Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 11:03
Static task
static1
Behavioral task
behavioral1
Sample
cf664ecce7a4663360ed81ab2364c197_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cf664ecce7a4663360ed81ab2364c197_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf664ecce7a4663360ed81ab2364c197_JaffaCakes118.html
-
Size
6KB
-
MD5
cf664ecce7a4663360ed81ab2364c197
-
SHA1
d58522c5ad43137f707a040bde6743e3bdbcb4c2
-
SHA256
40e87e6166891dff235fbc6c4389d3f48a17dcbadb6299da2f9cabd09b91673d
-
SHA512
469ed11394f3ae0cee758fc6b404354c456f8e6e52ec887632a4847af429c94c1a5bc17cbf4e2985093bfc50bbfc064d7a5adea2f6a669854a0a4d71db19afa2
-
SSDEEP
96:uzVs+ux7+mLLY1k9o84d12ef7CSTUHZcEZ7ru7f:csz7+mAYS/Sb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000d406e078756e4fdc10cd3796b68a3cf7b8073424d8bb61ab0a5414455db443bf000000000e800000000200002000000000dddee6009e166fbb2a59c79c3f801cb566ce01a360fd59d7348c94ef6e7a60200000007b5e028eddf527a956048ca1a4fd35dc690ed90e2cc4767fc1b4b11f914bb18e40000000f1c54aa6b4d68ca1c279cc3d877b463c99ebfa7c405c9ba349c526d416facf27224fe3ab4d6ff024b97e1785f94ca4bcb7e18923dd0642c89e77b86eb64e5ae9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{99528421-6C3F-11EF-9BF6-6AE4CEDF004B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70b4526e4c00db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431782456" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE 2436 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2436 2080 iexplore.exe 30 PID 2080 wrote to memory of 2436 2080 iexplore.exe 30 PID 2080 wrote to memory of 2436 2080 iexplore.exe 30 PID 2080 wrote to memory of 2436 2080 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cf664ecce7a4663360ed81ab2364c197_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a49854f92031325a92d6b0336da3f8f6
SHA1ef5f8256d6907800365f8bc948c587aa449349df
SHA256a01c6f7ef82848e9aac55981f1b55bc19e24e5ba083f2ab7506c72cd391bbedf
SHA5121d10f6e66d899de2b1d80706aab7a0263f4837bc563955251a275aac94be52466fbe8cf81ce24a9d706a2e680a49aca97f76efd15330dc950b4d970f1a3c7b88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af6d1d7959ce04f2583e1853cba9dbcd
SHA115799b2447347a9230e3fb15585baabedc2c2859
SHA2564d2ac15e66116c7c10cb721707b7e3b3a8485676aece70f8c90602bc3376496d
SHA5127c22f038d7c2f61fc737bd0fbda3b6bf1db531940c21196b1bd7557f58c99bdcc1f65686c728ae4901f9c346042b25d31a55b8b49c05ef2680d9c0b580722d19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b5f7d9cb32a0831af68f3b38065dbd7
SHA151af833c9c0e09e83aaf554dc982c397d6c6d7bf
SHA2560d763f1f45bca717298a2f0c1242b224acda9658fcc1e6ab0561d6cf00bbec6d
SHA512033f9b5780cf5649134bf94523ba67262e532316ca0a986924d8d6811991a06e86daff16000622bc15a78bfc575c54fb181272c1dae2581eb4216c6725e87f6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e2389e5bbc524106e718abc3688220c
SHA10cd1fadb8c78f8171ea6b68436fbac8ecd40339d
SHA256eff07fcab21b0ccdf009d53a2258933a94ead56b6f04e68c9e3e7b0c7068b0cb
SHA512f92d9b180de483d2cd9d1a2c8f22c8632895619a300e47fa371a0e651023af6b9cbd2506ea0b81841fc37e9f1e50d41153091e5504741cf4eb78bf8a0e981713
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553c304ad239b799d65c654b0d352452a
SHA1c2bf9e32d2617753a16742854732dbe0ac043b2f
SHA256f5a88aa345e167777345ff0eb5eecfc8019284ca4f70cc98f3a1485609490650
SHA512bcbce9c50498aa9e83c6ffc538dcab69265baec2e4b3356ae267f18485e288fe8af21ed69c0e685593ed8624ec6b65b86083df0ce22a52ddba386767d79cf862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d0386cb32e10696402ca720ae4dfd32
SHA1b732bef5dd811cf3345a12d77457c54c2eaa19e6
SHA256deab421d83303241bd9040335bc0a0d303d6575781b029a3a1643931c3d6eeae
SHA512a57109db5b8427e8cb2bb64032a0349e6a0c4b29cf2fec5c009aaa22135a0ed868b43bd57fb30a819016a19a478a7837f115336e1cf81ffef5e2e203e82f9635
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abb05b22ab9b316770786a1fd53e5a0d
SHA1769e209af1d06f69e454feeb8be692da0dfde9bc
SHA25686169cbc930bcbf4d4729dadac57a15b12556b39756ec5c7e57154ac347ce366
SHA512c69c29720d72e45e54e7f5b5ae264973a8adf7834a0e99893a38e296023585f321ea2ad132486d1d062282beb3b3ef43af190de9d9e9677c4879ff72db26c010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc586eabe845af907811378752f46112
SHA19f8938bd694e82fb66f7de415407266b5884c30b
SHA2566e9165eefaef05f5653ae98c4f0faaa8181410a01848dcd9bfd7b15c5a1763a9
SHA512d9342a229b6275fa9c11b32744bc2829ee66ec16d9e00990a98e0f574424af02104acc24182dd9ddfb283d0ea4055df67fb466fad8cea7aa9b7acbe2b79919e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a04c4a10768408225cb61cb802781d5e
SHA18e0644fddc1144b31d9a9c179d3d66ec09a354db
SHA256b7341407827db0074fedb44c923026f7fb5c2aae572efcfbcd2a56118eb40c88
SHA512788d5c28010ad20199a3db76e82a2a0045b1ee55eea94ca0db25973d247291e9c3166e6e53b1cfcde455a9be3e3afb536101988bbb3f43a405ed0fe782933257
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd011d977d76c1caa1d23202301d9aec
SHA1cee3a6735916502a66477ff66056aa2f4940ce87
SHA2561eee8ec1655560de47a52b55390249618a1d1a1d5d924d5ffd089cca95bd82ca
SHA512ca7f66353da9d37c585bcf04826e48c3b242351de190b87cf7cf0ce1292d27b5f8fa1a395289679241a44b877ca208d51d5091bca98018e13e1e8e05995817d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab0090654b2eda7cc8585f6537c9b896
SHA179e88019bb384f2eb5a816eb9a551caefc82c3a9
SHA2565e2f8a890f2f435e59e87f4597a5c2328ee89ce803df5952f14ece8cfa50b901
SHA5127817e5ffebad26d167874e4090f29362b8969ff92718fa46b961c5e7d9f48b974845c074c03c995d2985bac79581e0432ee1e45ec30ab52ef07e8d711bb72cf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578c378feb2cc069f24ccc802fc32a83a
SHA1e8f20986267b4703d661baaff8aee348128ad999
SHA256a3b6d1f6bbfc89b55e7839e6245859234f1397e33acc7107cb73750b7f1f047e
SHA5124dc44f5c67c131637b86c5e550818018e2b9e2025fdc0cfd79b1fb1d9db6eadd326bbb13d640d2f47d575c6dbc0d90b1cce833719500d75c7edbb319b5c65a73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dcdc08c707bb39351223559e8ca29c1
SHA1bb7e5a2f1942d2d287aa213299cc3e0f2db5ae81
SHA25630e1b7889f339ba64a3a2781a145ecf268c3a4e50b0ef0e4efe2d87fd9afdee4
SHA512b49d1de77c37327b02da46d984a3d33ac9ff8f6ff6a96919bb186f1877d4a3b6876392b06f7e75b5ec5be3555e8b108e6303f766a0e5d37ff0ead356c10d80e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546806c174397d70c21b87291bb4a049e
SHA145c5f70431f0c281905fc1122813425edc7082d9
SHA2568502273a66ca09096d7df0e4951a22b6463bc8e9937a41c46335cce97667bc8a
SHA512454724f6c93247bfd1d614e9afc560069c7fe03fbeb9d53ea5fa6a5285e3f35226c8ca085188d40ac8b50defc9fd9f04b90611d64ebecd07fa7ff864750e6107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d707b21c2fc66ab6bcc0bb25f1f0187d
SHA1fe600d17e6b537128964c2757441d28b265073cf
SHA25673eb6215922af3dd0bfb8faf7d42b861b976e87be1d10c7f0bf6b03cf67d6e94
SHA5124096fb4b0673877cf4614a4a9e52d454ed8cafbeb5c2b15b1b517885d8144a8915edb1cfd240ff84ebbebeee741b19c1eeae7a57ed95b48c9997439a0fedcdaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5180e23f8680bdc566db56f485a7ea74b
SHA1f2d7653584834caf06208491cdb27a3091c118db
SHA256297aad6dc0b33e853ce5ff1b1ce17831a079c4d7de7b46d72cab7e30c8cbaefe
SHA5129602b8cbd66da9c1b5ef535831afe891c60af10f6995941bd726785be60ad3efe956eef1c3a70ce7193d8b0f5a9929108b283c6622511455cbe9e3e5c3928995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578927e73cae29d6eae5c7fae0b235f0c
SHA1e8c186ee3e46b1cca4e01f08a92837fe1df06454
SHA25604b26300bee77569af5fd38cec538d749e78601f2eace99f77a29bdcd46576b7
SHA512b671f3c8bbda79a62220b33d0160a88c01ffbed7ed49037f1eafc5acb0cbcee9cf3a38c9cbe7e6e6193691de86e3e8a5afd08748945047405e49c4d763742648
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5222820fc79b1898613e57f1b4c55e2ca
SHA17504bc4a44d75db1280c4f09b361d145bceb6c29
SHA2560ef1d6d1e1957c617ce1d929a81cdf5154689763dae1e6a52ffdcdddb4202364
SHA512cac70109b4a3fdf991249458a080b060ef8691348cf6bcceb0bf7a342e64a2f8d3a0a3bb79ae12231213d5a75beb4e38e9dc71eb8ae09d2b57accb9e1a612976
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551d84849cfbe76759e72eba9e9cd30f5
SHA1e538278a269df5986a2ad896e6aa75f5816ce680
SHA256846a3fa899759d01432ddfb74ba96c3ad826ecfa817ff3d1b6093195d9e1baa3
SHA51272edb9e8fbabff314c849d1be5679f2a1cc33d94a6db042737d04cc1818ce1254a49772369b5aa4ab843889d73b7d9b74ea4d3d1d497b63ce8a0a388981b964f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b