Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 12:58
Static task
static1
Behavioral task
behavioral1
Sample
cf963393950dc0617160f93833411906_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf963393950dc0617160f93833411906_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf963393950dc0617160f93833411906_JaffaCakes118.html
-
Size
2KB
-
MD5
cf963393950dc0617160f93833411906
-
SHA1
654fa4122fc5b798fd07f7ea3bd2378065b1126f
-
SHA256
89645a4e2cd2e59277326bf86f5a9ab63b3acc8b642056175d69fe9c7f66b5c5
-
SHA512
c43aed7c1b7f9d8fc556ca900cb7ccaad316fd46737eb517f34890fb36133b1b3c21ede31d0252a01c33e1b9833e8059b25ab469167ea7397362a2a7aa484879
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000009c1b9f2f86e68fbbbc664bddf8d0b5b1f61f2fd57d977571c4209e0b98b99d98000000000e8000000002000020000000648c0a80d729b855d862cc212b65f881b7632c565bc8644f91ebdba992e0d49220000000e6364bdd7c90076b2b8d26f300e295a8c3894d8aaeab89aa33306170d5c8ae5740000000d8f35d9b4e2f88a0b32e9cdbe761bdaad13d50e118aa5903810724dbcc5c3cc07f71e2212096b150e6c70896162afdae83c0a3bc445f0f9b51a7ec65e3d7fa3a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BEF5AAD1-6C4F-11EF-A540-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431789391" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 901a13955c00db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2384 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2384 iexplore.exe 2384 iexplore.exe 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2316 2384 iexplore.exe 30 PID 2384 wrote to memory of 2316 2384 iexplore.exe 30 PID 2384 wrote to memory of 2316 2384 iexplore.exe 30 PID 2384 wrote to memory of 2316 2384 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cf963393950dc0617160f93833411906_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2384 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dea72cefe3c5ae65d46f7572818f599
SHA1e3ca9d5633e7e521541e2ac04b351baeac453071
SHA2566ed0802acf3e89ccbd9c08b7f71277c9c68a13e65fa7d1542a8a880386664376
SHA5123f977adfa798859b481b58523576e3a60a9db19971fa5d700dc03235e6620c1a39d90fbafa0c7f3682c7f7f12f23b869bcacac5b66760abc43c7df4639ebad74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571d498de44354630315e0ddc71882146
SHA170f748739813a7dca181bcdb24ecf79feee27370
SHA2560ee66e7f66c8569baf9017e83240e2a531bc5ad2dff931227b41c310d929739d
SHA512204062fa9f99ef4ca4ce3c6ec78430af850da69c0d25d423bc4ccfe779d7629bda9a615c2ca1e25b87788a549db8b9e1e41d860a51d6f2c000f5c68885f6485e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cbc90003523148bc019a4c02c1b2893
SHA15eddf0ce395c4fccf9b1c2ebe0a5d678f5a84b8b
SHA256a3fe097b0906220591a216e266a02240eb749fd0a773d83815a1dd465a5f577b
SHA512c241f8487bd244d1415babc445da6719a75ed386f36d751ddf4772e333bec4544014352c463a500d85d78364712f2ff09261e5964a5b5d115e1e1b9f6301be17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574ba698440c636ba1c2ffc1dfe8764d7
SHA1b8f75b749cf5016f5f065fbfd7e06dcb3b338b6a
SHA256027dad15a07519173fba526ead9a1fb2620a918ee2fdc3fb0f6473b19243d990
SHA512916d13bf313c899d3d04d60622b45de7ca59ee5759873a0ad0442b3d9e2355db4c99492ab4a06ba765eb853c345a9e4cdba877c6fac7254577efa41f55b5fd43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547d88bcd99c0b2717d17080ec13d650b
SHA1d00b63ff6fba5ac2e1158c64bcec8a6b6da3d733
SHA256505797ff84cc284c8d17224442a4899eae9f44943e76198ef440014593e79ac3
SHA5123768ab6ff55e77a0299246419c1d2ce37a500a6841e05e6f1cecb3201576071ae17213d555ef73e60c6a3fb7646a0ec860aa9c6f15fe37c3ffd06bc72fe8fc28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4ffd0753d8b98c37cc77ccfe082b854
SHA185891f130147337bc28806fb91992292a43b66dd
SHA256472c045b3e06894872b9d25bf9cc37089dca41fbd77561f22ddbe9c473f0d453
SHA512aea188d7619519c6d35d8177d281ffca1a883b37d08ecb41b39ef6680353ae39e944c3195be12398a301df774190f0dc22574fbea915d026c720ec6b107b6080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8e37aee8977d5afa1954d0d6e4646f7
SHA134f76e0fc1a7d5e9c86b7829e3cc87bb73622dd5
SHA256e8d9a643f3f7fee0f64a971b7629edad1ec9931b9b463f3835965d080215a3fe
SHA512959455c0fb82082221d67bce14d09e0956854935c5f618a14cab2f50659c223ca9cbce3b18ef49f8faaa2c0d729b479b3804ebe407cd354662eb1eb6b7bf68a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529dcfa9b6cf457611ab910480140737d
SHA1b84261b64b1704dd3bf0650e14d7574ac623b045
SHA256e049ad6170ba41ad1d6a0ab127398e16e6cbafa9c8928c33e89fb6df466cf3f9
SHA51245a5d36cdb1ba9a9a6f8ce3635c3b10c535a99906435e733ae47dcad1267707d126314f2138c8e57e83d95c8bffa318341fb545805ee1f128a0d15a5011a520b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d608630ee8bfbeee17ed80747ca893c9
SHA145e638b55f398bbd148575d2ae955e4e5e1cb805
SHA2566657f94854cb12ed29bec4e33dfe8bfa8c0601ff07498afbcaf1c5a6eb1b6347
SHA512a005513e0d701062710e049b4bcea37655d7ce750281b027acf2837d53da63c3a7581f6e677d5e28b9b97d5b750f0de445223875b5fdb70cc633c02c4151b854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553272f048bdc3ee541af8bf0ceaeb75d
SHA1671b28f7c84c046f22115c2ca0f100623ffdf6dc
SHA256ddbc5ff716429942b49e197672efa1d60986e7b45546855a5f447ff0714f5d16
SHA512c3b3da1ea7c92234b031d4b0e5ad847bdfcf5bfda9d9624779e1a49257e94d914e33da95202d91716996331eb13683281ce0b286bd1ca0b3fb0a3f6d24810f71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e6b8feaa68738ceafae004f898ec645
SHA1cede85ef1d72a36ca09f77854e5bd1db1feea10a
SHA2563f040aa355bda500905cbba0f6e6ed74839cc938366c1308d4e94628fafdb060
SHA512b43482b7c501f916001707999a45b20c185d1d244833ee035de034a93c09a0f48316d554681ac967ca17383957f86b188951dcd11bf41a3dcc728812bc3f7dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a10a1ded051f1acd78b38b445462620
SHA13a95111b409a93862e9d56b5312f0eed6ec3c948
SHA2561941ab51b37a357eadc56ddeb633c34c453cf849c9c190fb6473b5b579daec34
SHA5124aa3c1d4a405a8942de254b0cc3a112e6c04004031d4ae6c3b97ccf6d07bd93c0d3ce84b546209454e0463420ea3317060a7aad39f07288089e6e8efcb8b4274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58055ab0b13a59b90de4f2f69e76d81c9
SHA16a51e5dc02332f8d060ec122e8f3f46063c88b41
SHA256b1e98af706a3c0596ed9c7eae6bc3d058037da76b45d41978e1ab8eb8e822dad
SHA51282494cf8b06e4bae3b49791af7174af487336036894515e47279bb32fa204142c30f9dae2a581848132db16e2cd98e294efd4f01c4084866778a80cc827ca78f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599f8f1caac796fdb15040830f61a6c24
SHA1d66c1180eda562bc474f8b2ff4d4346b6ab94800
SHA256ca926ca977933b48f160fada5955d30c97267276a4a54e10af9d7aeac89690bc
SHA51264e6e3cb2b01b5c1b5fd059cf90e1d4851294b66a3891251f70a586ccec495cc42cce18649c46894b53495a706f4c6cb41a9e5af88b3fb0adec050c6990b85bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bacddd615ed9efeb562afd3f61dae136
SHA145dd082f0d83db51f8039dae6f31f7b7b27a51a3
SHA256e6d13fc3e6489ce4b3bc27aeeb33cd59dc56da07d35dc846bc8c5040daed1bf0
SHA51260eb28bf7664ae2bed8ee399389d8b7fe66c6a1d3f698c363abbd1b32dbec09d5c1c320933af468e66c85669758a0eda5a62e01505725bb37b67449edd24c9c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcb49ef12f07a037244cb03434aacdc9
SHA1c8349e8e81f3ddc28a71b3a5ea6eca1a0c9ee039
SHA25682c4efd859eec906447e799477282fdcaf6aa8975e6a7535a6d5920e822de400
SHA5126365a32c44d85f59f5711e8c5d5fce0e05f80adab2f3b3aa200a2e21a3b720227aefbcb347217c24d391a4e3ca29def66e0cb2952ba5d3305589d2a5b860c7dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bc249da3d39901929102167fff97994
SHA1212ea1cbe71aee164d533b5f55bffcf31a34d235
SHA2564088111d8ee8b5ba0d5e480efbefba91f51054586aa2b121586e3394bcadab0d
SHA512267fa58b691ce959f3cfe19d731cf80b5c44a3ea2924ce42d500edf0621be7046acfc8a68d9aa2f5539624ad45d9bdcdaef7d7664572e0f3b90e121d2e4fc63a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fe7db4ad76c9497383095e56a4b4ccd
SHA15e69bb1381b4a2f80f775c578d2f41c8cc7140bc
SHA25691d8256a4a15fb936de8dc0eb30d92d6d6bb74c0a6419f4588ec6be717530c1e
SHA5125536f35dd8294850b51a9a8509a326af3e646d33a6ad8a40e03fa7f3e6b64839caf4f9a3afd188a93513a7530582a721e6d239f198da90e6a07c4d5a502db017
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9824a75f877609c3a00f7c90ad3e84e
SHA1078c14125ca7fca8f7cb6edba288d3e5fe96040e
SHA2569c3afb4e77b929b157c5b442f07d93215770bb49772883b6f50b851bfd1ddd1c
SHA51205b73e52fe829ef7a0fb3cdb2a31e8a5e9696f8ef9e09d855c64acbb26f2d0067c7317bd433af0f58339764063cedae18167a343b6b87d335c5cecbce15563f9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b