Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 08:03
Static task
static1
Behavioral task
behavioral1
Sample
cf113c8f554206024302421911cdf618_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf113c8f554206024302421911cdf618_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf113c8f554206024302421911cdf618_JaffaCakes118.html
-
Size
6KB
-
MD5
cf113c8f554206024302421911cdf618
-
SHA1
98ba551debd1382de08e52559365ea06d3b8605a
-
SHA256
d34191c84dee1836329cd78779d8b14bd0c0710f5e8019d85d293acb77c816af
-
SHA512
1aa347c76799bb5ed0ec78be6ba65213cfdb84cbd893837abe0e901829b9a3c799fbee37e894805cfc9ce82b33d9b87398c5722c6a48daa497e42e91430b4277
-
SSDEEP
96:uzVs+ux7UYLLY1k9o84d12ef7CSTU1ZcEZ7ru7f:csz7UYAYS/Yb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431771685" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000f0daadea23c6fbc48bae430bc58cda33b9adc9ac760e2aa57fa1fae779ed595b000000000e80000000020000200000005fcee2f3a1d8c6c57d0175b29a0356b0b240d4ba64bbd4170689431b582dd108200000004934b963697dfeb709bc8e493088e096f4d0f3384a867f502828da4dd16ecad040000000c9a11e775885d0ba58dbfb4ecaf2a04ed9cc7c34c3250d8d7ddad21e4f690aa316b8cbff952bb7308cf2250fdfb5fb5f076df03230ff7027ee771411eb757735 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 809fe75b3300db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{855405C1-6C26-11EF-8320-E61828AB23DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1832 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1832 iexplore.exe 1832 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1832 wrote to memory of 2560 1832 iexplore.exe 30 PID 1832 wrote to memory of 2560 1832 iexplore.exe 30 PID 1832 wrote to memory of 2560 1832 iexplore.exe 30 PID 1832 wrote to memory of 2560 1832 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cf113c8f554206024302421911cdf618_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1832 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca232f4d30f29ba0ae0733cdcda06174
SHA1827cbeffc55e4f63989c6204024e56b93ad7ba19
SHA2560650321dbac984db7cd62cc0849f8d1a89490a0ae330afeba0ac12aa7aa130c4
SHA512732a12e55780cdd65e754ad007c04298d925863bf469e3ca8d6b94ddb4abf92612d1cccdaeafaf08f4ceceba4438e3677761eb1995b885297d80c6125e7001ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dead0f5ba1ae2c36bb0d6134ce51f31
SHA1dc5cece8834bc204e93d2d38d750bcd1b50b65f0
SHA2562d958c8112364d80acfecc282d46dfce604d418c3474c230a4d134e6d48d33df
SHA512e114f48cb52e6aad89ec5adbd85056407dc475ac98a0ebb76c34716fae827b3d15430df4686d3f5e9b6f6f5f18790f2a5b625f328aec2f54bde7dc2239fe6d89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e57ebd32e6d8d23f093ab81f7843d7b
SHA1a1861efdf2108ee30b3f63d4070575839d49dddd
SHA2567071d4e74336b371e9d5e1335bfbcf2165df8088c134082fdc9531df1c1f4511
SHA5123c984a543cff58024e1a1ee2ca4f368b98b6cb19eccdab9ff35ec587e79df67531a17c4bfd83ba88e673723b30b21ffd325bc6270e30722b5b38551140eac9ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a36400ae4ee86c7f8e201658a036084e
SHA1cb8f664e89e308a5b9aa16297bea502067f2c1be
SHA256d65b97f542cb25424eb9041a7e6e5c85259cbc59e34b9550e3827752097a429c
SHA5122bffadc769ba62ba961e26b24671f129b4db5a61abe42aac47a5138a08b5e77fe6a4c8a1609eb50581e8f563942005fecaed49e224dfd46cfbad701f35de7ac8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5994bcccfb7485eafc24efa95e19f12f1
SHA1b0bd6052b2ea28346f0f8cbd1eb72c49a4c26ac8
SHA256c0c25411bcdfff92cbd54a9cb9bf3f9af4a97735bcec8140fc29a5dce68c1417
SHA5126b9575f3b70392ee4a63202939c15cdf3ccb182b060ddc7655e57bc3e151339e65cb8354a03db3db173c4603c1ac2af7fd43d862d0534f11fcb6d61ac7c438f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cefc6838545407c4d496a694c08abca
SHA1f9cf274b6063d97fd69d337dbca1746e2dcc38fa
SHA256a7dd8eb51c191bca86cda3d402373806a9116d3fccb026f7cda8aa267518a7a9
SHA5122654b81130f0fc72c1bc04f370e90770e4a7d120113b2da82c32d70be84925040c1a90d9ac15eed74bb04759649b735d94753b2772dfe825979814d318333e71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59620dd9f71090f341390596df875f497
SHA1c3780faab0d40c2ec47382f62d9a379434a853ca
SHA256ff3346ea938be9dc25aceac14e1f09fe215296d77bd4b5d34d03bfec2306b2c7
SHA512ef7621f72de04281bbee7cec66cea36784ac783da5f38d3a87bb17830599303cd5918829da07d1d0922792b6aa7d40f2f87f3c842228aa51a78e3c4f3dac503e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a89588a124130c944af1da639e5b02d3
SHA1f56aa30f6aaddbcc904e4467213b3150aef6bbb9
SHA2565e5ae5a50c62a228f622aedcb948ab32acc113563cbcc52e61581bdcc1186615
SHA51214e84d9c8fc1f8f149e80fc633bce1018249e7e87fccb02ba1b621b78927d127a07b57af73474c815056a2231a4e7ae5364f41414c5d99a1ce8fdbcc4d891c5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e461c1989864e1c740b17b1b87d3c97
SHA154673bb74f19902496626366f395e83b47b10e92
SHA2565715ee7a3e7e39e1fee9e7b1476574cf460ed4807cf22d52a075a79c15182b8d
SHA512ebc4747dd89d6cc5b9a2142e0312fd0f92e9ecf17bb97a26a4b9f62f6be364b274c0e9b8ece80f0f7e3aa1626770214d224565cd953c239bd5540567aaa02969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55225dbf959c59459bc175197dd8f23f0
SHA1ad7c3d5077d92f9abb3bc2910886396a807be642
SHA256604b74eda495437b14248401ae330951906cea22389197110fe0e07b1ff50400
SHA51291ffca292132ba87b10e6ad0029c461aca02370774d5649cb17b9f28b11157afb51bb959361f0d54dd40509178734ca4e3430c60834bd2d4fe2d5070c39e6e13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e7b123257f59e65a2dd8844221b7c4a
SHA10899fe942c27f5749b368268e8fb8c1dd935a4fe
SHA256dec0894ae52eeb4e1c932efb360f306516c7e4b2287d8d66d327e47f2d6b0ae3
SHA512e65322d412123d7e66b0fcaa52f729bf559c00e6b5bbf51a636a31cf0b4c4ff6ce8d6f405ff52e81be2958f96d569599841ef4778faad811031a33c2ba09f824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed02a6e0717edd7ca2aaaac88a9afc4c
SHA1bfceb3bfa33060fd6d8f08e3ed044d2d5ea7e40b
SHA25647ffae5a9768824893f8924a3e6a58a73080071b0a08ec7bb078d71d0c9ab939
SHA512b026fd21713439f4ccccca15ffc571d77b43d5a746f62c1cd0a4b265e9aa994f9cde1738e5fad5b6dc66143aa7bffb718f96542be8fa27ad52ab7a39ec43f7e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548441aa9821a085bbfff7c8f9a86551c
SHA192bc8619ad0b1338fb6752a96d272f2cdc49b1d8
SHA2562afeb898edbe2e8f43d4092178f5c27a3cf531005baa4335d4b179ac0b63769d
SHA512d88de251b5fc36df5df51f8e378123916640e559963e996cbad23a92660d26dc656ff393ffaddc0cc7d477573d1f9f20e3f6ebc12222ac46705ca2bab3b0dce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e41d00792b483a2dfa9e006dff94e893
SHA1032e8b0c7c2ba4f2cefb304b6d6273cd107a1b79
SHA256b772347bbf544706bd9170d753d15923929840476dab46f392c4f5dcbb819b82
SHA512d7ab3b1aa072f98a105fc8ac0bd6e1177846803db6fa88e0dc1c1bf85e6b640e6003bc27b16b2e8790511482b77b0f7444d2bcf0b499a639aa7bb286d5129184
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540e1dd6876050cfa26ef13b4d9588379
SHA1f07241c57084f0bdc7042eba1cfa4fa5fed2abe6
SHA2561f6faf5d2a2b41d3e0d600e6a24c367a672fff3156a31c6b62f2aee1abd6a59b
SHA512977e65ff0566073428234650d7893957f5228463a39ebc32be6a5901d430251aea3fa467b470838cec5fe78db7cf0990b2948988b863111f7a6f83fee8f7a06e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba5c1624a8567cb4e42de584f5fd2d60
SHA17526d31735beea6fe0e954235df60228ef0ac87f
SHA256064e3bcc51e75f64432ece8e775f4c6a62c3cd760951ec7ef9b95596a6ba85c7
SHA5128882d2bb791dbc650313835233edeb82514b3f26d92ea4aa2ff6c62e273f54f8fc214253ce5d41ca6153aca8905656a9b62d77fb37307822890ff8964639cbaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc244e15a456589577d32b7b088fba4a
SHA119bdbc27a44a1cb171fc983a7eab21ef0c2d5a3c
SHA256ace1388eea0f4085eed12b9e19ca662aa0bf954028039332214677badb8f5aea
SHA5126553fc41191cfa8036477c239db7626ced1ab87cfad125e2236f50886143ab908b2dbb04903d43e94b4853f9b83eff4dc30f9bbc662387a7d5e5e426ff463867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504686e83c2c96839416033a50769a210
SHA1cf55a845c3ffa4a2a2d6f25b9db4d6d2d5d661ae
SHA256d0242f1ec20b33980d90cddf92dfd1afdc35f8f3d3351266f8414538842f01d4
SHA51261ffec4fd779a4f7b8770270a17e74201562c8e82ed8ef4124242f654e87450c148721f2f43616619da83329f1f3bbc0369080999e5a1e7806572d1d771da4a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513c7077dac9697349f2eb4031f72f63e
SHA10fe88c0b8a8b912bc7ff1b74890a70b90a02d13f
SHA256f71cfe731a73b05abe7070ba522b86c048fdf6aab101401f097b4c13a953d2bf
SHA5122140e5a355b7700262f74d1e54e1d5edb0c28cf6fcc8b89d73fafcdb35aa7b306b4593c46684e142ba921d33ae177de4e106af3d0e063b62ffc8ee2168845c0a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b