Analysis
-
max time kernel
133s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 09:57
Static task
static1
Behavioral task
behavioral1
Sample
cf473e54b8aea1c176be1a9a39ec5a22_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf473e54b8aea1c176be1a9a39ec5a22_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf473e54b8aea1c176be1a9a39ec5a22_JaffaCakes118.html
-
Size
2KB
-
MD5
cf473e54b8aea1c176be1a9a39ec5a22
-
SHA1
c2625100288f58088b85c5bce876dbce66e86fc8
-
SHA256
f20aa5f5b0b775a1936ef2646e9586f5cfb297d1b5cf4984c4b5ae1d6a1faf2f
-
SHA512
f7422ac0b6b577064008f6f4e7947caf50e408ed98c5b78ca6d10a546db7815bea9e6b0a9ef39db219ef9f68996c8b70a20783893ee81cb3e12369d940246ee0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431778516" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6CEE6FB1-6C36-11EF-9C86-EA7747D117E6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f00425434300db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000002598f2587208124006b850d59dd7431dd4ed7c86c5bc7c560ae6f6b5e14e8689000000000e8000000002000020000000fe4972b9ee7d1707c30b0ea9eaca40d694c2d944aacfc17e3420d431766ae32b20000000006727950869bba6d22ea12c72b726e6638d987e5970d589cffbcbcf9754a640400000003cd4926814f026cc8f5a2e2721f503339ff72b23e16eda4dc108175b19f5589a9747f58ce3c28223c10f417a9a896465bea2ecdf59db3b299cedc36252c8624a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2436 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2436 iexplore.exe 2436 iexplore.exe 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2396 2436 iexplore.exe 30 PID 2436 wrote to memory of 2396 2436 iexplore.exe 30 PID 2436 wrote to memory of 2396 2436 iexplore.exe 30 PID 2436 wrote to memory of 2396 2436 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cf473e54b8aea1c176be1a9a39ec5a22_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2436 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d6d97522db598cd7e361750e44c25f4
SHA10bb960133fe30dad28da5cfe43b731c16eca83df
SHA25673b1d1fd56c8fd451f56eefa6a0f8d802b5f83b9e0932db3d31bbca73619a42b
SHA512a87348397d1860af96958e5c844e6ff42a84bb6276c3f42af239db265d4bebb68b4a0bdc275382245d8766160ceda5893bf8596f51c497e2f174e7a0f940a561
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557a33955935a43315597829c8a410641
SHA135cb741f61cccc490b709e92e2d37d897b7968c0
SHA256a71365edf1054511aa59e3362324cc0a60ddd8e50ccc4d9cf3a3c97ed53d9118
SHA5129237f80a41259ea955a8e62bc0d6fafa2b23ad3737c6d755352bb7b96df27f343df630b517608642c93f8249f2cddb8c3b766606aa7c9e8112c3717e3d5b7611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6ad6a33d666c98f99994de7f1d6cf92
SHA1a943f954152cc915475eb7ba643b96140ec1f466
SHA256075dc7f11ce5c4cd7f8fc88b7d6fe1940fee5b463ddbab59a488c0b50ddb490a
SHA5128121ca93540637d30e4fa635f82a0eb8c55758137fcb4b71e06b30f9e1717e5c160b94069234a3eaee20d78b835bb3cb43b9ab8c1571085ef9c7c1eac2169f64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c259b58bb0dd0978b3d30be007b1ae3
SHA16e56d9994a28aa5fdd74a85da2fbcfcd55b3bf25
SHA2568f5d0c785eca743a6e7a479493efef3e62a5597b771036d8b63aeda31e73b724
SHA51231504d172398c157b69f025aa5526dc4bdeca852c47aa31f54f58470ebde2815c1bfc282a9fb8b52c0f8d333e1be926d678802b65d83d819805450b16ad756ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2d55277c98fdde746da1ab6d59d9f0f
SHA12dc42e0b9b314415267811d72319fb0f177e4e47
SHA2567cc757dc18bbddae4bfc335fab6a27b5a18d65e8a5caf79770d68e7be145c99d
SHA512ec01a1b2e0303e4396893ed74e5645b13d8269dd0f9ecc777696edfa9b24145d5c2ae592eff4f08fb355b593e295dbf8d640b87a3f72ec5cfa8280668693b2e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51206da8556296b87b7925bbd045b305a
SHA10974a94d14f7562528760a9efe84622576c8db1a
SHA2563d248d0b0f15f06f69204c74a5d44f5d70d2f9b723d1fef26b2a6a3540315cd2
SHA51235d158a19c4e76caeb379b50a0257b628235d4cdbca64ca36fe5c30bf192cfac3a39ea7adcfe884a9083b505b5ae8fd5372d91c135a87a4a9a91079a5cd4508d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b987d91afc3b7351c1fd3e3c04651d22
SHA17c144360945b83108f71f3c54ea5c52954e3efdc
SHA25606f8d79cc4ae713537df6fb4ba3db054a0c66441652f19e6116dc509058e64f1
SHA5123808fbda0bc9ad21825cd6d4a8a5cc8424a06cb27ed2a5e8acad4e1329b74a0fefc3a6e2ffa08d4816d88ce7fa35b9c7bbb8e7f71a74fb8de1044fdb98e7dbb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc25d9ffd1cf5670686a683859b2c6e2
SHA1ca5082dc66200ed38d9168353d4875006dc2483c
SHA2561ca8354e8b59c5d1739fab987ec925ae92be77e4f8aa86a4be0b830cd48bea04
SHA512652e1fbe9fe59f5e35d79a9bcfb35a5585222309847ce073e833713d6345f86c95896e1fca708cdb22b05866f16c0b8a3c4f596360d3fe0545bd297d24cabab0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593d6f2768aceb3c4ea8abf36cf2a6a5e
SHA19bab7f2b739b742da877c70a034ebd84d04e7f1d
SHA25659fee9143f709ce98a29984b5af15bb9d07808e7a4388cf3666cba8c4ed7c6f1
SHA5125cfe07b483deee460b5a3201be86fff3fa748f4911450aca880a123fea9b1e7088ccbe72f52eb8d05597a4a3ddd3b9c51e9e1cda2c26ba4928d375f526e41cc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2e2d612655b0e0a8cc7c1d22d90ef82
SHA10eac7922c47baf2854a34a52d084bdef6660be1c
SHA2560a8c2accd94457b47919e3db6c30c11b10722f9e85114602e21ce11ea7b7ef83
SHA5124614b71353a9bd8bd38fc75f2fecb62cc8105d43b917553969520ab80f0d0ecbf9166611ac66baaa76d5e1114d7ebf4e313f1108e7598194c70a1e0f689d9907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f725974fa082a727110e35c887a2d02
SHA1bb87aa8acd8dda90553474bcd319aa0fcb906b36
SHA2564c5d5695014d46c4419ce614be8c893c58d41c5a7f9e24aa6b18fa5b6de469ec
SHA5128a59d7d70bd3ea44f02e6702a39bf9e77d8b0612e56354fd12bbbc4a00a13d4c4fce706a90b885b1c6ec3f322c4c60c3b1e53c73e25f96c37cf4e0cceb4e64ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575d9580ec57a548961cd752c5215b3ae
SHA1ac02670b796178d70c76d52abddb7e418579d4cd
SHA25614ed9d9ad96964fe776ccdc810feebf310983e164fe5b0ac0fdd812163f8c336
SHA5124e4b847da36429977bd032dff17b6ba1c355804b573a8b8e79ec1a160195767aaba251c805799a501a0369c5ea989000a426bd4e2a3d74eb15e5607108d5eb74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5933a424bae934d74fcb299bc411c71db
SHA1c7749f6addd00a8e0a64cd97841eeae4135e5854
SHA256889e98dbf6e496457ddb8ef9f8bd47ad92ca6c9319530efd1a575b4295d6e794
SHA5128ab0d99b88234fe3d2c9bf649752403e1f5ecd7fa5c7ee3e26a181e3418f169b7dab158b454f40523a141c4c639544caef347c8aab4546da11b4d090b6daedbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a0c0bedbd69a704999cb1ad9fadb008
SHA1c9917106e599a1b4dfb58e6c92bac8b5cc571a20
SHA256a6154cd24e4fe6249bf3a5247d13ea42f4d1b046bd72bdaab7d08cf66f52dc7f
SHA51240911d8ecf42179f8901b01f244e60248afa25a014871b85fc63be172c834866ad322d53b98559eae6002a441ade4b7459f9991d201a63c3e4a28f6c935c8285
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abe7f1b62d821554a5198ff739a33f64
SHA1833290fd8c67cb06ddd06f0524424df7fcc8c046
SHA25656a44bd1b5922c5dec36fc544724e187ae73001c9562b3c71f449f4d520d3b09
SHA5123b107ad576b2fad38c460a6c2407f0c46d7ae17674c9413310735ad979b70e4098527204a0ea2fef30a6f1016fdd19e510a66364012916eac2d1cab40bc0225d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bfd086de00406ba549cce87969fe0c9
SHA1b00949da45849c04a9e08c7a6d71268a2e9022d5
SHA25661c6a2d03e0861ea2361bd1d5ac61f010d047549025f68e3cda9cad015b8e7d0
SHA512fce29b5c27e30c6c0255fcdefba6ff22cb6955197cdd8e8e360f479f4de05106d6d5bc1b897a60a2a5a239619d5d6c851850b57614e52ff731d196776f00bec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f57dba3990480bbe5e10ec79bb9aa90d
SHA1ca6b02a79635bc08ac844f9f1ee7a37270be512c
SHA256158244c78b32acdd8ca70a0fb9d2efd7037fa1039b3c28ee15fef9d666e03fd3
SHA512e47814554acfa1a30e2883a109bcec506bdc6bb2708ee29c89be58f7b4d98c2ac32b625402ddf841e8b83ebe0351a88b6e6fd075b8a315a58954bd889a06bdbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587fa262f9bf31e70b5bf08c1acd6311a
SHA117e84453a0feb3e247d7b72faaf2fb5158afe781
SHA256ebbb53939cc4e45d9bd066fd9e09930b6a8f8fb30ed7a0782f67d13793c6146b
SHA5123808315991f6d0311041613f61b1613b8fca0c13142f7f878fb0884eff15c31f76c3733fe35b7d69ac7f63a517884d54752c92846247a6f21fe266ecf0101796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553f76b4fcbc4969c9880763fea10c897
SHA1659127a928eda3a6aa5ba7703efd26099bcaaaf3
SHA256a4ef7d61564723749523f23a70d9acf43472de2b4635e724ff9abf91d43ee9c3
SHA51264436b93144ae024237b19042c3aeb85f9f0c36812913a0ce73850ad30a11cade9803590191378b99cb7bbf79b94a25ba559d46e59e1c33704505e8376e00df7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b