Analysis
-
max time kernel
133s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 13:24
Static task
static1
Behavioral task
behavioral1
Sample
cfa20f1cfb148232e6d29bc4fe47789e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cfa20f1cfb148232e6d29bc4fe47789e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cfa20f1cfb148232e6d29bc4fe47789e_JaffaCakes118.html
-
Size
4KB
-
MD5
cfa20f1cfb148232e6d29bc4fe47789e
-
SHA1
626496810f0802e1675ccb58b2415136a566e963
-
SHA256
b3d97195ccdd038388bbe65441c7b160eaed412b27c98ffcd90feacce60f00b8
-
SHA512
749b7cec0bf7353268cfb223e367e586e0232b1a11017c6957cd7b4f44a05acfb57c0c97c5882bb12fdd1868b069c9b7d6f2aeb82342af670fb9240f3ce34db5
-
SSDEEP
96:Pk7hJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8ogd:Pk7hY1aEFHVKtF37sNjtXATIQFM93pDX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{557C46A1-6C53-11EF-846E-46BBF83CD43C} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6010142a6000db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000002aa8d52fad1f7e3dd8fd09ff3c3ac0a792081de4a820de27104447ff27954d94000000000e800000000200002000000010786c300e79bda07b226623f6d7bb2b52e7bb3fce91c49931fd62445c5064132000000021ce71800443a96355afbc70df1cb52e9afe6237ecf01e85e84cbc04a41b218c4000000062c02ce0fb6f6857e234b372c131060934ca30d6aa43b3368669d0119d9bdb53751b88ffa9663971cf1bd7b8d01674394a51c6a8098876e7e7eaeda1b7fad644 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431790932" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2160 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2160 iexplore.exe 2160 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2788 2160 iexplore.exe 30 PID 2160 wrote to memory of 2788 2160 iexplore.exe 30 PID 2160 wrote to memory of 2788 2160 iexplore.exe 30 PID 2160 wrote to memory of 2788 2160 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cfa20f1cfb148232e6d29bc4fe47789e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2160 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58397d932c4b69dc041437bba3b88ac34
SHA14b1bd2670d165b1850d3211ab613afb3ad5a78e5
SHA2569850e7797e050079b813da2b538cf075b5ce77d23f23311cad68340673f69bf6
SHA5128e620801b0a3da04031eabeb03a3ca9340fda0bafc170e564ce73e4dfce6b1a0dc65f6e1ace373ff81b6f7e46a9bc975b4ac7106a5972d8ff202386f6e9cc5f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f73a6a97c5fcfb39f0b34a0019a7b6f
SHA1a0466a6ad35ee49d3bdfb316e44646485a16dd5a
SHA256b19da93c1e65d6d9810bee9e2e0e983e3185385b4b2ddedfe7fc5465c54aca26
SHA512a0b301ee69636d0cd5476a9585f231dd2f925e5399a2e323c30ca8d3fdafdf9a4c9c97140e56b122488bb283ee79c59598b0d5ca46aefcf7570eaf24b51fc132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9fea42edffade2b8afcb0fb0152b5f0
SHA1dae1d318549f4f1d7060ec3e623bf52f45f84618
SHA2564d3b2727cd350df46ecf24744ec0197ceb5776c14ca375149957d91fe0c66822
SHA512fe2a7ef2ebe4b567a15a6ff42c6ef1c70c8b351b8eea2bd93300965bb02c72153e3bd06cd9f631f5a061ad69401d7b84cd5d05d77d45b0e06ad9486bdb345d97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e8eb1551f495ce7363fb4f3593aac43
SHA1fdb0b46e29947f26aaf7323e5ee8c16f7cdc9a03
SHA256e91afa7157e48388c20c4882dd05136225a3392d22392caceb8e02368d1ea553
SHA51222348c800aba50fede4fe9725b84fe8bf12b43e7c4d904f356b69a7ca51ecc57fd7acf0ed06b356c4d631c75ce32d9deb802585ea016e7359e97bafd05fd324e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5554414d2b10871aa45d97d6158a2000c
SHA190a4c27aab9336ed9f069b10fa5c7edaae3fa1da
SHA2564fc9a852806f47dbcba21fbbadfdfbafef63adc61eb153e31cbbc0a0f2d144d2
SHA5122a4f29a38d922f13057d91b06ff003b420a8160a430f6e02f143655d2755ca091a6cc8ff30a7ba5b01dbaded060223624deb61c59638b83bb69ddf049e102fa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ebfe70d90f18b19ca1e60f839c9a663
SHA162d62985d4a373743dd4133808e6abab0575a0a6
SHA256a0243c3626a31d0287b184469272ec3e1f79124a205d4d0eacb4eb94ff6eafb2
SHA512a3711b10f07a275a1d0808f46f95226012bf1d4b9121cc8bb111e73260332bcc81260e9ca2b3f88cf77512b5831cfd319a1de519f411d0e7aee86f0eeeb72ce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d5f17c140820762d1fe604bbffa0008
SHA11506da46abf25f99f744a89bb45fb8f7a83555bf
SHA256026a8798b5b43fd9fefa6e01e8b7a5482a1709da2b4f7bd818f78c90cde74d07
SHA512c3f4a275e3eb48107ed3d3878fb1f51572f15bad8b4aca5d98604df20f168eddb8d6bcd60324fd5b7956cc1b0c3c7a7291ddc95d1e07819244d68d8febb1822d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5423207dc8e1566914e7a1c95a5b84c5a
SHA19e146b3046712d4de50d6a12be51533cd920705b
SHA256903bc924e63f78009f2dde9b55ea86c6124a15586888e4553e7285579d43f421
SHA51279dc345645063299183e8a2799b613ad948f938844a32fc8ca7d7b3bec3fe7a5fa83947099d305b599f7fa68f79b722a3858dfe234d66968c3b00c2fb5890070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539511da729488c248c2dafdba78184a7
SHA194c7883ca7d9bd52ff6a96f7cb3f2a048263a73b
SHA25660406f7f6adf673fdc43fe9845a4957d4cdddabd8cdfd1a4f97132145dca1509
SHA512f40be0e7aa0cafd0a7fee46994a379b7e61a8442913c7aeb7dbdf955dd11d7febc3b1d2f6fcb1a5ee94e106ecf43c96e136a4b8f3b78f00e7d558ad0b25fdb65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efa301f0343efd0c33e1331ada451d18
SHA15e7afa9b9280cefffc77a70294ced46329cd29c8
SHA25623ba74504719b3064a8542b4547fe8787e1384baa1876a9e92638d66067e8558
SHA51249ef206f767062ace21671628b544fbf84ee023960d33189a8b8f4fddf50af33365a232499629cb1a9221d72deff4e70ea552b30e0c182382403c8800fe9e327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ba1bfc440737fc6ef514d63ea094c86
SHA14a59932e93c1af534fbff34fad06e01cd011e171
SHA25619a9029cce1b758f6fab734f49a0ef6820c08ab4876924bf9c6ad6a9ca1b7cfb
SHA51238907aa658a4eace0f2931ae5730a55e042f401c108b6fc6320ab3b12eed9997d5d445cb8e6fdc52c7cd28078031adbf5decc9eb15cc96973d91707c752d8f2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594b76eef2132ea89ab821408b0648081
SHA17852a4965045f9538f34898677490b94152db4ba
SHA25666db07ea7e68f12c7a5961cf5b7fda95f4d2ece0ebcd70ee7ba82ef70040bea7
SHA5127a9b2a5d158fe24bb7bd2a04d164bf21948c27dbc06a2646f6f9e3aa53b4203c337421457e7e6e86accb1d05d9ad66e97972dc605636e5637b67cbfbac0ed5b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ac667a251ed80cc143f8d58a604803a
SHA1f43cdfc7e24cd82b979d61787c23d5200f37aeae
SHA2568d9d96fcb168f919b11448f2d1663cd351bf483627d5641d73766ec4ee4a32d9
SHA512bff11e5c6705fdc6bad7853f4916efe0636e8eebf7d3a1ac3848befa56f7ad4b7005de98c9fd0f0f191ed7dfe3bc9a98925c52f02dd1b9b1e698448634f67ea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdb433074ae598c7e0bb4a1ccdf5d7ce
SHA10cc7c72628e3d5a15e075f83cd3802b3893329ca
SHA25698cd1c13ead92321537087cac153590ad2bfeee355aeac637676852b1b02ee8a
SHA51259a174290ac220add4d2d972ee2b38898f23ac7667e1abef36479aae264fabd6a88bca51a76b664aa3b4edfbdcae355c98dc4dad567e7e7bc3a13ceeb61c7d31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551c3024d7dbad93ef4ad8f1da0e6fe5f
SHA1d53bbb305d152f710e8a3cd785a9746f50c22783
SHA2566da9f2d4499fdf89d782ce4c044753af154025d3caa5436d03ee9a96e44d6df2
SHA512fce9742b2d5b7934c9b660c17cde84e4c9a62adaa1d47009e094f9b3699f10ad9bee73d21f9c96e1a45fb70895af9291a014d62b134bb7cbe9a4f812358b35c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feab3493f2c5026604c95c823c38240a
SHA10df728ecfc3f7ef30d20a76c1c751ec7ebd42882
SHA2562d959d4ab339b9309d7c4af4078511a0c3b107896d5b9826c9cf8ff9c70df355
SHA512969a146d17e38b3b81bedbc9d69a871410e27bc40fe523faa12dd8b6c09c26d0d281c45602aadcc3407089b69ac408070d76e970ccef57206122c1fa5beab7dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552d923130ae22006a047ca14395feb48
SHA19135a64719fb3e243473f6e32ad0b1b32cd15299
SHA256fe9508eaacbfbdcb3df6c1e50cdf87b8b0d486e1dc32a44b3efe7bb96c1786ff
SHA5121146f65fb290d1957bc890ca505ae1869ce07eeb86930c937ee6cd5ac8c409c65db6f2c25682e46c30579fa8c00d5ab0bdbb236630f43e1b5a08197d900efcfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599362b0f73786042d75f87d89436e35c
SHA1bfd0b889fb2287def69b0f2f716ebb9d4ef1b72f
SHA256c4caf47935e8b741c90699f04e8cfea9ab1518e713df0e55a57bb1afb927ae90
SHA5129ac9dc83d0b2605045ded999aaecde8466f7387b3376d6901855856fce016bbcb1995d5c81e6f7eae58da68c7193a478b2f10fe82f76f244751265733b24db92
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b