Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 09:50
Static task
static1
Behavioral task
behavioral1
Sample
cf444b88137de5507ea88fefb9f1f101_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf444b88137de5507ea88fefb9f1f101_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf444b88137de5507ea88fefb9f1f101_JaffaCakes118.html
-
Size
9KB
-
MD5
cf444b88137de5507ea88fefb9f1f101
-
SHA1
e5a849ff7e6d28a5a9747096c4d2bd73175a9a40
-
SHA256
9582fd7c189727c51e56d340478f38a7bf6eecb40472b41e987b852dbdceb95f
-
SHA512
7004e1ffce6aaa660e435512e0abd368c38593623cd561c7dd1e708219926363b7182c3061cef4f9b666abf8ad746eaa3ecb9c9f51fc27179febff80f13e2ef3
-
SSDEEP
96:uzVs+ux7Q6LLY1k9o84d12ef7CSTU7GT/kPs1pUlVHcEZ7ru7f:csz7Q6AYS/CUUPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9006ab3a4200db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000090efd63aed228fab7ebc6b615427e3ba245d502ca31246e8e93858624ce1c4ca000000000e8000000002000020000000dd1c5e92af9d6fcf649c05141041bedc365c2bedefc423c4858c3a9f31f2898920000000d3534a3c6fa148e1389e9dc3c03881eb9a64e22fe15052a3673b6df88b386b3f40000000adb57cf646d3fcdeb8398ac7694c236568e28fb02eaea08c3df0e426613d282868c4e21a9edf0f9de111e5dc86e5140d69f3db9a67ad9b916e02d2010b0062c5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431778071" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{64452BC1-6C35-11EF-AB7C-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2512 iexplore.exe 2512 iexplore.exe 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2328 2512 iexplore.exe 30 PID 2512 wrote to memory of 2328 2512 iexplore.exe 30 PID 2512 wrote to memory of 2328 2512 iexplore.exe 30 PID 2512 wrote to memory of 2328 2512 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cf444b88137de5507ea88fefb9f1f101_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d921e2f1083ffc9f9f6be924fd56879
SHA1fd0db1a7f4ffc1f2c44ea19d4f5b3c7747c6ff5c
SHA25693d139bb2dd5f8e6107044fa172b7d759ceb4284b1cf8d523ea7b2a860d86a46
SHA51228f3b952a8b741039132cc7aa0ec0e7582b312727a695fb3fabaf1e739921e605f890883097341fb2ac952fbc366aabfc1e9f2f681a8a9333086197d59ed0ea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5722e0d61cb04cc58193e407879194823
SHA1330a0da2c784b88bc7b9c4718ab6feb82b7e52ac
SHA2560aa066bfe1316603aa9c6f7a3fe7594f1569dc54d774855293fcb6993de37f0b
SHA5129431e4055c3e03fdad8447c801394280c82c15dc1a37f0c89315ab1e24bfa3557b3947197271f75b88325c78d940be6f44c5af2fe88f2b766a2c33827e939780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564ac56b9990cdad9bd50c8aa61d06475
SHA1243dab8af3ce2812bf9e4bfba33c17345cd28de0
SHA256a230fea55d07de9cd50b6fddcdf7136a25af2f92e8decb9bc84b04f735ccb98f
SHA5124bde3ed364094226f7b3bac7b98c99e7f9a2ca028b073a7e95843d940ae3ef7a9310f1a7d2c0fdbecf2ceba073a93b4ec2b53d278b80cdd77711b3eca71623da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535c1406c3d0ce34182b0274e8553a25f
SHA1798d1eca2460882793ee279ef8214631a5723529
SHA256a4fcec64a32e7fa2f2f36219488491d4c9107813e9996c511768775e6c2896d1
SHA512fdce04b9d98cdec76a325ccb903db2877b1d4cac6e3bf7991ac5bc3ab2bef1561a5929b189bc29fa85223ca188ba03ad2c8f46b939d4639b802258806310aa3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b46acbeff4256a453f72a6735070dff4
SHA150d75d92e6ee02f395f04db322d2df1f27b3bd6a
SHA256e8455bb2a1e62b7264b33eeb017501ccd645960a5af86015dc8cf768f537a6a8
SHA512879408a355bf519c7b0c9596ab3d1bc9e6eb8043c9f2baca2fee9762a842d98aea1f65fffdc345f2867307e6478782801369dd8f87152dfc162f75c011c73e88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac3957b167fea51504da1caeb1da1f4c
SHA178be79b3e7a92d4ee671433699ba146c9db600cc
SHA2568bab984216acb2fdd45fe64a01e2b389a5604f8bf7310bd8b770f18a71169c0d
SHA51275a6a9f44091295ff63542f2a7f9fdd246728972654a2ea7b66c2beb7bb87d784861aeb76c465b793e48bc9cb04c72726109d8f7e668fcbffc64eb91352cb766
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bb4736a6cf08a8aa484fcaaa8ab24ae
SHA121e75bc0b6fa41b09ba052e244b19b2362e8a54e
SHA256f31dc6f9e3ed9c57648eae53583e5d93ce84dd6b09f29e98e1905d52a3236aff
SHA512e6d2a6ea81c860277f6f731910036a4c19a063054a0000869ec9bc509b9434ed1628cfa907cab659f22ef3aa4daa0a308b81ef91446d200ef334cf5546236cf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54014c66fb3e917dd9652de99191cc4d4
SHA185bc265e1b76434682ce5c7e1af358066d6b020b
SHA256fb0d2234a4a955ec44b16f6b16dd7ca2760255f72cb677e1822ee6ecbe498e69
SHA512e91f14cd73536a1add89c18aabeefadc48dbd58e373eb7c9c5d9079da55e5d3d7c854d7cee4a87943cad05614c9ec7566d9c949c6d3ddc8ef6ac56447574d1cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e27a723d0954dbd6a2eb880d7f754eaa
SHA119f5fd91c394c512d9d0416ffdacb3d5f9a4dffc
SHA256c3fcd8032ea893077bd284c7430abdf844743d64715bfadc6f9033a707529b17
SHA512862960c1b11391709cd05009ef174070aa86c5eb6c98e1a91f84072c5c4c8a20bc6ede7ec1ab6e011fdbf61594e043acb75993c859496ec049183f81240c9cb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f7372a46d7dc692366d33f43ad13eb8
SHA13856bd27d934cc97bce96e75984c01bb275ddc3e
SHA256d91a85ebdac4168164f56adef3276a32b08476c4910f18754e99ec00f7358178
SHA512d0616d8da6e4a537d4c12112dba6ca941e0abdd6b316e42c7c3652cc22545a434c50525bfff255a1f3b89fac19f56d5a21087360f355f1da954058cdef2b5ece
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502f1835cad2a96d2ad71e325517070fa
SHA11ff41f55f874364c65b55c7c94398bd318f6bc87
SHA256717127e40baa4c27f894e7dfd18960dfd41ef30e6b3fdd67bb653289cc79b348
SHA51278448de52422934d91d47168de4eeff3e5a2728157e4c09a28ddc51137265512690c88c6da20c958b4ff80b7411ece223727926b88c926c10b6518bbf07eaf0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c448df6762c656eab1320bcbe1c4df14
SHA10758b1e0a23dd7646405b96ccf50232a003d0ed9
SHA256100967d3692baf1ec6b4ba8e069e9b8393d97a45e42da18cb8d9434428be0a76
SHA512a851b763f11f10dec2455e49daa745cfe8c3a14ce877666638b9d7b8c9141001b019cfb286597838c56448d6e200b6eda8a5e9f983c085c9a1a6e62efc773f0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560a640522887d2f86b49b2ba99720762
SHA1f68fd8fadef36e40431e0d5bfe7f96dc7842d07e
SHA256d444c451233563203471bc02748927cb50632966b06ccc69f11cff038fa1cb66
SHA512b56bc07578181da6268f0823e89e1efa14c0e66b24cb5bf415a2175c799f28b74dfc101bb6466673ab416d214affa9594471eb773c4c999da08e53affc0eeb44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe8beceea87a26a9743ec7461ca016e8
SHA14abc416ece078764952047f4945214f589f87861
SHA2568a0607ff42973d91cc70ccf5b169814831dcfa30486e36b051d479aac8a99fd2
SHA5129ee4ce9a194ef7d23509275fe2cde57b2943eb69fbf64ef47c619f502f20bda34fb3024e9fb4c5c48af00f1e0dfff591b3233d546666c32b2034b30346f4bea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec5bf4d321621fa53427decc3895e0c9
SHA194a8ae033ca98361511da5ce7061165fb189b54d
SHA25625fa254b002929a933f5a4116b2f989444f7af64047b4ab5353781eb760fa7a6
SHA51262181374dc34accc4d5a9670797606c71d8f9f182e8cd5727b27b9dedfd4c268295d5e5989170ce7eb5977ac4524c44895f0ada284e768e0da8a1d533252c26d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a93d2087b0e38a97ee1ffd1083672d4a
SHA12b0419f5fb5156d39461cb7d4eebd94656181610
SHA256f3873a386aafa1c0bc4be4ba3ad93806348f7b9a3a0df14c48ecd671531e904c
SHA51254cba94bf6c4e61a3bebbd21eaabc244a433a649f6a84e872aadc867b3fcbe3186791039926d2f3d4a0822cdbbb099c9a6d8bf591118f7e9111124dbdf1d200e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ee39f3d3f70be9444c167d8fdc10a9d
SHA1c9f75436f332a83f914f87fb4c988d6cca2df926
SHA2563ac33145b12b894e30a4340835103f6ae8069a80e629816b1fb420e92f0fc488
SHA51292eb81ecbb4d59bd88e8af1f86a9849460e69e6dfeb7ac894737d3329bae26c61b2f930923b254dd336085e8bea90192157cc90372aa6f3bbf38540b86f4f6bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa911c4e18f636eb6a67236c98caa9e7
SHA1c2293ff497a0741e11d2d7d1285eae4aab62dc61
SHA25662e91ce017ff0a561f45bf76a147cf37549fd1f107e55aa1ac8e9dabd42244a3
SHA512955feeeb563e0211bfb98cc46354c3cb2152924ae7298e2e94a505de22c1cd181be8944dccf482b5f8491079b9c4d148bb0b655de8f19a17b02988935ffa48c6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b