Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 12:14
Static task
static1
Behavioral task
behavioral1
Sample
cf81a45e29a5489b1b18ea3de3a3d8ad_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf81a45e29a5489b1b18ea3de3a3d8ad_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf81a45e29a5489b1b18ea3de3a3d8ad_JaffaCakes118.html
-
Size
28KB
-
MD5
cf81a45e29a5489b1b18ea3de3a3d8ad
-
SHA1
786d8fe4af434704016459df5d2bc7095f5edc5e
-
SHA256
499cbfbb132cc00f241e44c4cee2d893f0fc4a40f06d70276de1a6b89d4d2650
-
SHA512
6aa2912eb7de41aa1e3ae1a18b36973387ee1eb7311ee8a58b8d3aaaaf99ea252a74f1fe8918cc05a74b6d1970d42e0ebd41f5b986be7ddf6c7c85b1cac38ba0
-
SSDEEP
768:x9w2fsziCRWZX4XhjU6c/I+bu4olmO7u0aZk:x9w2fszivZoXhjU6UI+bu4tO7u0ay
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000006de084dae2099a1d1eb649666eb5b9e516697537cd90ec934e05e0cd0931e7e000000000e80000000020000200000003bd62ce868927b33e59943181ec2257897ca926897c069cb5ff04d2d38c7228c200000005a3b8b7e2acf573445aed9f6cffa9bf1046c06b8d566902912d49a3e5bc8a8a940000000b18c237cbb27bbbac590add793a7b1450414a25cba31eb3ffd3670cb5088267810cfb648576996f25e366d733380f758f7de179b436574fa8c382eed1ea72d43 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431786727" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8062ba665600db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8BA6A771-6C49-11EF-9A35-EAF933E40231} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2096 iexplore.exe 2096 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2372 2096 iexplore.exe 30 PID 2096 wrote to memory of 2372 2096 iexplore.exe 30 PID 2096 wrote to memory of 2372 2096 iexplore.exe 30 PID 2096 wrote to memory of 2372 2096 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cf81a45e29a5489b1b18ea3de3a3d8ad_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f571a82eb3fd4ffaea5124e26711bbfd
SHA1db81bfff434876f0fab72cdaf48dcdf909fe1de4
SHA256a77cdda53c26bfbbf7f5684e8bd93ff0d45520b501387e72725db2959ee18ae5
SHA512428ec680bf1b86082fa49a8e88c36460d99aa3ca548d7857fed815cc824e43a1f17b1d8db969022d0522ac05ed78ce883d7757553b748bf58f86fbe564189a62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af4d3236a4f99c6103b6da9635875eea
SHA10ee0d526bfb7e5559361bb6f610a8a0a087c262f
SHA256dcbbba64d98ed8cb93353976cd6105349dae1a9c03080c93834d0caed2eeea0c
SHA5129695a1bde5f301b865eca2e8b847ef1e4b35f6394bf3712bdf2e45854e438461250650fe1d05bdadc3c2c17f25e9737be8a33041fbe6bd369c60add48ca50712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad5b6336336803feab39546ab1c915f7
SHA172e0b1f59e5538139c8e283b988962466a9a9aac
SHA2565438e54a6536331c47ab84f6947e18ba3b4e185eb714cd39e58bf2cd9a2ea74d
SHA512501fdb744556a4ba37f1ee4f718ce35614a0b930c9e0b559dd080733f01c920b1c98ffe162f0f6e35147ed404a60667625ff8aeea4751c84e79424d8e8af234c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6ae555391661727e70ea891ffda6e21
SHA1e51ce7f132c58d0292888a55638eb765a9cf7c7f
SHA2560f0041c48f29010f99780ba4b80d36904da3dbb6bde454a413ae81d2ab612276
SHA5127acb38cf3ab10a7be39ea1395cb328041b5101a93491273be25918b677cd09c6c98ac433710c74da5a3f0c04bc3d0133ef7dffc105058bc71d09d994eb5e4d6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b27755d86f1727c4dfa15299673f11c
SHA194607ee38f09288f9428b5fa880b852bad8106c9
SHA2563509654cf5d4e093e8521d0ca9eb0f20f6854865d342dfd2d1bcdafbff7b6a78
SHA51286ce166169a8a2cabb0e807be8b5849d6e7ab2cebf60f0ad0b7afc0dd3ac35d750450bacb0d60aeca50fb5126197673b2f31c17ec90d77fcd36e2e6fbe495246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57689407fe7d232ec9d54df519ad3a05f
SHA1bcba2baaf36f97be26dc6b5413a9e92e44047044
SHA2564bbcc94b77a7d9229f48b9613e588d1cd3e47192015d9331fd137977c9c803d1
SHA5121fe5c960730e13485161d421d0531c7e20d3989b3a1fca5633adabe7cbe5adec2e8379834c812344240fbcb466eeebe224c86b6a6a3e66be7e9eaec2ff2458ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df1b5c2b0e951fad53e2e1040a254cab
SHA10f3e3bb0b473f61fa02a9e04a367c209b22da047
SHA256cf56bd1237eb3a036ef7b437de05c3442cbbce5d8e963efb98088d520105edee
SHA512f794e02b5b61633ae53ea705988b85c6a75a5ef25835d36f655ebe284712e230abad3537f696e8a11b2909579599ee828cefd6ff95c4904ff122da64f8383298
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe4c283a2c0fd469f25cc238c241e943
SHA1ebaf33cfdd0b55bb600af06a9a3a260ed70c71c3
SHA2567018c13f522e10795a5817619095a1f50c0b614bce74b54dad6b618b72d0af51
SHA51247f54aad43715f390bd34f0df54e5793e400850ffe24fa52ae15c2574eb394fe01c57de8637869ec3c48b39ba9bb74bf271fb37f26c390681d4c75fef43b2c53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57845573b1b3b576e7355b242c13dd31a
SHA12194ba718c8d0099f497762717c880bd7386b0bb
SHA2566a3678feb75d5f702bcfb59ef4e6fb7ce09de5a4a33dc2d8fb5fdf74173ef718
SHA512950d9306558d5404832a6912232dfa96a2cab92db11755624f195a76dce1f0e2d0e97837e66ebb56ec0ff84ef6a6117e065e83dc95c95087a2a6a31b342560b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533e5ac7366713a3e618eac22167f1777
SHA183be74483e6dc12ab4df95bbf0c3f49824244a71
SHA256e3cf7d31bab554624b8a366efb885bb61a92b49d861e84acc95d0117b148b3ac
SHA512ab0352467d9d12a1513e6fd8efaecb41fb89f72c253b058c7c78fbacb91bd5e989456b8dc1f44eab82c07768cf32897d10148aec71fe19a81e2b1f0ed2ec500a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d465e07fc653876753d19d4b1fa9fbf4
SHA17f430de14649ddbb26c4b788410bf2f113e5d353
SHA2562a2c3d48bd96a174cb89958a656b13c6fc1e9ef74d4351ca86e74867f5d3cd00
SHA5129b7b1e6d0c3ac4bf85be39d25b4d65a6558368d16d7ec479bd6900ce7146ea246fc5c380a44bb2d6f110f727848d0e3983f5c8ec8ad3bc593e0820b698687410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c661e34deb11ed189d262bdc54ab44b
SHA1e5979db135618ae69c0b4e77dbe4a39a65e301d7
SHA256dc0c44a5286b4dbc330b76c16a001da380c484f7e5075dc8542547c6c62b87fa
SHA512218e82d9cc4d13676f99785af3f9190b4fb7536780a8b69da8fae191c6d3d06aceeecf8275e915cf4a9ef50893f12eb73890ddec0a0efddeab5528423351dbc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dd4243b4207d940784cec77bb1faeab
SHA135fdb1b26450b1541f63652fc9be384a47f20071
SHA256e5b39665a7db52d955df4cc00144d455348e4f372b7e114a1d357f102df43669
SHA512be20758f15fbe91f0c26d38054fbb14998a1a4070387e101f7d54f6ce78bfc750d43d3c3255f8508a5281d29979db0a92761ddba17b17c5073fdfd60224bdd5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5b85122533de7e9c9c8c670ab649b3b
SHA1aeb9065777de2e2dae3360e0ba8f2db274fc2ded
SHA256daf8d465e859cec0a24cc270b3c76eccfb6d1e2a24559dd11f112a34d1b3ebfd
SHA51240791a2affcdf1f47895dcb4ab0955c961e06cff29043c23d2aeff998253017e7fdf6deb1cb51adde3ad62869847650692ba5bd226818225ddadc16d79fce49b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c718b35b4869efcb61a6d0a35956e76d
SHA1a88d478a92b85ed104520e9df7ed699a15c10115
SHA256f51f6c799ea249eea8eb03a7c2c4b37fffadb5fcb349b1c84e4ce63dc644ca41
SHA512b259bde4e57c5c5ceb9b2c6a217f93f8f5768a736262d48c1d090a5817dd144e6354f028da8277853f830d8814528e8f320f0f1347a72f04569e1c0da7a3c46e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b68c159ebed8051100ae611cb3795ea7
SHA147b4ce4f8ac442efe9012dccaa7955965831538d
SHA2569c169839cceee539c65c5a806b6308409c17de019b96f1345f723b0b25cb97a2
SHA51284897fdeea4aaad14b0ab33ee572f58b3b408662e658c90fb421e1be954ef608c8f3ba3fb88dcf7afd0826c055ec30da4685c1958f6d3ed043ac22a88a9d40a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ce22aea2ee770a1e3b520307aeccb27
SHA1d9838e11434c1cb2e0d70b88b5a99f5f5d00fd49
SHA256f29b7d57eb63c3fb56b7f8f94c12738552378bf0b58885b5fe3594cd573db242
SHA512c68720e0865702ae2aac7c97350948f7b726172f2d6d01760bccd2754ed84acfbe304ce0241f8ad2266cc0df8034831c4dc1bb8f8d43cdb7fc7d011c35c49c03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de5a6ca55ad2424ff0a4be5f543048dd
SHA1c3374b1555f093e0ac0d72ffb1bf7a72382e6187
SHA256a077154845be9b3120b2313af89adb868aba7113dc1be5de388dba55c0cd55e9
SHA512bd6366de392783c117a094e21156e80ddcd7ecd15f0e3a397d6007891e064009db1abb6e18da6ba0fd4b6ef29cfe5779bdd12c5209864a97430be21d902c27fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff40faf03915547ba6e8e29241adb2a9
SHA14fc0ddc4963f885d923feead6542071c74a0b538
SHA256ae66656020dfa3815bd4aa4ad5088fb04e9954995480f217a58338e926bc7b18
SHA512a77147b4f78b10126342a890a1d574da9c9fa5e2db666aaf24138301027ff699dab1947a3d5a1c02d2fa35231154ced880c4feb1e5b967cb036d5fdafca066a3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b