SHA256f0d3fc39033697d2a92f3a5f25ca60ed8bb876bdcad09f2d8bc69f1ff3344b6f
SHA51245d3693582e3361df64a66ee7ff25467e43ba5374bf094f0e0cb6e61b35181cafd4d07e6181fd6b0c335e9065b2cc0a43d41690c10699d5cdcdb9d82a647da00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516a70cc76b4e8a640c018805b238df78
SHA16889f0aec4ee9b25f3dcc6e27ce110a66a138406
SHA256fde436b1f7fa67cd128150f1929f2955b77343d5582901455059a3a00d365c2d
SHA51247c6978bb1501ee0f81e4f0bfc3cd0524ef5100939b0c32bb8df33514af1cad5b08edbed07fe64d94cfe49fcd86f3de3f621649445d6b076fbab828b7daea30b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf6bba6ef881392183b25ec4b9a73909
SHA121bb9bff33a7144c13270c2dd4398dd8bfb0006d
SHA2568ab52f8b6f74a205b11084ffa943ae7d7674f0cbaa78af1f6da94e8df18245ce
SHA512b78889c6b86527b6b309823b04fa4485ce06bb0024df9977ad7260a20079ab5d5480ca79aa1894d9f1a7aff53bc5dfd0e11e4c381f9eab6109147079192126a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ab31d87b3ce053184048fd9cf26b893
SHA1f7e8abfd5f39453226f4103a96108acb9e3dc867
SHA2565c6ec9c2d5b5de6b78a7b692252e08691ad63b37b5ababdcb7e4a5a196200ff2
SHA512b243e57abcd2a7609212241d4cced5663195ee3d4142dd0d286f29326dd71aa39d62eb9672217b4c5103a5dca07161d4b260c3ecc7f5502f84d1829b578c1040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a5e53c053e4e5f4bdc3252fc377fe24
SHA1d8c1bbace794037d77e8c758e7ce78b248fe40be
SHA256fff13bbf17a5daf312054c81adc045be25d40ef199c6b6c9be6679657326bc66
SHA5127f9e6ea988bb0d400bde087ebf93c13d82fe85b779ff29d172e58377b7b0d2f4557b5bf4da3f7e30b414e4b249599183790f0ce185c3d326f689fefd7dd1054b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d306b664dd608b0a28f1c70b0fda5602
SHA1c396204599c103e047361b7b391426f67c26aa8f
SHA25682d0d4477ca7a13a62c0aff76bfde2b58095ee6b3ea309d1f595f4b3bbba63b5
SHA512ee24de304883208e68977d3754dc785459b5f0df32de669d5aff548bc03862dc50376cf36fab6830a5e4ff94bab9fb05cd3644e8e088bacbc59fb268735ba42d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b517bdf784e10ac6a77e3dde4ed05af9
SHA161903594d611da3c710dfeb6427303ac06804524
SHA25628e78b979fe321c8c6d41784f011640319ce720d26a5cb08b1c138d79dd4f027
SHA512e83a1943bdb1c8544b9c2e7b570bcd7ae1b20fa24bcea25f2803129b76ca400b795b7f58e91e61e54d7d44ccbdf272a4c1a7c3302796927cd2338550be23c1e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1789af3cd526237d952a1aa9572cf64
SHA115739ed5f5dba9637e72b7fa3040dff24b3edc45
SHA256d1f9c08413c9362428a688b9c9bc815388bafdaf465dfb7a1169b775d7c25be6
SHA51266bf264b9835024cbbdc45b947ea328e1ed86ebb1a05943a2f68d72ad79d73035cffaf4d794dbc007662ccc7b80716b0418435372e43400e7c87ae3c783ba2d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560b8b1f6a1236f0704e7d5ef7677d3ca
SHA1e0b73af08b29dc1814daf76ccbf9e68a45f4e14f
SHA2569fc1bab9dd470acfcb4ad0001018604910ad6181c5e2370112a95c0f39a2cc88
SHA51228adbbf29dff31353ab520e1efb54970f367ac012c5cd1532c6a339f22c6de57346f073781c253e47e1524659d6b61b77f26c74c94208353f265cda7eac9b39f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5043f077464b9974e009039799cdd639b
SHA1e6bc91dfcbd8a87b11530a4d753ec229a84d9b7f
SHA256bbd09fff6d45f0565c0572ee2e151465e63dd541fa3b5d8b93603e73d4b871b7
SHA512e8a00f00d43e7c9eeaecc22a7e51dd9277c44ec604fab2294142c406a0d1c0572492d40c722d8f9a66bca96b58c5c98e25f39392308f5e6a93403184186b9c6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bc4178c8fbf20a85adf6b3c28887c8e
SHA1f2e4ed977edbf0b4f4feede0ec6dfcf9d8d03c43
SHA256f40deb5a9847eb43baf8850899660a1362b6e2b82cd79d7fe844cd34b37db890
SHA512d37604b770a83d26c3312a2c7bd44672ed8e2d75d0ad7e14c77681833056ef69cb197737bed65cc7de5c1afeaff9b2f0a741b4fd9150c7dc7cd4549e43895552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b7069d39709306c4c459f2cc1bb1a43
SHA11d6b57cc7a0d8d122476b4fba77018dc3f476797
SHA256e1470dbc17dfe37ff8f9a5f548217d559873add40e5581a31937986c214eae1c
SHA512b2d6b349011739a734caf921a1e204837d5741a086d1cd401026d5240f2267ed976c717773f8662c25767a30a8850f11b7def58177a1bfb863473f5b13b1e344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a50f7e4573b093761ba6461fbb9e132f
SHA113db5305c1fb50a152f080ce2e90b0d82045c475
SHA256330d959042e58e3e1bc526a4a5827bba941ebb77224c18c9840fe6b7a015201e
SHA512f66b7ac3dba016b78bb8156e11ef1caff237e6fb35cdba5bf8a543ed65c86298d1837261b896e8fbd7e0e40de02f9e73f7937a4e9fdd1f05d582331c0b0a306c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3909e350cbd6a3911df934b2074a2b2
SHA10ca05132d79cf7ce7e748fb301c95d676280d16a
SHA256aa86df6d77b02ce34c64fe3cfd7e299dec7f2983d9d08f5cb8a2ed44724dc18a
SHA512d04286cb554546fb8d64b6305b35f096122e95b86eff37d45431c11aa70cf70561e38526a505ff3d6eab82d85fdce804b92c768af9f4974944d372cdefa95a91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1f68ab44b57266ea3d656bc6f75f49b
SHA1bac250f0a9a84c0f431d4991572347bff8f1cd05
SHA2561c222adfb62faefb46419f7fc20eaa207c8675d623d61d6eab6dd5ecd270081a
SHA512768f143cb244260cc0de9bcb8aeb5da01a15bc6530e7a4fd5c5ae815f2c86a13671966cd8e9f23e0f3be2c5afa43b7d5f8f370c0acfa6600695d7a05ba1fb785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e44ad977d152e99129e6f902e880980
SHA18954607e6fc7b75a607b552025bc095bf92aed0e
SHA2566a63b039b7a460f52e40c6c0b290a9b0833f96da78fe5ae9ca0355b83eb881ed
SHA5122655cc94380cb7a3ebcc86afc756e43adbddd496a8179e8cf7592d5fdb42cd694b0372334e769a52bbc8befd8952860943b471b251f9fac89abe5086d1e8b6df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a88bc13c16ed24cda5d97894e8b5ec1
SHA16213d50c18a4676d5a1d5ec377610abba90738ff
SHA25618c88e47c62fa5ecfe95781e0f1063913308f4dea02b132bd1260cae05eb57a2
SHA512ad5a341edbef90e13b8ea43f2f7bf7cc5144e03a99e5c236574ce78d584e2a41c7bae5b9dbd4811d5e56b18527ad596a74d47406309005cb9bfa9a828fac4551
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5739ca081e95a8597b611b544bf1b9d73
SHA10ae8e36218694a5af0e3725c29c17bd2c11f144c
SHA256fc838c7bd517a83ae4782a522748845d22a9523c34eeb7f5f066ae01d85431a3
SHA512de5c43d6bf98919c213e7b48d4d004ff5bc28d83037d7c9ea8c6c9cdb67c012d08df63709886b5d914ce4275f220c9af53a8001ebe7283182dc488b55a8b83e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515b8b8b287c6db2c82252a2181436204
SHA19c3dd82dccc1397d7c710e3f032c5e2fc638493f
SHA256de16a31686a22d846504f572fecdece0d666c0b35b997b44e66d35b2efc4bde2
SHA512c68be332983ad21010a4d2b427d619135a370ff312e22e77441b0a9102cfe864f845e0a837d99adf05b4c5baaafd3b310711e893ba84323aae7e404e9b62d089
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b