Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 07:51
Static task
static1
Behavioral task
behavioral1
Sample
cf0b7900e1ee40398b53bbdb8f5bc8d7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf0b7900e1ee40398b53bbdb8f5bc8d7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf0b7900e1ee40398b53bbdb8f5bc8d7_JaffaCakes118.html
-
Size
2KB
-
MD5
cf0b7900e1ee40398b53bbdb8f5bc8d7
-
SHA1
b59e52093c0d3b55a8ffd3745e9cb633c1d3c50b
-
SHA256
e4ddcbdd5cf612c6e91b1c7f382322cc881061431e4fe5aaeaee4da89787acb7
-
SHA512
4537138681f3379b44a9cf5ec193fdf7b8aa38d05b70b0b61f24ce8b8d8f06df097641e4c354dd3d8d00583bb78d354039afe150cadf9218a1ca9c3ec313defb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 905753a23100db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CC395AA1-6C24-11EF-86C1-D60C98DC526F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000004d1fa7e50000a47667c3aa9227b071ea58fc7845fc4335c159fbd750c01d1bc7000000000e8000000002000020000000ad88f7eff1b96162e7eec56051e77f432064be2a0ed105f8487678e7d526232090000000186a21cdfb3acd8735800017a327f8fe5cf26a24169c565c23ce53c14ea7e654c0018b90a0c49b771cf11167a23adcbd05a0dd3ca67b5aae01c90d078e3234ae9289cf7d5935541218dc63b90fa115c3ff10d63d6121c0a6d3ef3a73ec3422415f30bfbe0633a16620017741f1172f41c69b3d68c110f7bab76ea9ad704991a93638452921e71a213d0b467ff2cbf42840000000e0e26f956e4e543fd6b293f2755a1e5a61bfdf16667bc89621ea5301d7afc27c6e23f0b23bf670dd164b0f723ff132d440c4c524f8acb3069fcc88528b4ef41d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000020e93101f5236471cbecfe49d8de4211108ff8941ebcb60c5a32d50cc29992f9000000000e8000000002000020000000cfeed1ce3fb4f156b121e35b90274b3b589c8715542b91d4246337705faffb37200000005af89552890a1bf0f9e1c0f4a9f0370d73ed55acd8035b0db5d660d16b115e1040000000980e066ce380ccd553d2f7909f6cb282d623633844ee140dc2da47a42ec3432566b50292a4f5a91243e7b2a34acbdd716536d67d35f048f55a2edaa1c90ccb30 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431770945" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2508 3000 iexplore.exe 30 PID 3000 wrote to memory of 2508 3000 iexplore.exe 30 PID 3000 wrote to memory of 2508 3000 iexplore.exe 30 PID 3000 wrote to memory of 2508 3000 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cf0b7900e1ee40398b53bbdb8f5bc8d7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512849a67e7ec8eaddbd6c210038c610a
SHA1b57f31d0a46a30b85df8a52d707a9bc8b1af77e8
SHA256f6ef2b704f32baf13d3fc27005ec5e64892c7d0565778eb227bc98ed2c35fa26
SHA51210c8a6936e611322e016a098c5e443d29c1c88adbc59fbb45df4e504b048d8dd992d3d22c1f7689ef9c9f92bbb7523cd61e2d9d0b7f2f204c5192e5a31b8180e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512c91d5159f8aff0873d40d33a2b7317
SHA10b14d928c4d7b9fd18f1445d8768b0d2fd5f5173
SHA25623bd7321db5221de9720cc38f4857ab644bd3d2702f8a95feb82d2e3099f0df1
SHA51270ee93a4de383fb469fe88a7f6b7f14b9385e736a0e04b4d05db9b6c68694e917b4d102efdb69afddc705a24e61cc506d59fcf391c60e3961af5b0ce4a1ed26b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d7e5529d2191adbbe10cd35ec65c0d7
SHA12243be562ee45c6086286a8715eae72ebb47668a
SHA256d98605ff4d0b8eb7f06ec599f7bc674421b93f3cb72882c737df57fb4c8c8320
SHA51292f221daefee580de67ffe5f4c8c9bc9f2ce0ffd5af5782e0f32181e7885632777fc256c48841b504cfda69a911bce57ab05dd1ef6d11074ebf992974e57c95c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e991aebc965668605451e92f891a9c4
SHA10ee36a8efbd3e9f713d2c52f2927c6ffc60815d5
SHA256fe4c48115ac5184e5b08984d47a95792cf19b29a5065729153ffcfc6efa61687
SHA512b478c32ec6682eaa522036a1187f653913c78852784d80b2dc053808e7c2709276b51c03649bbe7098354a62f8596626c32a077fd3b9da4c32fad659c82281dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5126cefc59eea05201704951172a7055c
SHA136394272356ad670ce13b67c727b5b42e5fb852c
SHA256abe52e6f43bd5308936375cf720538043e20bedd92144f027df412eadc50e456
SHA512edc00b3e5efc08ff68fda47c5af3d069bc09d3f7f044fe5062d2dd1a446de0c0f803822e0109c423489c040b89f167bfefcbd1044c7a7721db2500c6f7e6173e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e86c2e8689aaed7714c9a14f5efc1ad5
SHA144ff656445c08386d13b1da7957dc30d5d05e43d
SHA256681e64eb5353412068c433224d9bd9f8c44494a6864011332d717334fcfa73f2
SHA51247deb8a9c49b0023efa3c9afd745cce1e5205378c9b1be6685d47ca880cc09c8b2eb9a989e4247ddae3dd7374ad388e64b92d9b203fbd380166a10368cfbc950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5731394e368bfb353ec032ec11cf0b160
SHA1838c36287bab193165ae75fd33e3f940edc59cfc
SHA2562766d6d42945d591adb2b38ba4a1a9cd0eab2ee2bb3292cb55108289ea515086
SHA512ca95ed82e5f8b6c9a4458a5263e6065688b3371d35ef70f54a91b6d9b56a01583c9784bcaedb13e06e248ff3dad4f05eb33186ef34df943d6b04676e355cef45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a588b60635f24afa64233163fb4b716
SHA1efac3c567283c32e6c8610df3f316063ea680557
SHA256fa626529fcc1041014350e14ed9faa75f9a61704b78a40cf2d0f4981f7aab3a3
SHA512ab9d4e11cf4915b7aeb7086b28970f1103a9568ec5799bc5c44012323eb01834e53b1a3d2c6f033269bd19785d40d27396e835e6278d73a06e5ea483c86e1a06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d3d33b71c0b1bfd3fb3b1032c4d21eb
SHA1f7aab8d7851a39ab1e8078310a1695b59f038706
SHA256d685b3e7045d71499feb8ae5c3b7a8a458203c261f8ee3ea24bfad8d73bca953
SHA5120432081e3545579ea3041fba0f40b01d19afe63ea41defa5d4f9d6d836c2a6ed60049eff04a68e471de5c40f89e56bdaa35104b298eb93a111a6f9d6bbb9276b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9055cdcd2848b2832a5bd18bd483a25
SHA1e5abd5cd927d295c9646d188043de16fcb0e67c1
SHA2567f203c68782d77673fa3327f406d055b8e7f86fd470b46c4537d78948371d009
SHA512c394cf099a85dac0bc2b3f7bb4b4b0e1a8878bd3ae98f39cc48aa563fa9d97b503cfbce45c8e62dac39accff32394c0466a90716e115e1289d85aaf03de4d0d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54be672937435f9c14858b0a13dd6a0e9
SHA13e3e1b781700075177792ad43c584dd9950936cb
SHA2567e7ec4c4b9a198274e2b916186f236235a67f0b1aab97a5e1abd4b57d5a7e846
SHA512f6b7f6ce86a2079fffb89f31c8b2ac0aa75d9d123d4a26845708527e19f2948947ef09decf0c6dfff003d239f20df65bb247c244b5dbf829f22c6eb46ede9024
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50874374203df77830fb277b7f0e8c2e4
SHA139176e574e389f180bf2116ad9611a4647c7b6f1
SHA256bd81af0623c3a566039b7e6d292bd607aaeb585da8da8064c549c7cada27aff7
SHA51283d089ff841573c9512ecb2e99248698d5c08cc5ce3f1b718883572be192794cdaca89f4e061197b86ee3650ac3ef6b6269a915e9ed101ccc34b2d12a078a566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ce03ac7a0a8eca39f0cd72246ad1ca8
SHA1785f13a6b6d0ee546e5a53b2983b7f99f38ed6b6
SHA256032fc27542117b659787e257691cde6e9424a03420826a1a857da5144c4947aa
SHA5128b785ab70f61bc5dcd4a6a86764d0744e2f2aaccbce77ff5353fa3ebf08326806a934c0eaf10e8bd6f14823909f0fa62cc64a39f2cab3fdffa38121e0e921094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaddea5114aaff8e5031b7ed56b0ae23
SHA151e6cbabfae074f5fa5c32e718dd92fdd8c679d9
SHA256db6c405628a8c751321c19a25a5562fd1e839e2e4f1ff435f1b4c5c30c4c69e2
SHA5124659348bef16dbd6b0ed64dadb0f65a926de60268847564e2c0926f6280ae3bfc9f1d767426971b7eca3050bf3e0da012d77d5d87a8692141902ed72e6436116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5390541cc69d5d39899f5e9346a1c7b6c
SHA1e2c5c622b41d0c094a770b659a7130d82918213f
SHA256a4e922bf357a8fe95f435f42af66da9f06de2fad0b265de76e9cda01e2945445
SHA512722172b1f5c1a7a2820dc5a567973b2a26d79884ff37263fccdf94156addc540941cae41d148090ca08562f9d0252ed0f51c82ac0360c9626e8e6f2a2ed529b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca5a0543522c12c173f9ab2c2b81eb84
SHA173e4cb87767b8375a2d5ce298c116497a1880cbb
SHA256bd6b45257cfef0fa0a85aeb54552d9c6f036ffecc1a65474385cea09c05e7ece
SHA5124a10895bcd39fad2e81810bded1b369ed4fdbc66968f943798e263f9ffe97a717ec86b1bd06cc4d5e42db14bef176cf3f1c6746be6e9331e3ae982cae281ceeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2aac11bc1755d1eddae87ba37e8dbf3
SHA11cb0afa3308eb370e9d4de54a5257f79e4b37ec2
SHA256dbe8f428d0ba5f167fc96b9e9f4541c6d2bbbdb8aa29dcbb61a2b368ca267e42
SHA512d811dabff8dc81884517f946d726e05cf779b8f74b2baab97cd11da14feb72aab6b79400f861fb35d075a07d3e549990aa73918c715dd38db35decfa3cc7e4bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e202c7ef8874388f0e0015f28431bf6
SHA1ad0b2c481e86f2c2f8d45ae1e9df5833ad7f1031
SHA256e732d008b6b383e80e88eae109c2eab65a32f1699111e2ce7242c140b3bc7be2
SHA5125c551fcacee9bc48f33113728b9ce374c31dc3d09a9744f3bbaa7bbd47f6ba3a0523e41db5f4ce572306ffd91fb7a4ff39cb4c1507b194e8eacc0c466977a0bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53adda82b77826b9a98e424a62d7912db
SHA14654dd21857acc69a50bcb33a3f7105f53c32bff
SHA2566d7fc50446869748ba8ab76011aa4dc1c8b25bb00a609d1b4455848eab55368f
SHA51215b53fa38a1256a34b4791c5b1debd3dbd3f28ece763d70b29491cb2df12804350d99aa25358c5b29cb24506581ad2d6d99df27ac29f32132f1cf7fcce522d7f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b