Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 11:46
Static task
static1
Behavioral task
behavioral1
Sample
cf73d033830564c9300235e0028d596f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cf73d033830564c9300235e0028d596f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf73d033830564c9300235e0028d596f_JaffaCakes118.html
-
Size
3KB
-
MD5
cf73d033830564c9300235e0028d596f
-
SHA1
360f34a05036e80b7c592a598d7ab1884de88e20
-
SHA256
297c6416e8f4a754550d4dea8efa3fed93d7a0a4830f1400e94860808406b9f2
-
SHA512
29d7377f1c1ae2ec38ec917ac1d8ac9bdf1f18513808e28e5dd6dcc1d1eebbd2ccc1f369470baa691bb9e8de5b13f2b33f772ccfdd29bcafbed976e1c11c5723
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0d500715200db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431785038" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9C509A31-6C45-11EF-9D33-D6FE44FD4752} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000002bfcfd280e274ead9898ae8305720ddedbdd238b3b49b07d05aad2cf1c4de37f000000000e800000000200002000000071e93f696ee63f312519f09310aed3bc81636bea14bf32eaabe974ff99f5495120000000b52ba7155b23bc7ac8feb55dbed0eccb8971018df1649cb7624b7c0f01b7fa7240000000c0311451425530242cac378d56e6d82df42d6a3841b1e2ec4ba0133cecd3f1ea5b37a6f30ba9342275c0fb6e00fed3ea67da57d730a9de27b8cad56cec983c48 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1960 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1960 iexplore.exe 1960 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2748 1960 iexplore.exe 30 PID 1960 wrote to memory of 2748 1960 iexplore.exe 30 PID 1960 wrote to memory of 2748 1960 iexplore.exe 30 PID 1960 wrote to memory of 2748 1960 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cf73d033830564c9300235e0028d596f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1960 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a26fd82b3a2f1592f6893c8a9f5833d
SHA1f9bae974e5243f582b852005553f50e1f18c1d7a
SHA2568d97dbfd97ff231540ac9703f6084fd91a0e0d0d6d7d631fff5c4a3cfa0377bd
SHA5122cd6e8eb311e3fde6a5e4f4e2a08c15ddb63ae8697805a4d87fc689c1a032670b1047afce85b214ef868bf1e65ce2013f24c1912f6bce4c7f5fda3322a1cc2bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e79000525e59be0cebcb61926c6fe41
SHA1a3860d00f2a0180a6ac037653bfae78ee188d04f
SHA2565e6ed961efcded90c05aebbff180c256ef3e902573eb8c0c5f470cff24404db8
SHA5126268a57577c06b94301a4fbde002aaa1f725e221fedb740253923b7cec2906f747e29cb62611647ca735dff362e043216fc8aa1108724e579482549161975887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a31d19645bc0d8b32c020e18b761dc3b
SHA1acfe14af7aa169414711d706fc559bf62ff8444a
SHA256c971200edf34a06bc543ff51a4622d17a7660567e0c1bfc7199f2faa280c7405
SHA512ae45743bcf966225091cf9405a3de1e4072c70faa00c7980d03cd5295cb7f2ff4fc42e900287df86f37d63bde44b35b5ad1732863bf2875a419ff65d4b76eb90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5962571ba0f931ef0278bbe0cf536c8b6
SHA1f0a03ccc9cb0d83f1837d1f382becc95c3c256ee
SHA256207646c75c6863caef033a8a9f8eb4b182e6474786be12dddb75c7d34d92d8f8
SHA512b5f9cc183682b0217c117b5caa6f13a3ec806c5422d8dcc96b11b4ec6375930686756b7ae9f5565bf6588541c84e92b5739c223e4f268fbf2425b492c1fdef27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbf3eb926687ec329b8d808aa1d29046
SHA1f4ceb0dc120fc2e54864bdab8361d147dbc01fb9
SHA2564b4502520da55b42d35375a7d29f49f6b0e12b39d2644b239f6147cc98bb89ed
SHA512138e30d18df8628fb30a39107d19559c47296b8adb71d19823704c021fbbc8b8a7a18d02f9aef5a5f6ed4d05ef41f5124d161369a1c471545a06300b126d7c18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b752b4bb06d4f9f9e6bf866d8f47556
SHA129e3a1a9a199d44ef8d0734c7cbcba3a98b042e1
SHA256a47129c891de055552e2ee30a37eb61d72f4646a4acfe09bd54a38be524cb9b5
SHA512f3dd55a3e8a8283083cd8cb2dd9299dcb5e03c09716a4d53c3a6a3c549b3183b0282d25ea976a80c87311ec7ffe8ee21b414a4c4eaf6b1177c1602c82a0835dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2812b899c61d91bbad8cf3e21642716
SHA10b37ec78dd20fa40da854858d65eb785a5f2caf9
SHA256abeaf911402ae9c4bce9e628fd8971c23f957416c5382b4368f1d0307037ecd6
SHA5129bda91abdacabb963819fd326543cda3a68c664b06620851c00d8dd3f3eb96568cb6b00fff7809403457d54f3ad97a3828dcdefa30fef16204f863824d5629ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5f6d8a6acdbc45a10e6ee0c16933df6
SHA11f2850190b7822991445fa89da4c8a94700b94c7
SHA256540e45c6412b962a90c6c823cbcbdee06aa8a51df7ef8a0814368e4e8a226fc4
SHA5127e833d3aea829851cd89e858f4c0a4dbc89ba1befd0690ef8f1cb114da8051841c2402024da0ebf52f012acbf564d08e05d21390aefaefc689b272f795da85e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5955e67ec5825abc0c47698d30a875d95
SHA18c32569b6c92eab35363d4c6aca2e1bd368adab9
SHA256a72bb38e81bf73683ecd15c11ebbf3e8dc240a55604ba1179b89dc118c1a2e95
SHA512b4f224e2f469ae8f04efba8b306640834f51f4b57c9ae0af9fa2894cff7f4e3777376365f75fa767b1e8337de36b13cde3e7501c13e3847dc3080fb888571020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599d9d7b11defad0bdaaa71f0d836bd80
SHA13db70f94e13dcb8c8edde47df0568e451de02631
SHA256c386c656396aebda43e9b527ca7fa5b0071ef8332a00b3beb62c48dc27baa113
SHA5122491a1d479a7bf59553f157b198bfe90107181e37f99c37956ae95da7e8bcc4d126824385146eac2b2535669a1ff3055a71a844c9f867bc6ffafea1f3b6b2ffa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e93cdd35584b574684f4d410db31861
SHA1128c9454f95b5222bc92b16c46ed2fc0b16d0756
SHA2562e77dd4f350692e40b9d1dd4469d55d2a7605e76257a19baca2d6cd443620bb2
SHA512e295075596d964188f1212812a93f1df7830ed4c1576c9a2fdd488a73a522238359bccf8d48f054244a343898c4d48fb75287bf816604cb047eb46ee76a1a50c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5b15bc8853304e400eee6285226bfc1
SHA1583e9b6ddc044714ba8ecdbb104901fc01b56347
SHA256f5ad4a1f9101477a160f510f46bf39ab7b079f1fc78179b09aa294d7f8ed659e
SHA5125c50cf88c71b55fb2c990f65cbaa3142368b0879d654844c79bece987c0e0202569974ba5fe035fe3d9bee895c5dd126571c8ed11e38f293fb313a441381a715
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aab50ccd528908157b1be6945a61357c
SHA122c2f822b20d58c16036222f49e7a5801fabdcef
SHA2563d06aa98e257f6f9fd1f0390d6b7143b27cc03ce75f7617fb82de2e24569cf76
SHA5120cd023a8db25dd819452c947d540d23dc92427486f5c4ecb29658f7e8de19d7631b257da326c1ca18557e767f8b694ad2ff1208ccf3dbf2f88e736ec3ce3b2d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566937e8d8df35f89bdd1b5707127cffe
SHA1a29cf2a15fce90083c41fb0a7e65cbd1ff61f9f8
SHA256153f3134203246c948cc5a03ff95397727939ed54068a201c0743ef2502fcc1a
SHA5129ae7b023be7882a7118811b6e8a0faffb36f4ae0d006de381ac5e7c5e57a3483fc8c55540a021fbebc6304752a5237fd9e9e79ce676244359da969b4e2dc6d5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a6f7fa2f543c7a449c03b4cecda70c7
SHA1c7bab02c0690d6c6c6b8fe7741892710336ba03d
SHA256e9725dfafc5f729fd5c9ca6f65dcc0f82fd2c6b3bc3b6f463268b379b9525ba9
SHA5120d5f7abd9affa978fa09eac77fa596fe0362ddb83dfdcf0f2a791a5f4c489621d2c670054e36f399f87896329e126f5285dbb8a4e8615fb151be5f64b2b88fed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599654a89fa0e9e1fd03d3a6dd5c34485
SHA160267633d2ce265eb4c2fcc1e7e46254d13eba5a
SHA256d45fcb7f9f45f9a7ce4bfcbdac70b353727d9acf5d03ad12754876ab5974b063
SHA51276e599e1046f4668be2daab45ee297614cb0e1f58ab8797bba03d3362cc8ef4a9e3648b3b2904a2b351b10eb5ebbb0b4644a889eefa78a36807a538de28802f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e0b330550c9be71e9c55aac48f597d3
SHA1a674d7395d8733723cb2c4af4766ded450f9cf12
SHA2560949fbf9d19bbbe69c92e0859dbcbe7f65fb6739baf4bbb0e0cb0c336ab8002f
SHA512861b6abb80612b690dd166981254c5ef8d47fab6ed19ca59371bcc6b464293dc2eafe823e74cfca393465f8ea3f945cd774098a33c6b1d4244429c92f88d2012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d99301a5c508778458829957f3ebafa
SHA11fff74ff937fd537b7e1679e7e03d570421d9f4e
SHA256f0b8843a8112583accce897253a33966867ec56d39c04ee14968b33a90db05dd
SHA512efd543ebce90db05684f2cedf10a78a73dbae351a75c16527fe051cff647cc94afbad57c67c81c1ade18c3939046239345932215dc7afd6aef3667e6aa589df1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b