Analysis
-
max time kernel
135s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 12:12
Static task
static1
Behavioral task
behavioral1
Sample
cf80ca83b53635a87620f9f7f1654a8e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf80ca83b53635a87620f9f7f1654a8e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf80ca83b53635a87620f9f7f1654a8e_JaffaCakes118.html
-
Size
33KB
-
MD5
cf80ca83b53635a87620f9f7f1654a8e
-
SHA1
67995dda8c69cd3f50ac7a0811bcb2b23eb91999
-
SHA256
ad4843917a9ff9cb49e422263008e878a2c03f7dcca6c126ee86398a197700b3
-
SHA512
3edba581081b77d7953e769dda9285fbdb4d0ec42577175f7a286b75e13c4b0073ec662da377166d003531b68ade35a8b0e1fac679de7a52ed926cbe129a7093
-
SSDEEP
768:DPMOH5HHH6e87zVyAVd9v/O/6e7BNFgs2os4DHVcHicHvcHzchLcHPcHYcDF:DPMOH5HH6e8XVPVdV/O/57Gs2ossHVcJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4847B4B1-6C49-11EF-86DF-7A9F8CACAEA3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431786616" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000fc6f2d0bb5ddcabaf6e9b91df2d561cbaf4762793af9a82598467652296b06c9000000000e8000000002000020000000655ef88f8d5ec87d456190922a639f26dc4e25095ba81a9726f39301ce1584792000000084a053642ffd9571eb44be28e46de2df47ab9bb0488b12a74f425e87ae868c06400000003a77c2f59dcaccf35a4fe1360401222dbee52e56b3fdc85dc1b24117be90aab0991a87aaa9c0370bbca7be24dc6400cf4fc272a3640b8c5d8709a33decc63581 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 204de9395600db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2564 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2564 iexplore.exe 2564 iexplore.exe 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2504 2564 iexplore.exe 29 PID 2564 wrote to memory of 2504 2564 iexplore.exe 29 PID 2564 wrote to memory of 2504 2564 iexplore.exe 29 PID 2564 wrote to memory of 2504 2564 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cf80ca83b53635a87620f9f7f1654a8e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2564 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3c8109a9baf5736610f165a2f0015ae
SHA1827bd8a6597be1aeb927454533d8862e5c730212
SHA256afbab996cf841f7adb58900878b7c1793c33e24696df88c30277b69e3b0343e4
SHA512ed33a6763eabd8ced1a220395bcc4d8f61e6b5d8b2564b9f6f1b7e0e514438e3e8a124187c4f486660a6c1d6b6f2156429f386b89a655669032cff8029218b9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1cf08893a9cc84d00c0509ff79ea4cc
SHA1722bd0564b4971286103b966b6d09c1d437e9ebb
SHA256e3507727eab8d2ea068de7066957aabf350b55b3967a2d5d5b3aa806ec8131e3
SHA5126d701d00622aea6c890b845dcae637e698627289786c189a91192a97cfe6f0250e05487157407f29e2f17242ff675000c665ebbe69ce099e065f55698d308871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f095091a79552a6d623981835b77821
SHA1c30ca7323f19ab509f9e6412ac39e2fc569974ec
SHA2568da7d8debcd755d7487cfedc19ac8fcd3e0e2482a31e804ea65079d883fd6eeb
SHA512ff38ffabbf0d91fd1345017a3833a897efa0627fe1294f3ccc631e122088b4924b76c26c2e658a4063520895ee99c58cbe7b62bdad9ead1e49a44f42d61e74d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f7ae0b80d564b4efb666f1180189884
SHA1bd124ca611fe297248001d5b34eb82055e50863a
SHA25686a799621cbab3920f2f81544ff6d71628b7ba18d009bd4a13cac345b91126bb
SHA5120eae5347b4602de104b5676f3616880e65517b4a71137ebdb795c5b50499196dd86491d7deebe3c9958a4c92450eebee4ced277d1df669096176d3fc141f0217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572bec860a800a5bc8bbfd02947fed8e5
SHA156504fd0144f0ae43fe1de709acd8f6e7d951572
SHA256b20f4073920a60916764e408cb1b96023cfc46a8b8d42d170eb69b2e5f8cd614
SHA5121156e09d1c1f2de7595defe8208c5b62e7f789524a48c8d913d2883f73d141dd5a2b0884f88ce3958e03f1e36a22254a4671c1039e8327bab85eaa76737fd142
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55065e4c2415873eff346b1227d795711
SHA170b436dd06926699bb7ad7e70bfb8466fb7e8316
SHA2567ad226a0c4527d76ceaec4681e9db1b7c5dd0f5570f53b3ea3a2e50a43e0fa26
SHA512932792cd8f3c837e4fee5e8254ed94acebb0a2e1031999c865453187d6b74d2d0f81de8dcb31dcf2c6f74a5feec207f10bbda9bd4abe5a950b5aca605a756224
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3b810c6017ea94b2961f7b514936255
SHA19ca35a16fd329977838635c2685c1203f2cdfa81
SHA2563eb76e116a464cc8d017a321cc8f46fefb82bc161f443be3709e1ebae24fe34d
SHA512ea2f8cac4141a9fefde1adec0fdbc64eaf3eefc35d8218ace1fafcab83b5158f29c85c35ee3eaf331dd722db01d6a07783d998edfc88c951ed9c778f89a18633
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5029f252935906d1cb7fb7d9a2942562e
SHA181509abd16021d0bbcc547c8e9ca73d1d03e86bb
SHA2563b5d3fe6e77f2c228e8ef48fd97071f5b33767d5589e2d86700316cdaf58bbd4
SHA5127e75daca1ed9cffd16902256d5144db56efb8154c2d5b97f32ee22971a17fb71a94cea2e48e7c20378045a800c67ade00ca09373375afe40876df81b70351532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5563fa051bf5c1be7373b3fc49b096a6c
SHA1728d9b42f81545bedb7afed782089fa38ab693c0
SHA256bd7da658bde074299f5b8c462a424dee60ec3ba70d9b724e201c8c042a7a69dc
SHA51207034093090cdb788ff4123d5d8a4d554f77698f2a27d07daaee514afcabe057bbe5d649123ef413ce0b9780440552cf9c045c2b6bc038f6a1b55b3fe726a075
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556e410a145f2f3c6b80e82a3749b3917
SHA12370b90bed427e7ee8b9e4b7e996314fd151bee4
SHA2564f4b5253dcc82eb0423b236ebb3f24df9c7f29da4f278b2f7fab57ca146545fe
SHA512d25bf187a6c97a815f5e8c3ff86289c35b0f29cc5e7b0ba370c6c09118d0318d92d32a37c251bc5d2d9988072cde06152d8d4dccd3e036e84a27df3b017feac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db42afec6b36e0fece79f645fd3dc390
SHA1ba6a47b18dc8712a72efc0c1e2fa09b0d962bc86
SHA256fb9bdc9a29642d22395582f4dc62ffd335b2c2d41d79b423a4a8a1ea67eab1b4
SHA512318dddc90a9f9bf3d88643e4d61c227eb733d3a1f5f84457a289fc7f519bfdba9990d1d4de82511833a086aff5b5071273607702ab58bc04ef748d2a02a09536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf1b5c587fb53583f1e5455a35353d12
SHA1870858fb4825f8a2907df4c524cd3fe44be11b08
SHA256c0b61244ee7192f6986a53a31f8b0b1653a5b31d36c05b2d139bc2b14f697d11
SHA5120b5955aeb94b2a2396f1dbf80f212ad1f2b778c2886b952a96bc268b070a4c27174e998fb0e9413f812f4da63a24765fc178985c0a3544f31551d4629f96f1b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0aa9702445f71455761b6ff4ae9ca75
SHA14d074c1b4fe4c44092ec6ffe52839c4d99e74bbc
SHA256c1d475c5a3d581a081188b1d50a11595a1f2738e92db48b7202dd2dd0240b8eb
SHA5120eb31a7c02d6fb2b899609a02ce11238f3d1e77249ffd3776d8d79890a2bc2cecaee7d954b4d2fc2a4d0cae73460f8192b7532c11befbcd7c332d96a04b2addc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8e5d261aa94bd05270ca1ca0be49cdc
SHA1ef4fd00844bbca2bed657ce80b2b6f2e3e906fea
SHA2568eb4de0400d91aa819bc50de87e2450672234fda58fca7eff6eacb1e4c52a134
SHA5122fd3c7db9ddf98ccb2598eb94fdf1654752cc713dc30f2eaf72f72b17cee1b2ddfecffa8dd49844d8ca1c50f5d3d3d6784040a56ed9e69c4f7cf08c951d255bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e96d448a5302aa19760462b084423c34
SHA112890d85b71852e17c7c79dc2a2d7d7298b7d218
SHA25605ed66d8251f9f15ea0706b8364d1896008994c1ccaaaed1f63f254deaa061f4
SHA512af24aa1d7b4d9aa927aff57426aa4550aecdf5e8f60dac047e7d38b34bcbf7f3d55e8e403420590a759a2ef14ce65b11a898a22dba1c1fb4f0a01a72f504ca65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563393f1287811f99d991515adcb476a1
SHA1c3e6129ca044cf2f6898f2e10fbb6b98078e783a
SHA2568e588cf14a8e1ef2094afe6aac49e1d641855e4613f20b471b69df91101d9d30
SHA512c6ca8d9f638ebfc61ff97bcebed41d622e89f9184d2c367cd54097f6a46d2bcb8d1dd65ae23252c49a5df2c75d7379d0f1b7328100891c20656b9d83f10b4bfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a241bfddbbbefe4038e2771f8524c82
SHA103acc15370e90010f486f1aa7050169870cc67ce
SHA256d470f16d07df41cec97446c50fe1b0c4e17cd0958d4b452838c7f3f0953dcb14
SHA51277802bd9cffbcfdaf9125c60eaae33dcb33a5699eda4ae83b9f7e8d1dad65110da61209401a49bf01934b6819ce4c2b49f232aef07a500f394f1b23ab9b080e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc42a566e1d13d9dfba5e5cabafc2780
SHA10127123ff94d6e066e7e167c8870f23b21f8bde8
SHA256626110b25dc5b70b96fca6eac46abbb887ed90b3511c18ced8e1a424c1890103
SHA512ec001bfcff8ad43a946c7904985d75e941377daf9f3f448edf195309ecadb5002c5bc46c77042473a68f525ee20730451d748feed2b1a5d507c0a202d6bddcbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c457177f90d4755f2f59d899babf943
SHA16cf2fcb8a8480ca466e6a757a83f05ad939b99f3
SHA2569597f95859ea4e9975c8cc1940be3056433500f2e5f62c77fcc78c9b8c4e73a8
SHA512c858584998ec049194d0c22da1688412d0ef0a549b6f3cb5551a41a4ca425624f669b10da779905f553afc481f553d31fb17bbe8bc02b63c18034e57a3bef2cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553c35436258c9f764e8fa34351dd80ba
SHA123ec5f2207b9ae3abb3e81578c79b0faedaa6d7b
SHA256ca74026fdf67f7ce2409a4932fbbca55e525b385154f1e127591adcd6c77d831
SHA5124d52b1421cd4ce5522b2901c76b9f8df50fb98213ff66e57576117db1693256414951dc0772acc1d561270b52207c2d5112b0e7705294ec56053ca26159e0be7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b