Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 09:57
Static task
static1
Behavioral task
behavioral1
Sample
cf472f5459b5e1d7c6c2cfcb9bb06846_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf472f5459b5e1d7c6c2cfcb9bb06846_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf472f5459b5e1d7c6c2cfcb9bb06846_JaffaCakes118.html
-
Size
12KB
-
MD5
cf472f5459b5e1d7c6c2cfcb9bb06846
-
SHA1
234b900c69b42c01e71f1f01035fdf01dbd8b517
-
SHA256
3038d349d184e6037705117caa9fe9b21341707b559e38350e97cf4b35feba9b
-
SHA512
d4391ad1613b07341d4655c858486f5e6df05807661f95aa956103e369fc22ff639844f4d71a2e38d6ecc2030db36d30f304e5947ba16dd28e546ad96d8ab0e0
-
SSDEEP
384:TERsDyc9Gu5GbpGIzrR9qMnJKM/PTeqmn/VV:TE2DXYQG1GIfRQMnAGTe7/v
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c033fe3d4300db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431778502" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000052cb2496e50993713d91989594639ed10cc8a4262aac467eacb781f401743817000000000e80000000020000200000003f44e402d5a806d15ecb46f5d69c38994469bab106c93d3a815f35433bb7bd99200000005c683c4c234f2497b3db34c733936379e7e502ff4270275d098cadabbdf74bd4400000006b37c029b898f8e0709779bf088eeb030068e08564a8e072547dbc090dc2fcece3aa1a12bdb7803a1e3a6fa706f0a3a23d2dff9582bab6f522a10f887602b926 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{65301B21-6C36-11EF-A7A5-465533733A50} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1872 iexplore.exe 1872 iexplore.exe 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE 1800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1872 wrote to memory of 1800 1872 iexplore.exe 30 PID 1872 wrote to memory of 1800 1872 iexplore.exe 30 PID 1872 wrote to memory of 1800 1872 iexplore.exe 30 PID 1872 wrote to memory of 1800 1872 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cf472f5459b5e1d7c6c2cfcb9bb06846_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1872 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d0d81b4ebbcd2c270d8d536215bf1cd
SHA1f21f2b0ec7a8d4396b141fd47b5c922cace6ac33
SHA256f753cc71a718fa8b85b996b785d270a421229d78c0aa66ddb55be0f5134e8550
SHA512de04c1a770774af3c68d041248765740cd9a24e0872d32375530a5d6c2819522d0471a098c2060a2f525981e6dabe13eb2becfb6221faece4f347b0d1318055e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fbc9fdd9f13e82e064abe567b6fda55
SHA188ad8c0f4d00c6a4e95c24975ef72742f3bb7f62
SHA256f7512affdc45ff07c345eb311f349774feed2f998c6796efafed775814f0f7eb
SHA51244ce4431440f5e9862c4e068593cdb1180141900debef5d646795ef9da915a3448b5e480508831dff947aeba634faf53819be7e7ebb79c6591b160a1750bdb34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1e6c922e8b452bb80c7e8a7c374452d
SHA1daab83cb408dbc5f4216fc1582815c24b0eae370
SHA2561d6113a9ffb3793f026a8896668ce62bcca232354ee45a8a958c0845131bc178
SHA51217b5c3a3e79c5b0be249a49fc8d13fae92f44adc5af075357d43f9cab86ee2107466663535c329dc8dbcebae25e9cf35dcfe37ef7a57502eb17f730c4b302ef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5541de992fe3650f8c7c3ecd161ba9325
SHA1a29c513566b97c2b93c129f88911d24401a3ef76
SHA256fe0ce29e425ba8b69f23d5fcb9475d47c685087c8b081feb72d6d68cbde0a076
SHA5126ecd0375c5adc63bd28f9f386921681057dacc1279243ae6ba171b7e30a486a7bd4451c12d4d1afcb6dd5b27ce092f2f33390c8bc266b0856ffdfd006811d524
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df818a0c0cda408b6988a5184625a038
SHA174d6624ec63e1813c4bf66e2dd84e11e01bbfbe8
SHA2569796ffbb1d64785acf8f58aa73669e33f7b436884d30ac353bd1a0923d60bed3
SHA5124556c4a44d7bf995e410cc6d865490182d9939335df1e05444fe4340e4ffe141cfcfc5ca03c2ea9b838720fba7833b0ab42c91f683b850f7a4cf77739e8e0c58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5683a6bd0d2cfeeac875ff25d577cce51
SHA1aa680f0c9ae96e173f2fc3bcf7dc997ea661292a
SHA256dd0252dd66a46f8b3f07c39ad34fa70bae04a3dc59e59928729407f71ab863a3
SHA51293cc8424874a606a361e33c624148ecbe3789b87a908cb5403d31630afe080df0dc31501e589e52eccbd5c809c3b9194389e9725151a45157d282b2419dfdd68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509775437b1b145d0fe1101cdb5cfcdf7
SHA1c64e341313059fed82936a45840ba62731470823
SHA25612e2a6fd0072646de35a165aa14b86f747d59a13272304b47286f7476efd9dd0
SHA512d605cd3429231467a84e6742299f8cfa0576cf32e5eaef3c19a29706395da1fbd3bcaa429d22ffd79118de25605c8fa12a54b8e1e735fb31f62cad1698697712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fa57b48b6daaa105971b973c470b351
SHA183808c62388cbfcb4b1cbf6a93c0b9708f040356
SHA256256d38e0c365df15baf76979ce2bfd7e81111d0ba0c7a4e9490863c7a03ec8d6
SHA5124d5f6fb12b90f5de7e1fcc342c3348c6ad8655038ca90b6948eb62f3076543c0a2e65ba38866fbae25150ecd914f2f55eeff43e66ad6c1d8dd45f780535d9b38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56288367ddd7aa1329b93f0a64c84eec2
SHA16353022ee3777d82283a3fd266230ab16f44dd3d
SHA2560baa5745f49f050379012290bcf1d7937b94f257d5920a697f08cfaaf2bad5be
SHA5120d3dd832634c496536a78c150dae3dae973407f2137490ee6dadb08423336757c0d3f02063aea15d4e187440b21151588774495dc370c48e8eaab0327c7d658f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56efeb738393cecda0be660d5b45488b4
SHA13fb431258deee9dffa7fea293586a5f7d5a15ea1
SHA256c19198752460c18745d0eb49b3ce19ac8d15dbacf453a9abf363ab89f0b2392e
SHA512be6188db7e97785f8562136e28fbd1980daa1222ec172ed82daa97482f0b880ee15a0a80ee505f0e923e4be55a2cb6e23fb16c958bbf2169f2c70ac8678855b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faa3f17bcb7514adf9311b4b2df0bae0
SHA1aa09d3b1f025b38837f7e49a8df548c0a82a4635
SHA256819caac07377eb1f89d10ed84d7155ab6a2abc318bda6c2868ca5abfb36e225b
SHA51237f3af5e1c31319232041610c288917da018fa7c502198e39e8153861f79b874851b5ec0593607f575c68702cecf2a6476b22913e39d0a62d06f9c5c263ee82f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b3052149e9750ba92dd0a2761d67853
SHA102c96cc825ca58bfad6c90eaff59eb802e91b0d7
SHA256be90e09f27a895a76e25f060ea9924de7dbde26209a0b12f371c64f1282eb2ac
SHA5123687c132e2724aecccad66bff2c06d0149aa7d1d3fa6347235cf8d3e4f350b963c966b1cb896f5f3e197a495ef3d2b2388c28dc6051d270d0de82dc51be9bde1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523aeeb7e3c4bd26002e1b7f6f7cb0004
SHA1a7cea9b7f395c8fb7ac47a72cf1b81a318481f6d
SHA2562fcb9965c7e940bb41d74d8759fc7cb82f14ec4096d2fa20a043e0a2cb8d6c13
SHA5129b009233a732f0b205f81cd919bf862b6f218de77ada7ac1c8463b461736af7b5b122643960317f354cc0af5bcdee7dced46f9fcef14c5b594bb099c66837199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b59d4790a0663945e5221a57cfab0323
SHA1aa12d244ff72b4545c48541d1e57ae24a0f15f04
SHA2562f0e4a02dcd0f29e50f7b88c2aa405a67da86bc537b276803fc5a841c08a38d5
SHA512b3760fe8a0e4b75a282695525b87ec2c7948a769cd78fef3e7776e23ba40dbd14cc4a387a21e0f7891f75c684fdccbe67732c4b9da17b8a76ab2816f9e16208a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb742a261c1afadbf6f213fb400c10bd
SHA1b23d5520dbe1f7a34494d9102fda5871c99f7d7a
SHA25605762f556a74bdc21f7a8ed57477a82bfef87b867a83d6d30529f675014cc54f
SHA512c41b9d9d4eb47763f6da7dfbb900d2e951b7158e17ec6285b230780beec79034ae6354807a095f1cf93dbb364a96d12c975a9c3f566cfa38df977b83e10c6917
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574b38f4fe9e1a56ef6287fb89df3bcf6
SHA194f4411817a30f908314af5c831f976879d4afeb
SHA256eb81137dfbb29b08a6c7a88c07c4831143eb3fbb0a31bc1d30f2ce078dae0610
SHA512e8295e816181fa8fa56744ff6146369bce7881cf5ba1b0b0e026f2f885b9d811692dfb1ff4892de59c67f93b2ef830feff1f977d14a9eb1999d434a1094a02a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3409bd99e25c8ca6a66d0e794992f5e
SHA199804a0c360b87e8564939c89075c1e845149e86
SHA25651d76f7fd76eb51643f16a9e34e7d84b6ef4e6330cf88882882958eb7ea67ac8
SHA5129014b1b22ecbe5d774d0dbb89fbd266c1ae81ac0db9cb5146cd46881cc803c6b92b1dcb996e171b633e15fd10767dee6ed0c187f3e60447ce7b19259f76efd7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5768959c463c7efe6a43d5f1c465339de
SHA19cf9297ab7a7d3e117c5a88051909fe954752a87
SHA256b55799e6b250778fe04fd05b0eb90b89b361a7f32ebd4ff407888cbcc9637f57
SHA51219e1342a4e8d9e5ae9a6a729a57967bb56dd9da4e53eb4913f00cd08ce7f3494594d5ccb56314f7acd6596fc6b83a6ace456166151c3a80c3c4936f42553ae71
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b