Analysis
-
max time kernel
133s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 07:35
Static task
static1
Behavioral task
behavioral1
Sample
cf03510baa4eff1f6618a670f2770df4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf03510baa4eff1f6618a670f2770df4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf03510baa4eff1f6618a670f2770df4_JaffaCakes118.html
-
Size
460KB
-
MD5
cf03510baa4eff1f6618a670f2770df4
-
SHA1
61f6d29335777d2878907f41020c27f697271b76
-
SHA256
c4b1197dd5db1343b1f18fd1642d0f733c6651202a1d8d00368795237f94589d
-
SHA512
e72e04d0b35d0102106a89c947eafb81e958abbdac18c8a3167adbd6ea02f30dc34d8b28f7508dab8e3e4e145a3d909466723c03000d2751a2e4fd07b0f540b5
-
SSDEEP
6144:SbsMYod+X3oI+YFsMYod+X3oI+YUsMYod+X3oI+YLsMYod+X3oI+YQ:65d+X3X5d+X3w5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000007225455b0dc255594dfd61b07278a70dc35c1ac3be3d21bbf2bf3bc704f5b96e000000000e800000000200002000000062f00fcd1ffe46414b37cc0a1250775c82183bb47433f8df6aa628344c4c7bdc200000007e7e7311ee236ecc461332db546665263da016af261f5da9ebe43803e3836ed8400000004438d5ffde2fcb328a7af8ba38e012fd83e2036b40753765030fe37458d043b4844b2afa5d18cfc19454e835751d56f3d7966a221893212a4dcec7c3a790e69d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431770023" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A74D0811-6C22-11EF-A17D-4A174794FC88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80d8d47f2f00db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2660 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2660 iexplore.exe 2660 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2100 2660 iexplore.exe 30 PID 2660 wrote to memory of 2100 2660 iexplore.exe 30 PID 2660 wrote to memory of 2100 2660 iexplore.exe 30 PID 2660 wrote to memory of 2100 2660 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cf03510baa4eff1f6618a670f2770df4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2660 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f38ed9979665bdf7d3d128572b4459d5
SHA119490aeed1ef020195fb9324cebc93f903a96211
SHA25632cf293bb7c2cf12931734a38bc81f74c92677ea0306ee263e3c6f6bde5167a3
SHA512dcdd1d633e288caae133fcd97ee28fe6754badfbdf13c123b9860938d344164a3953302c051363f1f738af62e256cdeb809becb36b5cae038f5e6323bf1c5f93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb16b80c49a6ba00f751130a3d27f0ef
SHA1b35f27f1f4b142a89db97d67b74dc7f9c2571387
SHA25664c08376c50b371a9476e15a6857cbbb4458fee1e99b7c682df0e2fe6c27da11
SHA512db138386ab47d5239b4fe4db0022e1aea8c4f1cb93b675e489ea62b646090f9d41968101cedde647cb71d3fe924e7289f86205fc553f01f4b16c11c34e9e17cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569eccd252a8cccde6ea750a9fee0d1f6
SHA19b33c9f1c75f1898583c386b1bd389c020838719
SHA256a0d7e992ee343b9d21e7689a623a283f856c9e70c44fe053fba6761c5cc48c67
SHA5126a076523461d89a7598aa294d8e745303369598fc50e8c9c914abab053ede5c803bb5ddf4be07eb16c8640dd89529398516bd989f028dac723604f6d3843cb8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503fede64a12bdf31e2f89dffdc7a649f
SHA16fa6cba59ec10d5940b68a990d59700a756d5fdd
SHA2569fbf93614004260f9bb11bb397e694166e6e69ca153f843cf025845bce09acfd
SHA5125c084f20aae2ca3ea03264c8e3a8b0df2df85254dff710b52f271acdb21629dbfe68c4e0715baf83d984b707d5fcafb6967f7b2a841a4b11ec148ae154e661fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b30ac69a30fa953a438c160afb3717e
SHA1e709616daf2f78ff597153836a0decb4518a8851
SHA256f9485a6cb8ef807ed5e0e59599c5f783a037cfa61957a4b471a4e7b891c2eea3
SHA512b5e49e554813f54c9240295c39f9e9c9936c24cf4159a8b759119f99a1e72c4f098b74a78461dec1e80302d162b0a8ed1b9113aea1e74c4a2357b69884cb42c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5279710ce7d6b1efe91e78ddaf46b277f
SHA144b4711beeac18a2a4e03cce5f4431f72677d3c1
SHA256620a592d55f5b074be76da8ad1c7ea445b07562edda684425a3570cb955724f4
SHA512612469f8895c58675ad8336d2eb67f8adf832194b895fb0dc8dce46de4ea2610272e13534114852a503930c8e528dfea63e59b2f6a5bd807c8b925fa4ac7a660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fad18406ce08b65ab6639155231449dd
SHA1fe65d11bf6a8d69fedbdeccd02b143e2def6ecab
SHA256125f4bdee64a56a63b99b0608782d9413e076cf375d0212871224fcfc0406c97
SHA512be60bfb8047d1ddd0372394cb2c6c3fcb0a317772532ad297523ac1f6c1be2b055c0df4980312977b54d61a677fcf502cb08b4cb8e65d15ebbae901775ae7432
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5913054e4ba493a4db1b731522eeecb6d
SHA1ba6e816b05f71b69bc4aaebf7eb56aa33ff5410a
SHA256464a4206b505a9eb1b05632f7d66c7b3cd41678de7bfc92d8a71a107474edaea
SHA512263759aa2055986b622356fdae2c70af35b7a73c5102585fb6da94eb9ac145d3e71c627f1e4b02da6519c4ac9da78ed911103dfedc8722b05beb9406f89be9b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5031b7cbd5fccd377688713a566f1d7e1
SHA1c22b51f31621557e5976321be5c36e870af8a4a8
SHA2565e05e09d54a2441906061d4963e7012a21315f028ec65f30fa46e526df2de0c5
SHA512fa7f5375ba3a85f59ddcd10487e5052d917d02cf0668189575da1543df14434866d8eacc961b728355cae3c4bf5002faeff4bc671b4c9d0acf5c21c7838ab965
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546049fc588dfa24fb5ac42bba0e553e3
SHA1234a73f4b092a355aca22fcf8ff7b339dfdcadb5
SHA25660b437cc4a67406ffd5518bade800a7355d3428276a7ada8d3ed6690708539e9
SHA5121048efdc95a7483c1bb0b79ee42de8022b78a96ce7d1d3a5510914ece3b474b08e468bd73e83244094df1f232f5758f77acb8dc9dbde6846c38743cbbc0f2aca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540ec6947ebc07d32e3715aeb0013002a
SHA1cef713c6fd221c79aa1b11122888af119b159bbe
SHA25691df7fdb3f78bc69b0f676d7dddcce7eb4f60a6b2e977bc29358c6e406e6a187
SHA5124c9160740f14e4ef5286298b5d6c9974051727fd3095d70f899f7a5a7ca2d08de8ad9184c4f33a611c28b1c58b020dc495b1d7abdb915e1f00aacd5ecf170df9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d371183a5e43ea4d04c76d6bf212e176
SHA139914535631218ddecd5657789dab1cc00b245be
SHA2569f6245ef19ee05826d417c6c10a09c14e60772da774001283bba848a61877162
SHA51290040ed309b5aec83eb823276a04dcc78ba1f67f655235241856ca33f090dd063c75f364e5b014bc347cf86113bd4eb8f1bd1d8b3a1de4c68f8fa0dc0f14202f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c390c52520f77a4725233d76ed40ab50
SHA1258e5434cf8a03072b53f989a75e55695ff5c92b
SHA25660a10b3e6f8a97e315446aae4d5b296b40cbdc88e6e55b04b0bef5d9bc04ff55
SHA51218947b1e788dfdafecb8b41fe500f9685f44b50ea02dc9cc5eaee0b7f7116c12e731319c8d827c9daadfa58fb59dac40556647601a3738a106cbde4689f22395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505dd4dcc30bf23e9850c834afbece0f6
SHA1557a1e39843e7839173ac744cb8f7df06e222221
SHA256711e9fe07fee253f6d262774b27d0b2d2f1ce3bdb984d78904820fe04f11d102
SHA5129a721779d29e879bbfee6f899bc08c685810c36238aba4139e6f1d083cb2003c1c5c43f30f0e3240608c785d920325d8f33d603cf2e6a8a26208fe0a3e56f0e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576a0f7f89558601ac7a0643b615ae879
SHA14fcea27e088a0d0d9d48a18c777906783ab7e874
SHA25615b619b4fce1c0fa67f3c6099efb0f9e286aeda2a02885ba97d82c329021bec2
SHA512d129d96b2f8f026bbbea201f16620f884dfa5a912a1ec1e079e01abb4725027da81192d62b233159b91e87923b53b872779d35e17b8d377da18bd10b355455e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5603c9cad90bd89e52ea6a1091fdcf5e9
SHA1fc134f30cf615fe247ccbc60c5bc0ade8d5ca7ed
SHA256424a9640ffa515b5cab04dd0b91b9d58393a89f9360ae100a013a0c28c129e7e
SHA5122fcd0e6d772b6dd4450b9076c27dc727708efe5a2548956fb41093e4b2f663c79414e275ff093eee34735ea1f74b846445eb40d48e163a3b86de2d273f0329ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fbdc2ba9f8873c10290f23ae1219104
SHA19a9c944fc7402832ae976a1d94109c344b32f871
SHA256221bfdb96f7436179f7eb161fdd7522ab069c4dd8c2ec053a62928e359f7320d
SHA512fe807637dd13c209414c50f869614080bbc2d827aef01e6c5e801cab4c5b2d2a15400a1c3631db00e7cebeb6e34fb4183c518b9c993b8f3a557e18bb91a92c4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50325123c11eda8d7208834ef4c25d53e
SHA10d5b6938cbf8886e78489c8ecad287f4cfe1f50c
SHA256ce27f6e630dace678e049be272a34be915d2f8ba717b2b16132e925514201b38
SHA512a6d78feac69b374c747dcb0d3591660afcfad1bd89aea737b07e48084cdb1c4b0416551d0aef0901f2755f234990f431aac6e050381944ef0f712257caffe2d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a87de6b49a3929a948bcad0db3f63dba
SHA17075a2afb97b8134aa7753aa4d8563304292c659
SHA2562ad8883706068c9235c5a47c92a0266cf6cb9448fd2876cb43097281fbbe77d7
SHA512002d6374e2e2fdbd3ecbe706ba14bb630c3e93e86b136dffa5f633387ebf27990207a7aa96217b83ae9b8a2a64bb8c54e055001a1def2d918822e07a5ebe4b2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0a963eb2c3005c41d2a81830341156e
SHA1262e7ba3987e7de33983eb8a491ab0177b768757
SHA25672d7b7edbf4cf236a62e8521e65bc2367f18e80d02d400138b5f972f3cc24b65
SHA512338615769e4ad825c4ceaeb9799655a094bf6bbe7b181075ccc7a3a1050cf8081fd4a9f68db4aab2f6b84e24b94f51c1c0146d2a4ca3d49cc91c2a721431aa05
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b