Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 15:44
Static task
static1
Behavioral task
behavioral1
Sample
cfe20166778f8674547c7a1f5f98a426_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
cfe20166778f8674547c7a1f5f98a426_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cfe20166778f8674547c7a1f5f98a426_JaffaCakes118.html
-
Size
67KB
-
MD5
cfe20166778f8674547c7a1f5f98a426
-
SHA1
c5e7b7dfdce591574edc5038a56820af2e9a2098
-
SHA256
98b3e45056c8026a9f5799bb0e456718b2f6ef4ea0d11094e746ca95746509d1
-
SHA512
64474dbc5bcc4da48c128e1b545bc6d80923f48622805f8601414b0f6bb86f2125b8a32be185cfbe09bfed1f4b5020308c687a349de40057c25da48e3747791b
-
SSDEEP
768:JimgcMiR3sI2PDDnX0g6s36bwoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8sM:JomTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431799329" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000e503939713f064ed9a153666edb67be562ffdcbbc518910fb588648b8e51ebbb000000000e800000000200002000000053fb929aec2beeb63c247a80829713020206c08a89cf90f2ccb481a4cb2209a620000000d9eed9b0645fc3459c72a154ad647fecf15dd3a6b33e2691aee79c1fd754b843400000003499b23a92fad2ca80c16a53ab64c234e03270648f9d188cc466bcd5f8ade0ed435b9486928544496010012f45f408c86c18494926c6878d44601dff87d38366 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 801770b67300db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E1DA2A51-6C66-11EF-9E5F-7A7F57CBBBB1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1444 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1444 iexplore.exe 1444 iexplore.exe 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1444 wrote to memory of 2756 1444 iexplore.exe 30 PID 1444 wrote to memory of 2756 1444 iexplore.exe 30 PID 1444 wrote to memory of 2756 1444 iexplore.exe 30 PID 1444 wrote to memory of 2756 1444 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cfe20166778f8674547c7a1f5f98a426_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1444 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dcabd7589e441d4968f14035139147e
SHA1d6ef0f89c68e05b7dcbba6d9223d8ebe8df2561d
SHA25615f3897631fd57f76343d4bd77152be7d13292cffcb87d5ebc33ac61c72f77c8
SHA5121d8207140c7ee861d9fcb000eeb42aa573bd32f1f65706a4a79e3a4e37a10c67e1f2985dc978495f45103be557a0f4e6bcf6ac54c07aa2849d6b7c0186662f35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56281b3e0c0a03a7a15b9a1ddfed6be0e
SHA162b6967a7113522920ef1311ef11d7126248ca53
SHA256f508368616a1e838ccc508f2bed83b247f60c760271985e0d405f015455d2408
SHA5122b97abf9ee689535fe1ff7c251686e4414f3095ad97a6ba6f445a7efb54e121dbc78f05fe9c4794030dcb9dbcc6b345deb1ae90f53bffbaa53b89b133a220581
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5680f56cb272ce563c7aef1613f0fb9e7
SHA1e832d7388702309937a9032cedaccf8e348940f3
SHA256e43d1b65014ea574cfab16c97d221478a6b8c98f70759b56b13c1573478d14da
SHA512edfae24a3551cf01d9014e3c540aa4fcf74a780b396cf72546915d3ddbd0a1268b465cb79a97f119a53608c273ad9777cbd757f4be235ef349fd74d9a7d0e819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54023ff9b8ed2412de3e2b601f095ae94
SHA1759d771f68364de7416ab61fbd3e63f6d49b236d
SHA2561630f2d75262b1380f14cd784effd7c67bf5adbeb591235e1e0e0c37b3310dd2
SHA5123232cdca39b48d8a77178283ad8c56e9649cd6f2ca2e31f44acf6bad148317a287433d8d86909b325d7aa12091bb60740f358799dd9daf5fb9850c3d5965ee5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a1698bb38a6bc2899815951e89a4aaf
SHA140a6e18deb9bc72312cf18b95ad9d93cdebffffc
SHA256a1b25d025908bc56e66a1104cd1a5087894544e2adb124f3f0ed9c80b8756f36
SHA5124558a820420bf991c7d99b575e865b7ed54512369d6f677310de4de3fd67a47ebf28fda597a171560a8c4e2b42cf68c5ffe250b7c332f8e93ebf3d53c939d657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553d43b9537621abc52b9b0293eb3607f
SHA13e3fb00f9dbb5fc52296a9af579ac53fdd15db5c
SHA256d8f375628d78ca0502b64afd1aaece5a3fb59794242fb9ca60e913b5f28aecc0
SHA5128cd72c417a2cf8e5fd5884e5859bbff0ee8aa9fb332a3373316db840dc24e522893b3e1dde85b7d508ca161e2674db7c8835870d78290c970ce5c4c780a0f621
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2d4ca5350c1a40b5c14e7ccfe913db5
SHA12d301f7bd4a5c25481bd11792f88c779a4727abf
SHA256541b33bec89781ca514200820c6206268c81b3ec0126cdc662860850a34a6c49
SHA5125541132764dd4ea3bf402e775d16b6e96cc5deddcab064765555545e53506ab2e72f6ad0f09fce5ac494e8c54fb6daff7a4ef14944a76e32771199580d94fc18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e18ec1075c8ce52c1a50617bf06154bc
SHA1644343e2e8fac4dff329da32d553973c13c80edd
SHA256b5562761cf29a7e77617a3115f9c59359fd49f247656989bf2f75352a5f2247b
SHA512227c85f3326f2983df65f1b659d8a426aaa6c0838d698ffb9e48ce4936e8a4b226803e21ba7cb9f5bdacbff992ebf31fa74a19790a1bb3b0a7385154177902eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a36abb54fb7d6036032eab38c6e4d54d
SHA1e7bd2ad560e7e632011d87e02d4989858ffb6c05
SHA256fd5dbf0cc180c8344aed697eb5c47044f16f0a2fc8db2d8d229bdc36e9d3b995
SHA512e70ac327a6052cd9384bd851029140d39c561a85079b58febf172dd615ae0f49a73f3626d821f5f96c886e905d401b7a63513c09e95f31f928a4c9b2bb782f20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a94ab8c7711324d0476fdb3e696e463
SHA1e705758ee9ebb4448a1f669c2941e91684462afb
SHA256272bbc117d4c95c29ea7b15304ed69f303c0a8a7e24267bc5e9b1bb4cf8463d1
SHA512995582d788002f3a414d91fee06491d7f594a47ec5a4b8f4d89124254bfe7706fbe8ff9ee860161f788f9983e81fd39106689a15e5c66a61c98ced4f019c4f90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502a40a359c0475afd257ac38f3b0e6f9
SHA16741925e159d6ea7229423fd12634b0f58d45ccc
SHA256e31af8926695c1106c95d08c721a17db442683bc9253815a32f301e4721563e9
SHA51261deece8f6c3d2609421d1b29729d21e2b03d2cb8f000eef70953a6c5224219d3bdffcf1a87dad86a0dfda0cbf7a2362fc1a09221c7b6d1407e44385e7ba180f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5a75570663694db0badee2695a235d9
SHA1b7747c019786cc6f57da132c6f80666a99102375
SHA2566240f7721a49e32a464ddc41e57bb5b481766f61377a4080595e3d449a2548eb
SHA5122456fffee4e3131d0338e04493b374fbd77914c545ba3378241b5e902eee10e40ce49181a968335537e8f730af0d81602b8b5f77afb320519497c9eebb6725b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd2ba5ea084a19bc7db0aaeb2a8341d1
SHA1f164eceda913aec9f49647ec4a97f62a9e0a855a
SHA256a289d4c7a125fa23dbc1fdb077f928925dd24f60da544a32842e9fac4872d600
SHA512cdf59a576fa20e19ef8eef5b56c3a31c921d413ed139539c7c9bb15a778b2f9600534d5dbea09f08218296716d6021b48f42bdaa5391bb692240136bf3820962
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3954c6348147eef61b7537c32614682
SHA1c94827adf6e579d92a30ecc78b18190ea8055215
SHA256fa2f1dc94a2b6077dc97613bebde7dc168f68b19d18332a6e7b4a0c9d214d2ba
SHA512177caf69d7f18c7408181f8f4a45d962f365531e1fcf8d676df3e937e00529914bcec9decb7291c64e8ee57f488446b20d547e20f8377a82e0e92bfd0420fc8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576fb29b4abf7e8ffbaaf8fa676b201d4
SHA10a552a784decb704a248a4b653bb820bcf5bd626
SHA25615baa2ac1cb2a7b68a04dea6641983b49c96bf9d46828754cb7b7f7d9c3b2b8c
SHA512c4ac8277cc5003d2dc134141afa2520ee1d776c1cd3782b65e9219e700d2d17400dd372fa78d67a14c3ed0e223524a5f5d0148bc75ca735a60590d09fc6a9e79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ae3ada9bb164ff2a8bb6fb4bf61a4f5
SHA10ac765b70235f1e2c03dc2db841325f4c3894c55
SHA25684d97a429bf615b889d125b8e97be0bdd407de4d5582d81d0be83ec8c70c8bbf
SHA51209732b7885b1d3217cbc0c0987975dadd84d0536819fd696de6410438adbbd62830b32f7b73f76dea84c90a1453f78642cbcd35390a23cb70c578ad744f9581f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f70b56ab16afdc71990787ac9a3c422
SHA1829d5c4f2f74e6832ad3a0b54d095a1d75e58092
SHA25696365587b6a6e3cf202129710d8dc2271531c025b624d0ba8e5094eb70304989
SHA5128c14a8d82b0639bfb70fe83f4b1657e11be0bdbc8f18d5bdcb24c845c3a353b4900ebe8da5f487996bcd623796efba8065588ab64d888693001034c1bd41c132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525ef3d2cde1ef5db6343edf77ba013aa
SHA16e2f4da48c7df5d9b602993ab725353c9c064d35
SHA256529ab05dca9edc16ddb2edaaaaf444afc621b5c8d6fa94cff9541479b51ce1c4
SHA5122d4671ff93843bc194f8281c7348098f61bd03ce84b0f4c2f790daf7eaf24d64d84f5bfaf02c159f9eb6fe8347d5ed45677b0888a10fd75264d6c3389e657713
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b