Analysis
-
max time kernel
138s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 07:50
Static task
static1
Behavioral task
behavioral1
Sample
cf0b6328b6c2849ff1ca154661f2c12b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf0b6328b6c2849ff1ca154661f2c12b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf0b6328b6c2849ff1ca154661f2c12b_JaffaCakes118.html
-
Size
73KB
-
MD5
cf0b6328b6c2849ff1ca154661f2c12b
-
SHA1
8d4b2799e22e0e5ed633e03d8adaea87c5f80513
-
SHA256
a2f14136b3409ce81d5f7204153ca1a9ac7c84419223c8e9e91bbd300f846781
-
SHA512
1bbbea28e707157f8e9f739cfbddf71bc4da3cbe887a363ba401c6c50a5bc1efa27eb9f2553f66972e8bf9b596ba4fa32a5094282e087cf0e87b4df37e3b5b03
-
SSDEEP
768:JiYgcMiR3sI2PDDnX0g6sn6PTTcGpoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFf:JctG+TzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C0E8AFC1-6C24-11EF-969B-D60C98DC526F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000021c072367f2de9e7688177c1b89213f943a7ff6ab8df192da523f07aa4ded07e000000000e8000000002000020000000e49ac4c1020b5aec30ca3512410dc9a36af4464952015bee823374b2759fda1a200000002c074cd89fef18a09b641fff987a16c9691cc675b2408ff38f6a6401fe1b3c9d40000000d1c0eea4e7a0727cb5da215e923e23bc6bfa86aaab1e0aa8909d91a5fd2740c6a9a65337b616691849920b335345a1b77b76a9b684cb41e935b34d253d6b5aa3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431770925" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 403686953100db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2648 iexplore.exe 2648 iexplore.exe 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2796 2648 iexplore.exe 30 PID 2648 wrote to memory of 2796 2648 iexplore.exe 30 PID 2648 wrote to memory of 2796 2648 iexplore.exe 30 PID 2648 wrote to memory of 2796 2648 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cf0b6328b6c2849ff1ca154661f2c12b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c24fff9c61052050e4ae8150b4d22c9
SHA1a0b7e44b2164ed77cd2d6cfb9511df4f91bafdbf
SHA2565d0da3a88a993bc6629a2a452f757c76fc7576060881eb110301aaf0a3683833
SHA51248d4fe0228bb20820b6474419a545a5999a6a86949f51cfdfd4b39636d12134429ec07dfd42c8e5eb9051f7f5c33aa258b6bb82461d597b7fb2dd0c06e424735
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59865e43fc6d3c761969472fd5ab933de
SHA10069728b2c2e65e9359649950247830a1c8000eb
SHA2567be4fd90d757f84b1ba6b1ca5257581c5cbec368fb0f6dd047bb47a6bac59c93
SHA51286ee66eacc4c4c0a23cb6bbf01a5f005e2734bf16424e2520b7cb15e8859fcfd3d63875f9e6cb8b83d4cafc2a197e7a79f7084bd76eb91498831686970b38dc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b997d8cd9cf643b9216812073a3fb65d
SHA16c9798d545eb6b4abcf0c9a08c2f877414070e10
SHA256f10785402113213bc7fbc64c1e747eab643c80121efc7113bae5e85c6d4ca8d5
SHA512eb1daaf5a1a990a3a572de94c2e8093c58d3082f9a6a6de373c5fd3b1c429cefd20e6c1851c4c866aab5cf5a5ac5b3dd503bb783f9924f041089d3f6111ea140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ce1904ba08ff070fb531abbf94f0169
SHA12b97bf19ce8eac46a1a81277e903ea67941c9ff0
SHA256cabb8279c8d2ed7d8bc725dde6289aff018356ccaf6302a259775fafc24bc2f2
SHA5126691721b4cd2ad6d6d606b579f85afc424d9790b7c8884c760299597ecfdfae67f6518290ef50ec282d053cc9f752cab5d629d2611178b420d3c565e3bcf0a49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e3b0ad3786c0a354d9670ffc1012403
SHA17966416614a83ce32562047b962b0976b4553961
SHA256dd61b468481b01e73976cdd4fe5c21ab7711000a0ca1544cc7b1606ce16c5bd5
SHA51202ba7db00fd3c7ea8ed979198ae29061bb11d7c3e53d815b90f85a73973567d9f2b952109fadcf995ad7c80f8c9af8fab9891f0db66efd6dfbc1b05925dac65b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b7b902513b1b5fc7f3594ab37bf8e60
SHA1c0f0d03d70d7ea5b3bc882fa5b030b08f78f91d0
SHA2564e72a48a8dd8e0fc41c1bc85f19a190969441db409af113100f33323356a8f69
SHA5121a297d70dbb92bd91eaff4c473896db484187fb2550a7e038ff463c3560c407843f255ba9053530c8488b58d705c96e6040ff06f67f03ba499d9b7330c0a2680
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d56d2bbc30beb1850081d3165f2abcd2
SHA1ae255d35f1f400cdb9025cee4b503382e2358d59
SHA25617b73265a1af7ea443167f62ffb1191a4d8ff5c2303e1ee3366f83aca0b78f4a
SHA512038e97f29cfaeef86abd357db51e052fbb6dd537a6ff10e3a3c33835396f505be66aa40127969f76875d9d9a076a64445738dac90d33cf56430482d4a67984b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525ac5a7aa490c4455aff93124dbe9a92
SHA148008ec1670180513aab36d03afd8f00ea475ea4
SHA256a5f681df71db68ee18340fd86047c67b2fc7ab69bc70b5cc804823e578890720
SHA512bc3849ebff70a157ad8fd03a77bd62c43d4af414399ed3681ad97b7980b638b7c61992833bd0e6a83c2f0bd7149fbec1110d83182dee41f6259034f59626c56f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55deeff162ff7e09c1cec7005a4684934
SHA177336fd4b74c418c2c1f3675ca15c4c199f53b80
SHA25654adf1d14727cbacc9719655231055a3a52eb89538b4586aa773d00f12cdf6cc
SHA512e29d8951da53fb11b57394679fd8906c14f9918969b5c1f05b3e850b0c74b443dd8e0a7a919c81adce918c3f97c723adece1cf68594c0b56db56685f25818dfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5935b1be8e6207eca92b2af88444bf689
SHA159b44fece286b8f27abd7b88a6dd7c03495cc94a
SHA25617f1e8ca2c9a72b4fc516597f448ec065364a19459b54faa08c8b47f43112ffe
SHA512151d0f2a659fde63f9eea357b176dbde3618b348c9be96c3e41f7e341fb08ea3b34a66b160b4bba2542245a42bd483f9daa33b051dbf699bdffc0bf1bf2cde2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c9131ba6493298af1b845aadbe9742d
SHA100aead5838cfbbfb4b33aa63317df93eee1f88b8
SHA2566255661b8910fbf4082ffae7b23487f24c4296e4c0e44b653f6198826c73be8f
SHA5126ad51005e8714977dc549f2a5d429b0d2756709c49250c879809c2b0279d4f1070ff5aae8325b8295d5e3a3a0763198006f360bf3c30962a927593ad3ebced5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599ecccccc8cf600495c493d4200c7ced
SHA14f5a093aa7c5df08b78f15213765a4056fe8d4ed
SHA2565d4990648415dbd65e810d5b69e7eb868326afe9b3a6b1b8074fdcd1d22c508a
SHA512909698947aff1d40e98795ce85079b43b30b2558ac78b09a7896dcdb61da0846e1b9b757d73e1291272e01a97024fa4eabdf311907cb838e8c926b77f1bfe6b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c645f637353d82c18b25a1374c4bf81
SHA1961a329d65aeb1f3b34b07b86217eade6387c3c6
SHA256b9cefcda90c32388f3c19b6a1203fe396706d323347e042a83f9b89ed6008040
SHA512ff544fd36d3d34d522c30bc5084a51e05a7a771815fb30b410fc8db1b4e6c9f5760a4fd67d17089b12f703252a2421228915f8837518fe24945e3fb3640750a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f7a35fd57123fcaaf57bd223ba518a3
SHA1563c5c3608276e99fb5b17f651064cbf1879a523
SHA2569588da7d0bb70269e5d50d01b5a560ef01b40e83347cc4aadc4a8fb631d6c1a7
SHA51259dd5aefe4d0a1444d6ce82f4652780095962203f283077f2bac409e0dc63b0019da4e93749fd76afff91dd49c5727d92ed015ba4d63dde365b31ea526099dfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56721960daf09c61176033712660a7008
SHA1ea3f724b6d9b8bb98514ec281ed5e822dc63af6a
SHA256bda1c95a3fec83a53e2c1d5ef381be61f5e92d8c30403d3623b73ad7267b7d3f
SHA512c93a2fca84e3ac3c5bcfc102392054684ca06cffd8279661a506509b5f94402fbead956774b40571b0b6c4c5b49b0f6785f82f45475ebe17d788d63304eb6f11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580e948e83c3457a91328bc699ef29bb2
SHA19a91a0db0553cae93abeba35c80a3d40a062462a
SHA2562248a9f85c4e8245d795c3ceb110cda06fc35b901630336281aa41086cec3bb3
SHA512760fc3e6418834e61da4aa14395c4e954a29c615e32c2c365fdc5c9905b56f499c38aca858cf68b89a639d8cbdfe4109d6e55b48444e7592fe9726df715ce61f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556c5864614f4abf63e765b72fa5d4857
SHA1f5da3c2c4c5beb38e3ca4fad2e5f7f7092148d96
SHA2565f6fcec5adb5ed469b51059c47a0f4bd5668e0d41d82944afc85cb696fb12514
SHA512ddfccac4ec9f0c2d58bd2af4f422acee60becfe47352b67be20955f2c97a09a630209039e854af7fac4858a1a027651a8ff37a1f8bb5a7d63880a2990e312371
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51aad12c2631ea7fbc592c2d64ca28072
SHA1cca44dc74ebb02a436ee7771e523ba7c4e8b3ba7
SHA2561c86101eea91b3659f0aa9608b499fa5bc0172ea120105cac5f87e4e522b595e
SHA512c9d49fc85f5554cb0766cac32011661290d370150534fe365242d93b08935afedf1175c10659ab868205c9d4e52af787a00f78f281f0c4ccfd1c33a540631d38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a61fbdca9c82d67a42ebc9232b08647a
SHA1ec76807b1b5bb5391fb5d0b26c3cb6c4fac1206c
SHA25632f18817c667aa3565cd9cf96f512ab275e361216a9faf637089f232d8f22180
SHA5124a14790d469a6b725c0c30d5f1c1da4583860038256be672ea9f40bb90f52bd57daf3797d3e9f0ef096d8ed6797cc386656f9b02724d5bc2bae6a971fb831573
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b