Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 07:40
Static task
static1
Behavioral task
behavioral1
Sample
cf0609acbe710c0825f278b529c9e8c9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf0609acbe710c0825f278b529c9e8c9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf0609acbe710c0825f278b529c9e8c9_JaffaCakes118.html
-
Size
70KB
-
MD5
cf0609acbe710c0825f278b529c9e8c9
-
SHA1
8a805739425bc1c9973c7b8d1bb7c5a9537e9f05
-
SHA256
59cee25a2725b5451eb70d66180bf5fb39bddf9120e1fea7791f9794e96d7af5
-
SHA512
7be330f9bb8148136a13c15bce57464705e85fe2713376b20cc4b288863d0fc3360d864301824e14f94cff0c5607524a124e456dec3ae524b32d7a33e224747a
-
SSDEEP
1536:gQZBCCOdL0IxCKkh1mfaiUs88PQF7hc38BqWUVBu33AVzQCOg/gfvcJ8RJCaGFip:gk2J0IxG1mfaiUs88PQF7hc38BqWUVBK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000066d161284a9f123e6ecea60a88c57e89c9b18f6710d509e342cfbdbb3f77d38d000000000e8000000002000020000000c9ce439cca852334089006115ff551d0b2eb15769ab0527ad2458387d576a118200000009629158a90f4d4334adc0b001370bf181ab949cfa0f69df62e0a8c890aaeab4b400000002164f19a0ca391262e6a5af5385baa23d2f0614db1ceb7dfe390b0b5fae6e701eb17a0bdde71ea5e03007f03bcf21467f3faf65219e94b57986887045e8d9ac8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431770339" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{61D624F1-6C23-11EF-9D9F-E67A421F41DB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f08c2c3a3000db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2508 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2508 iexplore.exe 2508 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2348 2508 iexplore.exe 30 PID 2508 wrote to memory of 2348 2508 iexplore.exe 30 PID 2508 wrote to memory of 2348 2508 iexplore.exe 30 PID 2508 wrote to memory of 2348 2508 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cf0609acbe710c0825f278b529c9e8c9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2508 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf75a4e2a3ae6256a484f77a3d14d5c7
SHA1f58fa2f961e837baff3bce1485170a877225ef6c
SHA2563d79c3d29b0fee22ff88461b334cc893073c25a0ac2dd8c321863182e80d48cf
SHA5129bb812818ef4d6bbf3fd39bf49f7e553a270f246fb58c32ae4c4b9211080db1bf407e0abded352d089bfba40d67eb88bdbeeb0c20258d0034fc2ce2ad12f224c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d20940b7d43c1c8990c5080c67715c45
SHA11e66a10cc4841562996f9627568247f1e5ba45f9
SHA256dd56735665895fa5340f3ca9b13330011842e2cc73030f36fde73d4ffb8f53c4
SHA512c9a44268d669cd4aa270d6ca8e6f52b67382400d4c57aaad2568fd2d8405767a130a6bb5f6c3cef9a959f51ac32fe96b63f4ee5a5505e3632e03c550df11480a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fee3b1c1857e7e59daff78d630ceb4a
SHA12c779a04411a75d0200317e0cc1d9f7c893b6ece
SHA2563131bebdbc60afa992242d6134bd921d3b40ca84c0f3d36cdb82924fd1d687fc
SHA512ee95b2b23781d9f7fc6ee74538f076905c91ff7028d5247bb45453bb8a1e1badbe3fe8b3ec798f53a5f97beaa8ca309577c2674d48d694e5a8794b5ec5b0efec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d3fbfa803638bc971c7922f3161ad2d
SHA1392bf687af0e95cca2895fdc83bcba8967a248a7
SHA256c8569ccb0f2a3fa89bd80f9c11d276eb8ea2d1ffac81280d33ee229a1d3bb02e
SHA512cae086b76384347799c603bfa31a2edbe848e965634b0de7cabed5bddf54efb98c3041fb196ed3abef56745c5e5f8ad1be58e6a090a722f9f9d6d3c6cc76a090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f52c7009a06fa7889129a6a3d977c369
SHA1b4e5bc7a2a6d5066f8a27adf0160caeeecd168b7
SHA25660844dabe979fdd551c86182b9328722ceea4ab80cf1ede6fd3a1cbd001ace85
SHA5120e22f5c138360e201344ce40ebcde23757d2da39fc23a292fd9b1bc0323232c29bd6f47196f35022cd65ae1be4796b692a951cbdcfe695628d0dda9fe5df08ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5983dd0c1798eec5ff3dab410cca52653
SHA152abe664bab582c995ead983844a5f26d5660257
SHA256a41b73dfcd832a81f1a719880042a8055483f06e7f715ea9d3826f4e5be05c53
SHA5121643b144d793bac2508217672e0decab5eea69930ee175bc13e48636022afe5315c6fa09ff353caa548020baecb1b116734db13610aa302c5527ceb52ae761d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0f154ad864443d956f9c200504a4e0c
SHA15b7fb224f67e36682576cf09febfb5470dd58a93
SHA2564828a255b6afe642727b5c409a885870cb64941560b08ba8945dbdbef300e764
SHA51211932519ec451cadc5e38bf8c057764f47276299aaa0a798bdc6be472a27e1bf7aeff76656e5af8fcb966da0be98d13b1a1d55fc8c3e23a7367e9b8667291e41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dda47e691ca031e051998a7d9c2d89d3
SHA1aaec6413c9a5da91ecf0d77156c47f8f0b9d9053
SHA2565be9b3fb2b66f7e111a6570292b015f9a34322a7075087ae6d2a75417f0e170d
SHA5126a65a438c99552a84f83d76669e59d4698f0a4160f6a7773865dd109b97ed0118bd296eaf415bc44fff8cded40f1478388a3cd3ef31e91ac23d7d3fa7e94e342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577e8d8e5704d506ca33aa22113759a42
SHA1cb3918bb589304755816047beb935e03ee3cf6f8
SHA2560fc7d71f2a5b6f26be1390b558fe105ed1914f45fbaa40fbcdf728d7a4647ec2
SHA51211a72cfc3b66dca06a4730ba150c89a57546853356eb73fde5fe41968b13a3170a6dc10ef8d7a5856fe0c8332ddaa3312ba9eb32e861a13321fcf79069446014
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592587f92d02f88b39582dc0e99f58768
SHA18671ad52d8fee9c3dd24b1e35a30649b8528d086
SHA25650fb033c165a7e5894ea7e984cd6939d4f4e2e13d9c2fd3c7cddea901c48c176
SHA512a0fc9e52e455b7f9009274827afae6d63d49e358538358aa184b9c227f72f27ee387c93e2700ae6fbccf64c8f22adfe090e3c9c22b0fe62f8c1562e4a72bcbcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f268787784be3aac99604cc79bd42915
SHA1ed9fdd9c742bbc353f19d353ec7edb80c929c1d5
SHA2568af2db616865e0a8ee3bce20c415aad135577c239e72785e8f02787e1b1d0a8a
SHA5129ea728ca707b283a6ce998c206b5e9787cbc4cd0ebca4ea978142e91134c37b872d3ce2339b272c1d929648d0edc4ae78b4aeea10384970d47927499399dd0c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbeb31f6518bc91634d7b9dec1e99678
SHA12ead33c0f4e74b08245d60b4506930bd8e0f4245
SHA256e88a6cecd36da132be9709aefb4f51bdfcd70912cc1db034c410212e5127e8f3
SHA512aa6b9bf96f4e0a1e38aba04a8801599178bdcffbdeb913a21e07df5f65b2fabb9fb4ad33c805696f59ce56bd67d35cd0d1c3830df11cbd2cb1e3c4ddb63067a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549e11c5452e86a10f7cb83ed6a840ce4
SHA14732b858938a60f7b4ad4977d9d671eef6ad1b4d
SHA2569b5f92ed53b64fda2a9042eedcc49ca61a8ae3ba934990d90e21c5c9a58c7bef
SHA51265270928b8bd6eae08d3d8ebdc8df06a66e6dfd2bf1b1b3fa71463971d12e60ccf64011ce18c90c242c97e8420777f2092f6bf9953a56dd30bb6909cb6aa442c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2334c98fda9c30538e293bcc1be25dd
SHA1d5cf578927630a280aec8ae71539e7280ff71bb3
SHA256239686b49af155fbcd8785ea461b8088d736feeb3fe0c3c14a8c5fb0e3383de3
SHA512f760bfa8e4e4d7145785d7114d4065399c205c6859d9fc7740b02ec6d26f5802482f5d8cb98dafdfcd9939ae7e392741e0a293d3e75849ffff2be968c20049ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fed72b9f96ee0b404cf703c2c3452d5
SHA18d291512b7abb9936db9259828e881bdfce16270
SHA2562c2533fc3e70d02fbe7e619688ea6c5854a7437937ba513d83dbf4ce197590ab
SHA512502d3baaf9a62ce2793da8c1c92cbc0b9acea62aa983b0019fc02588fef640b48046e38274a6f7eae22a32a9f990750c4227f031c349f4ae5ea67e2733ba1507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586dc311ac175efd83e6f6b2c58177756
SHA16fb5d1355f8a87fb74befea9bd396f2aa2b71285
SHA256805ab4fc1f32ddf3296bbcb7606f29e4a433ca88eb6adddef6aa437a018e8305
SHA51221e993618d5cb96c8254317d2ab409f922037cf5e445158fa49cf487d2f32f1c3c6317e65e0a9db5b251574615006b05dfbe0c1067d303f6706d1f5a137ce5df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556922e87fb96af856a768a6e5e16fa6e
SHA12d0d7970d853b962685de56067a40e80d859d7c1
SHA256818194e1192c6713d1c47958b94442032a32b42c8cf51f51c65257bb117f8f9b
SHA5129d3a11fba6e3fe11e80aed187874aa3f19eb0f6d60ba426f29560cc97edb1e91c71b8f78afe18b38eaad47bbf106aa9cb1035847c86ad3cbdd678832bb69094f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570ca0549036f3e58958e143d9bffad2e
SHA13477bd4dc492d1320a6e24e4f93267ef9b67c08c
SHA25606a8b56439d57534edd011c6f01347b5eadf6e2f22c549341f2f4854f60e5597
SHA5126158c83994c813764f8195aebca67eab8b3565511a5b27d6d870806ffb895047eb4b64ea8aa046eb9c9a200e699f161431ab6622ee1a775f94d67ed381c50b3d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b