Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 15:52
Static task
static1
Behavioral task
behavioral1
Sample
cfe59d72215b327ce13360d2f7f3958a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cfe59d72215b327ce13360d2f7f3958a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cfe59d72215b327ce13360d2f7f3958a_JaffaCakes118.html
-
Size
19KB
-
MD5
cfe59d72215b327ce13360d2f7f3958a
-
SHA1
7ff49fda658175bee1c78f32fb4c04190c967b36
-
SHA256
c9e697d4d3240431eac457963240ad68651b3169198b6960c3b5ca9ec42f289d
-
SHA512
052494a201414a8fb9a991de999dfa03f0c7d7f14d3523a893a2788027073d2e2a5940c43d2f6e43e6a1ce0bcebbb5b24b050bbc635767f87b71bedcf101f4b2
-
SSDEEP
192:JLzEbKnBnQse0nH5nsnQOk6nLsnQTInNsnQr/4CnQNjMxnxnQ70n8nQ6FnWEsnQ/:Nz5nDNvESpxXQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FB265F51-6C67-11EF-BBA4-FA59FB4FA467} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000062c35985289cde48ac43328f3a142f6f1ecba2d44f792d1ce55d61aa2f59db4c000000000e800000000200002000000007496e4cfb011c86cf35d7dcb3afe48a8121c262746c79633752b81804407a6320000000e0fd239d5baaba3b38a7781f4184e94076e29ba4afb17b9e60129a943500924b400000003cc9a3ccd92bc846a9e5cc495a235e3893040d92b1fc8064a3728d5503d92b5eb3b5a1c83537e023db4dd550c6531c347be7b400dcade2cdeed1f8c8d1bcd0cc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5025afcf7400db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431799802" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2784 2188 iexplore.exe 30 PID 2188 wrote to memory of 2784 2188 iexplore.exe 30 PID 2188 wrote to memory of 2784 2188 iexplore.exe 30 PID 2188 wrote to memory of 2784 2188 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cfe59d72215b327ce13360d2f7f3958a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591a1770361bd71898d57b397380eea25
SHA1d9952e8116526906a96f4e02579b43712804c49d
SHA256f84a3c27c148f430e399cee75cb70bf380058063f9206f8b958f0e1ec953faf6
SHA512b86e716e10fef3f6823cdb73b9a1e0603da39745a218959ee77b7ce316b05446e38f8a4c96c4fa47048597e1098a663b5a3fe3bed8c8a03c4ee4fdd69b85bb02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5045b3147a308fa14f7ec2f67f151bccd
SHA195055aa61862e4d3a5b9718cb01aee2cc93bcd98
SHA25632f482eb0cfefda14e88f38b35c99664a8aaaa04cc20bd9eca054d94da8deb5d
SHA5122e1b7d270f33a6e0b087e80941d5c538c22e6f02c1ac0eb836e2f5df0ded5af7421efba7318da83407b895d05248aeba490adc00c543a5e92595b2c5ad4fe75c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1c9681573adad57bb6753b4be66cda4
SHA123e465212fe8d6f524bee2d5c09991db2c168550
SHA256e8d349efbd265d7be29f79c26f0561434dd22914e986bcc6a00b75975a1f38ad
SHA512e95c5753436e7c35bc00f3874d798ec475dcb46f438e2c23e9f61feca94ab74c852cda1443e256c3c980a02b335b3186b09de86c8738b3c44482e349a18982c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b593ad0c5a52df0b02deffbd09e08ee
SHA15238422a3e0ad2b3008e4663194b88ddfe0da520
SHA25643a9ae0065b2378ad9fab250ca926f8e327a72120db7e013cc36e13b26372112
SHA512d1e1aed4fc4d9c0d011f2feb7d84bd9691b5f74ac7e094f8a65966987720d273fe3c18042613a51114a0c3ed8c4191e66a5a9058505749c73497bf04e30b46ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d17138ea1bf8b70917af883ec41a5d4
SHA12b76aaca328198bf2be03e9dd85df308ec052b2c
SHA2560a8d3d3402f825de8c2218ad470559dc8da79634dbe49e8b055a105e6b275d8d
SHA512d7217d0551ca31363e983fbdb305935a3580b3504cc5db71295e28b0ccb22d20c9945b3ca22ad3cd45406faffe21146aa00a6e9aa651468d6096b1969f204aaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f85478ae8c4212435e0060024a5069e3
SHA16453df4aed51042d69f4e4924f718a764ba21afa
SHA25685e34e3ed78048f09881cc0851ecbe4c379b66dcb554b2d35e4040ea27ba3d5d
SHA512a52a0f7db767764ebe9f77de09c5ddb2c7b6b6351696f2057b4e1d91766f7d90294cfa50880961149f031ed6ff34a6ea2f24a2d810640886eff4dbe28b9f4092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bbca4a5c092f2b8a551992907286162
SHA11641dc60767e3b41ec696c30e284558eccb1b4db
SHA256c961dc7099ee4c1368b0763e0cf18c721bbcc50e8a762b93d51563cc2b435407
SHA512ca6d024c5d21fa8d6d81f8c9434debfd5bd75762c3e5a4ed1461909df06ec62a788a1b49973b019edfa66e498ad107448167e85d0499f467d65c8d292f931a11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e185f63c92a37dca5698e247a62759b7
SHA128e88cae7d86ca9d3ff4f48a085cf56adaf483ad
SHA256ff423a22b27147b490c83ee5558026215bb7c3b31cfab3ed13a5fcdec175a6e3
SHA51244164a533dad2b975f7b766db216231469408330747084f5cc1a36e035f2c0813263d1a076db8dd280573b1e50229962c2ae0ddac4b0d9ca9de9d253d80b9ccd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b684eaac6f069f6379b2d28a7a7b25c
SHA1e560d2bc4e115d425b7ee8506090415623b73d95
SHA25675470cc5d31d6934c05f1ad99d67c9b22d4b052c3c87dbe77a78b12434ba5755
SHA512725b75bc50894ca132e9f28b5304d531f6ffd601d2f05ea790a9317523f16fb5e0e541c85661bbe31804b07ebc0894e61b5a8ef1f1e4d4756003af7a5fbde927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d4d8f260d6f14bc8e2bc60e8d2b5660
SHA11ac142c4d4298e9702a0729c32d4e9360b75daf4
SHA25696716eeb04194ccc82d61797e0b51924b359f44712071ddadb88cb1048cfb21c
SHA51230bcf54c70e13517f8fe7c2808364858bcb9378af8b60a2c13aa0c6d2536af8145443218777cbbf3cb61894106918630b638e79aed8abefd9cae2db809b9a111
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52861d38fedda2f479ec18d59985c8a0d
SHA13c4c7b91ed8825926350965be642f32905d1687f
SHA25613681af261b3f35e0796f29283a6e6d71c6bfaea38545f006d8461611b71144a
SHA51251267f4fbc8fea491c835a03747c8f9701cfef871ee1fc7a283d6983a8964184b0ae8cd877da087f1ef956f1dc7c74f11e8c24fb005d4c79ef6a49021dd9c8ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57acdf3e25f0685ad381311159bb86a69
SHA19a53958588906ee5ef1815cf8e4a9298913a7f8f
SHA256ece6440f9d9cca3741b8be939085e08f876c50190716b119956eb6a2ad7c4284
SHA512ecec569b26458fe1f90c5d04226b9c205c67c339d72e5485b0babd183c50c531f61624b933c2a3c3c90632493f45b3ba42bc9418c77d04b2c987f6c83b5b6da7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5456851fc83b6af799111af733a6f93c5
SHA11dcd9e15881335de78458dc25a75166ef241c114
SHA2562e6af40c90825e15e0d6e1fa9338bf288465645b45bfceef1f6330d0f67291fe
SHA5127e258da79465ff6c1732f0d065a95f2dfbcc0de3c3105963fd21512b3581ea5fdc87026052917bc665a1b7952a092a55dfad5c69b71383ef7b85b184b14d91ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5133f6fa2ad88a5f931ad47091fbae37e
SHA1baba2815a50d24d9bb094bc75a271995fceb9c7b
SHA256fcd13da99c47acc1b9d129eb5670d1f40388953327d1c1b7af043f6f4fb84f3f
SHA5121659df43799ca2662da8a9033ea3d918790b9163dd572eb1e7a560ace74be1645f87155affbc494a3aec8609d298ee7dfca5a88abcc6b708224f5c448c052d49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586ed75fce276552c0732019fd31967d6
SHA1d212bac24b1116b9c79764e9c7e2eeefc2d5071c
SHA256b5b01e092ca82c53a9d64aa870a49f50985a402025ca3011820580cb193d2352
SHA512cdcfdf14e8ddbb1f5fbdf852477234024c53a828867b31f1125ef1aa08587c1be101f48059dfb635dc927cbef262d1f8e64c36bb886b64cc2dc927d09968d879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5655da094a22c74089ea07f5c434df622
SHA189d4f9361710b37ea3c0c8cbc448524f9314eb07
SHA25649e2e2411bea8847ddeaed27dfc67a755e6e6f2b2921382038e82ae5ddc3438b
SHA5129b1973d5ecdcb0a4e926f871af4ca2e87cdfe2d55cf71559c0c193ac148758bf13dbe2b420e235e9aa433fe35782dfdf48d1706b525b9a468af29ca0aab18802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed77c438a80fe84c1ee81c0b1ad55da3
SHA1c28360603decc769b6216a812d9c5d415c665384
SHA256e1484aa61b15e9840f599be61bd204d4f2bbdfc7fafe4638b5bf0687857325ad
SHA51226eda6945c7c490e10b58bfab4478f96a2f016d623fef3edebff9cf099e59db8d367dceab506a2e5ecd00f6166048481a4909c6bd87cc3ccc28c227b579f9598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b76596d605dc02756edcbc5cebfb1527
SHA103f2841cb90865dc02b0e01b0d1b5180819b33e4
SHA256a65e0fa539396cba177664a3ce72389a66e3fc384cc930b3a21c5af44b66ae9e
SHA512eb72056c3deddbe3c18d5e4493b34aebbc5636bac2badc180215a2a4e43843187880c611796a1df1385c4338c7f123bd7c0bb53cd2a81a1213837d53281db325
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e09d920299efd6de9dbc2d76ab15fd78
SHA1a545867982db9f7b783220fc714936b47b6d4be4
SHA256a3baf21c485220402a1ef2098d262d985b4662cfb9c377ac8c902af03f6553d6
SHA512b28b05ed2db6813e9bf177cad6b90e613774668696e494ff81f129760750f4edb20e6d88bc5bb15138b90a3acbf14b087de200287070efd26abc2e46e82630c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a67a105221d3f11dab76cde887cada6c
SHA19b1b66679123f98d27e90ecf2d59fa95360d45c7
SHA256d63bc49a3130c8bf88df36849e67a690f0664b559ffdb8b20e344681b4e6c3d3
SHA512e6be611b91616846816600484712eb53bb9356c93ea68235949f9e73e7be4cc54a0e1652861d14d41b5ff818387d568e6b6e15aa601cac391275634be9d74a7c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b