Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 11:55
Static task
static1
Behavioral task
behavioral1
Sample
cf78b6a807b07d9c205ccf5cb494d1d1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf78b6a807b07d9c205ccf5cb494d1d1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf78b6a807b07d9c205ccf5cb494d1d1_JaffaCakes118.html
-
Size
23KB
-
MD5
cf78b6a807b07d9c205ccf5cb494d1d1
-
SHA1
eb9fd94e04759022437347c3f56421025dec7375
-
SHA256
d47cec6b0c192fdc0f2228ab0761d390dc3a825b127ff4c14f6ef53b21bed39e
-
SHA512
1c98567117f5f99a94e12d68848b410e2aa6919fab593d3d7d2b233786e24a3327c085c60d3935172135a113a16c48f470a5aad098f86b402f267a74f5294a25
-
SSDEEP
384:oYEPpGX36zcAsEXePNY3DlQ/nvFE4fB2GtDzrmIhXlTDGP1Knp81:oYEPpGX36zcAsEXePNY3DSvFE4fB2Gtm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0859dbb5300db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000005db12b4e98c4f668e0008acd210fccd41363134ae58dbad84775e8792acbb160000000000e80000000020000200000004a841ef47c5fa98268f457075ddf220919a84fff697655b3ff34bf51e851616720000000c630a3cb97d56fe5335ac7d8a9c9448841d15231b90bf8ac6eae90aef87952f740000000499a5924aca1b29f626e60700a9bda7bb806cb2bf0b665bda07bbd86c6ba70797666852cdd3ad42a8090574eabb6e8f3a95ac620e99ec4140169727461e10b48 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431785591" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E6851A81-6C46-11EF-991F-EE9D5ADBD8E3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1228 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1228 iexplore.exe 1228 iexplore.exe 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE 2868 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1228 wrote to memory of 2868 1228 iexplore.exe 30 PID 1228 wrote to memory of 2868 1228 iexplore.exe 30 PID 1228 wrote to memory of 2868 1228 iexplore.exe 30 PID 1228 wrote to memory of 2868 1228 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cf78b6a807b07d9c205ccf5cb494d1d1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1228 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5531a80305de77e2421d4c164b868a289
SHA1055473f38c20fd128f0852375ceca3d22213b7e8
SHA256ef1e2a29f5091fa92822f379dbde31a312373934686c11a09a9544f0d4f05d2d
SHA512a8460b5cac19be39f39f39484a8d7d88b6c17c5cd80f4259346449c9ae8bb222d75473854d870f0825a8017b9c1648eeb16148f07d87c0ac6240fc0c11afcc1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a30650b24a144e25b01c69b4ed86810c
SHA14895044eca4a62f6873ef6d0aa401a387c7cfe59
SHA2561f439f9765feadf51d54152175a743c79e6f4f2773867999698db6f9c45785bb
SHA5124bfae95706e01cf0cb67eef8844107eeb138b8fffbb59f60c5da2909d51c1f76c40a0e685dfe0925ab8c50d9ce208e0bd5f29e5c2b97dcdae9b7fa24803b79e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555e90b22631ea68d14a18744cf554a7f
SHA1923d41d41174f0cd17e021d5f1bed045f0523de5
SHA256a2e28690be81fb9003232cdcc5823efdf664faed0c2bbf2c53a60a181ea63d2d
SHA512cfbb5ff59c37206a8ad1174b872ee94af9f807e5fa86c218b83ceb35c8045bd1304707557b567ff025f1459dcb14509650bcb981d43b5032e793876e8f4719b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e5e83bb865698b25b1bafc1db2ce49f
SHA1a752ff15ddeaa8b4e8eede772173ff1b72873e2b
SHA25693a507d95e2433f318496ccd708767bef2674c1e837e012de7cc6a3291c7093b
SHA5128a0b55fafcd196b32b63e2ea35cad81477ee8c5440558110fe7315821b3724f622956a5a62643cd6ea4ad05a80637cb9a4cba3a8e4466e2971a642cf3b527dab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9665523892b22d4001fbce115b5d0bb
SHA145a15eaaa1c425ba9c9eb891b1d76f8a99b4b107
SHA2568f9ce39c26dee9928b292fe1caf1c0d5eaf8a7fcfce2fc9ec3bd7ed37995f651
SHA5128c19a71d457d90afd077ea46a908e3a538579cd09fefb41d32387ef6cc736ec5eb3d3da66ad95ec3a85d10d2832dd4a4c40609cabdd00bfb149df7a0d3c502c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d41b6596b735fa19296954455833d41f
SHA18f289db0f02dee0cddbf289817442f4d0b696ce3
SHA256b4a74460a7e03e0ec2d2936cf0717c6311d2658bb17feda40683edd0674a5cce
SHA512ed462f29784e9ff76991745892d569981e7e9fabac72f25a471cd7b730065835ea8920e56e5aaf36759e7790b41ba29c94eca1a7000cb3701f027375dee402b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fe47c7251126fda4c299ce0e1261983
SHA17db64d9a4b7b19566feaae2aea965d678e07bb2a
SHA2566a97f5252e9c0fa82c987f6a9479f588b19cfe51f8268e6291f12e88e71e686e
SHA512a459d0305a710fa700f8cb18693682d400add3bef0cd9c2f12953e5c04cf6168d8cb5462108d24ac879da835fe1655879cc7890875deaf3cc6d9db3ebe72665f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ee58a8c9849efdba2c742d98729b890
SHA1fcb42ca27dd493e43bcd8a670b8f0334fab855e9
SHA256b38b834a2c1ae81230923a7439d8271d93d71984cdf93dad1a2db1b754e64ff5
SHA51232c3b9aaf1a018717e8232aade2f6c148ce8715624f58ac1d1c25b55faf4d3c1af8ec2d41c38e7126a734f7dc43a4c2c73071b2dbe9ecb89ac85ccbeb9276d28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3cc949f3696fe5349ec84c08c085c45
SHA1be834fc0e6986b414b557e6378b734e83e8399d2
SHA2564e6623ce239ff2859ada80f9ae1225e978497045fc380205f495d06eaef487af
SHA512f4799eab2d2ff9eff3b72266918e4dfd483047bb36292c5b6fe9e57e0f36ad35c7e9183a12aa0b83c4c1aa416b49baf50c7be503ba2155b96a38d898aa41c3b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5763658252d5c3abb53944b437e6de0
SHA17148e22586abf17a9e1e390522d78ec42af8bb06
SHA2562842def80cf7e53710b4f065eec9f6f1f3ee366832ebbdadcd287cf76fed3cab
SHA512cb60590acfe6cc39acfd7c50ad28db9aa56fdb3036afb6676d72ccb9ddc7131f0e746e29cae8285ed4b29928f782e5b9bf0a7080719169b2335a30d088b43892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e978013871bcddaf42d3a30733cf22c3
SHA19c247bbf0107154f34387440f7a6af42a59d1e94
SHA25666ba60bb56eb902921b8fe39fdfe9229c79543f5621f7d2c2bb8b3d10a146f46
SHA512d04238e1746cd0bf7846af0e224cc9fabffc2ebbf74feaf1e8eb431a31f38e93b8276cfeee2fdfc186169c2a8b8e2af3c712e29dc44e7560ffa12e1fe056907a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd82d86b69257cb64a2c4b5e37912bb3
SHA16feff2bd79dbe05b69cc642219198fda2820ff7e
SHA25626054057ff863f483e0e4b12718df8dd1cd4374f4c87a26c30b21ef225b410ce
SHA512d93687923c05d39733d0216d11e8122bea7a193d36aa0565debf9188b070c970f5f9f776b23d029fd5702a8b2e3ca4707f69fab305f0acda135a64f0dc88e402
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c205fc2b4648addd54c15d98c530c57d
SHA1f6c7110b01b0f4a4212578e0fb4317d2b2c10a35
SHA2564bd8c598417cb860c51967bd374bfc60bb925b416d4d45adf8cf905285534ea5
SHA512d7772ea77afa5d3306ea99567f380a8696b4f26277c9838b119407ac3272136f7adb4aa9448f828d0b4c7a6d5231e3fe95a73362153250e5a9e569c19fa72865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59460a3ca4b6ad8c995ddc1245d87ef8f
SHA1e7d41c811c5a06a144e380fc44771a42780d057c
SHA2560b54d4f87db204a0b9714ab4cdc40c49cc5ed8872b85024e8f49fdbb738b00da
SHA512a6c19a67d4634fa7765848dd23b287ca7fd544817e1347afbccef52589ca0e0a51e671f4e0f97d8cca6928e97a0e5557c1cc2bb6a2f299c1825163097860efc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57182654abb7b50aae981ae6299dd333e
SHA127a36fdf30a62bcccb529c77693ac10a30f40d3b
SHA2564e28931375b2523da909c72dbbffa36683295300e21a5481249bf62c0b11880c
SHA5127bde8f6dec0dd75cbf8b94b937997ce678e5e9564307719c814a4de8a21f4b27b17da72732dea5b6fb11abe7b0d66fb832722f22d883fcfe77f373cbaac9d914
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff55bbbe185a1137bcb50acd78e4e7d4
SHA123a1c3cf76fbe68ac6c92e76f57ddf932ea36a58
SHA256847e168ac150e7548981aca75b2d2a444a8cc3bd906c7899e462900ff345730f
SHA512a6d67b918f9318fb1f089844e6c496243252d6ea0f2cab0d918d36019a0a878f2a7a170c4181e67fd6426f83227440ae994d8bff35484f04d0c40a13effe7ae5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5602ef2eef24a67e47f2bd57d21b62285
SHA188a716f658a94076d633d952feb30acc48c85092
SHA256bf83ed7fd7373367fdb6d0be5b80cbc03bfe16e24edbaaa083d342ae201ccc4d
SHA51260822000c12df939937fdaab0c46d65747106e9ce0f910426f55c0043fa2020af2af84886868912fafb3a2a0bdcec27662b5e6edd2ca7bc9db6a38e513e5c132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b67e9a1f90b02a8077054ec3902c1d57
SHA1627d2f04a9d18eb96248d666b92f8db6ec8e237f
SHA256d68a4d695501f40ff19b07310758ff04cd34e90f8894d1e34b939efa3bfd11e4
SHA51217a32cdc13173804d756e9ea07883130a84f3ab06158e7c09a7cc7a560523eccc27cbd99fab57cf80c73a4979008dabc401b9061ae0f640e4694c05377e09fc2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b