Analysis
-
max time kernel
68s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 09:31
Static task
static1
Behavioral task
behavioral1
Sample
cf3ae27bac673ede29cf786e2bf13277_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf3ae27bac673ede29cf786e2bf13277_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf3ae27bac673ede29cf786e2bf13277_JaffaCakes118.html
-
Size
969B
-
MD5
cf3ae27bac673ede29cf786e2bf13277
-
SHA1
ef9ca9773256b10cd5e5a94426d98a6d057fc835
-
SHA256
9fe5d23ca101756404b5b2fadd802dd737df5c9dc1b6bf4d27fedb398fc4ab04
-
SHA512
8d625ce94e98f44d4477e5dd6c3424b79878a0841d7ef3624128d41b4da8efec42a07774825e0fb0bde41e50d085655582ac8943286482258c9f2fab3ec6c7d6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D7714CD1-6C32-11EF-A6BB-F2DF7204BD4F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000de8fe758587eda61f6f7dbba4d0bf076f3418efd7bf763aab2214960bc7493b7000000000e800000000200002000000060b9c0bf818e87a868310a07e1836930c2cf196bb5b9254d4cf1b660c75611132000000053ec23ea2ada49e90de69758ebf28bb724707cf8acef70ba5d4470181248dd6540000000a2a878d2d7e782d867b97e4570bd7ab075cfe3cfb2fa3e97ee2c7d88a903c1528693d3a06643c279e808dc136dde99d2a32d0fbf847e843d496173a17cf97368 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 803266ac3f00db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431776978" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 iexplore.exe 2180 iexplore.exe 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2240 2180 iexplore.exe 29 PID 2180 wrote to memory of 2240 2180 iexplore.exe 29 PID 2180 wrote to memory of 2240 2180 iexplore.exe 29 PID 2180 wrote to memory of 2240 2180 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cf3ae27bac673ede29cf786e2bf13277_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592dcf719d08d170de3aa8a2f04c47817
SHA1aaa570f4d461fa8397a424e25d53b3d89dbce16d
SHA2566fa217de6309c1f893fac866c1e9b87e0e76e5b4317beb35ab3bb48654505db1
SHA5125ee098eef6d44f5e60a1afe3ff0e14f81e67a8ecb7826f285ec7fc73e854d889ebf55283dff1a37235fe09055b08ee00ea74f9cff7fb855c24c59b1be211f364
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516552c054c64d904cbde535bff9f842b
SHA1eeabec9c8cb9e3b66ecaaa91c633bcb9ee0a3099
SHA256399efc37204f751e1109c7cf635aca255d6525f79923efbd4eb3cf6b5c6d0c3d
SHA5128805366d135a230c7a0c84d454b20fe3fad49268401e299e7b78f7b3a0f29a6c83bee51de0f3e730909ebc618ac717b193cf9ad90a0322199a6d9755f3b28143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d65780347706c093bc513e6406cb7c33
SHA18f6a686f7dde3370a349a3596a4a6d1710cb314b
SHA256d166feae2cf56d0a892f51b8cab678da521053c2079d88f08409b648238a6995
SHA51215da1558e916fe2156c5d10af205474112109459a53388861b552fef20b7ea10b380d9de95b4a9ff129c81574de74ef9ff23e808f9364515db817fcfcf50e023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587f4d2a70d32f3fe8d53625e78c4d7c5
SHA1968dbfa6e354ce20ab09d58119b814ae1c5f59af
SHA2561efee4bcf7006cd8e7da4a75ea775bccec2573bbf812c2ca776a00113778bb32
SHA5127a3e33b7ca8a1b70e75a28eaa23d2b91ae08cb23c4109647059e0501844aeb01d32c33d37f82807529a48aa1ba8863095de286956e11d4fece953c73e2875dbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccd5056184379a3e0910cb496224add3
SHA15bc1f53ef74da6946b73893a535a5e09f2d0cf02
SHA25694f02bd03c12e67de7c18d64cd58a7ef7704ddf3fc7d17984e933785e4a79464
SHA5129265c371e9b41e6238e162727f62addbff4184560525f0623f6e2b376b5929d40b634060d5f3966cc07ea79291803c3901c3058255c644d25fd44166bdac0807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5481be227ec2466978bdc3dc830d504d0
SHA12152676bb9dcb0ffe86d0c6f57b8c15d86d2af9a
SHA2567929bf8efe0d2833d03b7488b7c6fff4b50ef694e631e6b6b6eb173fb5d714f2
SHA512d8357cd54f4c41c33eb3b898cb6e6d7be9b9ef5797b154db88ff9bc8aa5ff3f009c9d1d0718630d2d88458805d15a7a685d1275f7a8d103a41acf04ae6661e68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cd9df0884c16a0c9ca22c7fe73c8e98
SHA1ef1aa29d96a209702734242beffe1e6772b311ec
SHA256c8a5ad838cb66428def1364238f307a63634e498846cca9b8ca5f7b2562020cb
SHA512bdea42d26f5cef7896dd2d29576ce3fc58ba6c8ae620a4dd605455fa29fe97041b021ef7bdb2e2b9896a2ba465f7985205ef15081fd85135279ea1f866287449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5752898fb6dace51f596344b4ac69c71f
SHA163d148147833fed3a79ff34413238ceddb84e804
SHA256727db74830bc5295e85e44dac7f694979767c0802cc7679a647cec4df2f39f2c
SHA5120e46f37bb3ec0d63839c1c6bc147257e4f78cd0a539599d22a2a98ba11df0f1fb2ad1bda1e4261b7881be4eb1c9123d5c26e6cd4982c394633b61075d8ed9eca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5960851f86469bd5d70600ee9ccacb042
SHA197727df3ab42c35a50c6d14c1d3c9e25a430978f
SHA25681c9639c87ed1fb62379abec7f64d0f69510d4a6a3086598db9bf4a0ec95b01a
SHA512f825a864dddf7647b22aade68ba8ca0b31c9954c1ebda85eaf801d520462fe24fd5f11d2ec6e93605441ad93d6859764b767f84f2e48efb4ac47746d6eeb26cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510cc5e3c41bebe4a711075f2230ad1b7
SHA1436a428debb79688d68cd912b81c011ec158f624
SHA256535ab86d4d8b92266cb4c67bc0bc874aaad3939546a81fc4057cfff7716ece6f
SHA5120305fa5e6b19af2e7d6ee681312a617157dd223083e514458f2978ce5b8a78d23e25db65fba81e64e6a47802d89b3b56a9b7e82694c7cd596d59245799ae69ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545abdec1fa74b846256e4e585306e12f
SHA1816f4a9d20ad7eaa964fa564cacb8e5379ea24c9
SHA256d64da79260cf6e8a62efa672d637d6e2163ca7de9112a9bf7fa7b9097d87a114
SHA5120095be2a88f8efd19b2c6a8559de8267951470c21bbbca3fd684f6a61babd8da969132e910465083dfdca81624f0e52a0b5d6736cc52461982c6378b895f2f5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5711dab3d6b6799d627b75ecb3f7e9a20
SHA117919faf8cee1c42076326f8ec8a6234d23329b2
SHA25671db06679820529a73985fcbf50abafa798862cbcdc502fd4b20ca48362754c7
SHA512a9f7df9bc26444974489e87d89888fec6a048ee9cb4584ab1448b46ad77603f77d21c13431ee77d9fad37bbe12982f62482998caf5aa1d140f049b215c02987a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ca13f338f653908a6514aa62ea08c02
SHA17e359c0a5ba6916118ddaf1bd831be0f2efab7b6
SHA2563c5244ff592963eb466748d7b9d2b3e7ef244cfce32bc45229e9a6ff304c249b
SHA5128ac699376a0c2c3d3c44969486d7bda9394eefda537f50c4933fe60dc4f350382ec869635796bb96d75208bcfeb5578eaf3ae29c480c9805d1e088fbc4fa6da1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55746ce21381e9f24b075db8b33ad4fce
SHA18e3998d70856892ac8d18ea79c90955e3ec62847
SHA256eabf2830328f95cd0017129cc78d28fd9f17badc3bcb4213c50b3654d7e70d06
SHA512c84d6ebbe233df1218be417a3e05d23c7d5dde79ce4e4010083735db4cbd739c374d0290c77c78ff7f6342755ced379ed2ba798b908668f97da5aaa69c13a3d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e0f84d0fd6ecee846b453b9521d43e1
SHA1a896e5bcdc2364dff888edaedda6fd0c9ad99e24
SHA25601daab9fd17e983a83419fc2f38a434ca64aa7df6ea7eaae97189ed8ccdeed48
SHA51268ea84c73288a141d1a0a2f8fef69415ddcbd3e3d2faef790ebac867062ed202de406380d9d5ae1515bbdc200810c1636b2776924c0197503e0d2f0594ba7c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f342f5df83795b723542bc1500b08ae
SHA11b309319013643e3fbbe9d9565a70886d3a3c443
SHA2566bd9ab919604315d39edf3bf0ead8aa89d977410291076ff608c1e0452276486
SHA512c16a32b29db3d59a2b6d3f135547991590c70af72b2167c7e08c838f9c77808b84bd8c8e12bf127d3e17da0fe45993c2cf3a31a1f3914beceae66012c3572ed8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f14297c9fcb98c9bef4535bb55f8a408
SHA187ce521a91cd65d730528c414d7441b0092b5c6d
SHA256b1e962a9bbb8f553379a1e77259134cd91bf3512018bd1bb7bfd1e8edc53d281
SHA512fcba3f365ffc9344cbd2a09f20e80fd382256743221adb64efa5793d8a7fa6b0280ebebb5a6ce2e305cacdce2dee8ba6f3c9e0f96af4943282b950e48bb40558
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5692a2d5de2e52b2317856a6c34f4d9f9
SHA18dc6693567bf12edf07208433d493c7e6c15b803
SHA256a69ef053c70d26fdea94712aee234e9d18ce54525deb6ad51e25eeb96a8e0f6e
SHA512efc937efa399faa541e0ee613b2086afa96366d3942dcfa0426bc2da42718e39a79d4bf3faed2a3681f7e74ca24f76110ab07e6326a1b22c8e3071378f10636b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51afe81ffadf035c8462554c7f56ac1ba
SHA1bcba7d24a95fc3dbbf572c93faafa9f427051186
SHA256c19c84aa2c3def11d99d2bc03eb58f5edaecf8cb599a5ae92df33dd9f5152c82
SHA512e684226888f511dfa2ac8f38b85798c15c6ea3e67440074a798811ef041150ee53154072cd6ff481df2ae4b66d285a111e51bf616619a22fa320fbb79544c72e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b