Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 15:59
Static task
static1
Behavioral task
behavioral1
Sample
cfe9814a8c956537e2a0d232cc5722d4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cfe9814a8c956537e2a0d232cc5722d4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cfe9814a8c956537e2a0d232cc5722d4_JaffaCakes118.html
-
Size
122KB
-
MD5
cfe9814a8c956537e2a0d232cc5722d4
-
SHA1
70eb733dfe77ce1aeb3c9a4360badd76929d859a
-
SHA256
3709d6bd2418a10753c2c85fe80164ad483e9c166bb92ec5422ed64429326f12
-
SHA512
ad112a8806a48c0fa599342717fdba50d07097ae5719f701aa70587d7a35959ab1a65f6612ac526e1dc2d5f1f6adb98e4314d5b27b31d298e0b5b6d27f17d2cb
-
SSDEEP
1536:SJIzyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCW:SqyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FE703DB1-6C68-11EF-A7C1-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431800235" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e007f7d27500db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000035d9a2323dfa62c1a31ee335a8967c4495c8a35bc15ff277e4d1a91c81f70702000000000e80000000020000200000000a507580e3e7488c17912bb463ae1ca9be74d8402ab430f207232e41e1f850db200000004a9a5ede802e0257b0bea880540a29480076a3c45c7e72aa755821812a2e86a240000000b5a2dc40a795e5a0150f7a3989439702b8436836c8028bedd69927c4c9e9d4cf1d130eeae2539eaf0302ef47a0f54ceb1fdb28e2e87673015dbfcba5b989107e iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1044 iexplore.exe 1044 iexplore.exe 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1044 wrote to memory of 2384 1044 iexplore.exe 30 PID 1044 wrote to memory of 2384 1044 iexplore.exe 30 PID 1044 wrote to memory of 2384 1044 iexplore.exe 30 PID 1044 wrote to memory of 2384 1044 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cfe9814a8c956537e2a0d232cc5722d4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1044 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515e993b7c0b513134f07bde863d53260
SHA1ded4726e9a7031e256a4223a37a03209f126f749
SHA256ceddda273b3eff7fd8457508291e89d6939fafbd4f2d5910be133b97885a21aa
SHA512671115f34a686e98bb8be4b6310a0da978bf8bafb09c8e9f097be3b9ce1d8f4b71cab7defeaee6a93c333d86c46470460111b9c5baa46d9794db13eeb630d060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5421bf2ad79f17ad00da1a41d494ce392
SHA18ebb3a8f29d70f6fa234c1780fdffb64c749c8d6
SHA256eb439e04a1d83827b368ef4b8b145ca8f63afadcaab1517a0d6e290274c03963
SHA51249f1268757121750135279bc3e24bd5583f08e832dd9c720e97e363045a7e3b0c001b01f415adb94718dcbf8fd6e78f9f843da5347dd941cd7af866df0d67717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e331142f87c359d339632b9eac311f8
SHA1639ecc12cec9f9586a0728189a59828f07e13fac
SHA256aec1d5f9678da7dc0e09047d8f026208d4b7f4a036e77e3c10c0c58d4a85c885
SHA512bb55b78494dee05bf2e6253511cdc88611c70c21dc668cc3cf254db697e28042a00a03c347781eb51b70d2cf97faa5d1b935fcfa9c3e3f977320481745427377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550a196cbbb7043072813c4f7f2e593d0
SHA1133664f24df7ed52e3f9ba159b6f72e2abf391b9
SHA256b319081d52c06aecf94ff470eb87f304ebfb36fae90b1301513bd46324138949
SHA512ef109f708d887dff856c82135c34827c478c718793c29c0f788ad1fef3341a64aa9cff027337ca7397ebbf4ffc2b05b1c2e8659b9bd3e80ae0676a2967cc7b35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dda1fae2bcd3a0a94832b460fd2698d4
SHA11accd282f93f459e66308267e1e6bcee87f418ce
SHA256b97f10961bc4e92e2ac8c1754c45d1e45f25d0d1023ba9c024a933b9ebf48a2a
SHA51256d8b47873005a62d9b0355a7b2b86fb8c0eabeb6ceb8d5f6c52c101e20a7547cd87f7c786fb054a5b06de3bf7c93f54ae17add6755a05e798ee07cdb869c609
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50277aa48428d8266ef089ccb58d03afb
SHA1a59a9997f7911ee3c1a351784b9474991b7399da
SHA2569ba3e4799e94761c973250373196cb5f85836dbc83450677ed22bab33294f0d0
SHA512747d8fbf2bf5cf6adf47941183944c9a31f06194646c057e93dfedb5a3ef93813944107ed6a817cb8378c6fb793770542e95f5fc4dd55be762b93cf3e74cf4c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f69136a92fa453896650936ba7fa78f1
SHA1dd3c049ff16984653feb00643b06a4b6faa9e050
SHA2560bee0c1cee64399e561d1725c887901ece98fee0fa6f0a038fb44e560a0dd3b3
SHA512d9f9a69b48602ba093a5f0da9ac2ae82cc6a5d809bf1fc0af1b0504d79574e50c5c9a113accecb8a9914cf9345fbf4c37063469796a1421d68344a63e06b1456
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f34f4127edb46694bb1a57eed0c2524
SHA1bc35187efe63e4678a6cd31a0dae417358580c81
SHA2562799d8950d91e6a6e4ca14838de14e6d363a3c5e5e6957fc200aab6ae1f38824
SHA5122171d0ef22dc3d8704324456e96d15d4adbe28cf9cec92baaff120af871fd7c1f87ec1226f7e656306a238b26f5ed77a0e5af81f84a36d620b80d4ddac79c2ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d9fef8948f5133193446297b8d8bafa
SHA15daa93f787547d4b1ac2b625cf6c386dd7b21694
SHA2563e5fdd955da325dbe4bcebc6438dbaebc456ffeffcd95091e69a79820485859d
SHA512702b33b3d76e29da293d82b8b93aedde41e57b7c6f1571cbfde205ac982c3ba9739598d78524453fbaa992ff59715a05e20e89d395c889ec047e8b5b60647926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55df33b48d43fb6a8c97cad53d18a844f
SHA1c37f7974dae233b949b682eefdd957b11019a17c
SHA25639d3147dff921c43048fdf1a4135bd1c5a5a30db4902d93f78653bf69106cd39
SHA51270e2aac0039a1bd3098c40f6f9f92aa7e35398627e37198f4c39630ded6ba2a3790a98fef5c4c082d8704f6714d44bd8ecece43c31e53b0b4c2a4ab41676b681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7ea401bd831e6bb0fc7f7e73548aeac
SHA1812ca6454f831ce44b70d1bf415dc4dff06fd58d
SHA256288d715804ced4dfb89e9a49860d87f74179934d8b60c34d993afa14909f4a8c
SHA512295093c3905fe98bf1348f63a2959fa017ed6a00ce6f1cb6c0748876e332cb1ed75eb5a5c0e041074f38eafdf22ef6ffeec160594f1aec35154713d29bd9bedc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567cffba17bd9363aa9bf18bc6a594725
SHA1228a6f16cfb141728d9a427e590a9b8c40caba04
SHA2560e6aeb99c88a15f8fe9f7e3771a40236ebfcc8a0f4b94cb98862a4f4903cc069
SHA512d255ffe2dc9e5ad2ea658dde3040254fedeb008b2c594b96384b04117fa85873b47315d36191cc17eee1e58064e6d090a38ee2ce08c921f9c287da0416258884
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9d7338f4cbe96a6c35f3b01191804a7
SHA1f616e7d122638030362dca8aa420c895972aa24e
SHA256a9cfb207c6732c7f7bc546cd0be9cf4cf4f7101eea814a6d960c5e69d64523ca
SHA512dd633f730fa8b8072bc3c3cb33ba2abbce248f1689db6a7e4f1afda835099e0b21af800908816e1493c09f5d5a82c647dc467e0a16b635948966172db9efb784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526cff709b114789cbcadc25708d182a5
SHA1617072bbc1a0ed3d88d875fd215d335da63f4e15
SHA256a0333b55fef20b1bebae8e93aa681ce8cf7d7444ae8131bb1cbe2458f97aae71
SHA512a5e237ccbca1397b852b80c1c16a7a250d9bdca5849fe044c00f354839e091bebe2506e31c7b775a890a3e312f2d94c2435a6e399bf5f3c428c8730c0114a57a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af8852e44f9ea36b32a52625dd09b55f
SHA1eddcf1017b882a220821f95d641f138372297ad9
SHA25692ad0159dfb4845067790ad41eef2f1ca231837c52932feeb47b330d7c5638f8
SHA5127fb15d97f6844027da7d22c702ac3de8c19e2a0a2410039613bdd78c24927efbd759252649d2302e69c75077eba1a40f188a8a361ef1696dc314f13e7f66a6d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e6d927ef1d54afd563292869543980a
SHA13afa6fbf4cb1f9f63c4f32695505c2e584dcd454
SHA256640247bfc95f7a94a63aa21805be6ae7ff033fc3b8260a0e4096dd1c5797d2f6
SHA512d380c7f5348b42cb4f3b4797b4172b14a29d21d95d398ec903ed88db6d6035b85049e7c66c7fd8f71c6df98003acbdc6cc7e6f09af2a8b8ea57946b64e0c9c67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57641a6298e161c8df8c3fbb6f50c8e09
SHA1d67e9efd20b247471fde516eeeaf86978c03bdd4
SHA256c7d35050445d8154bb01567e14ed8369d989b6b8fae26929efd4be7e34d58961
SHA51290d13f304b736151f77440004819db14ab7f035b647621cb9f63dd864b3f46ae2983010dd74546f077f94987741aa69de1d823435bc1a16f78db315c8d69b474
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e292936971dd0039cca493d319c73101
SHA1fbfb615c11bfca49dca43679785d9c8c0c2d582e
SHA256a94500e02272366ff8badbd1426ad6ec09450446f4b8fa9592ab34e480bef5ea
SHA5126b84e98256282faa0c2209823728e5eff2598cece383dee059f31085b96eb076c3be81e1eb25adbc8b409bdd76491c338399eec891c87f217ae7a1752e85a7c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d16380fe080f5ac7bbee2ce09387899a
SHA1f0508746bb33b6604b8e710560d4bf5fce075d7a
SHA256555c6fa22a7bd85bf799f829af2f9951d74dd98c203275cce3b778df1f0154f5
SHA512101aa02d288a5457a501576aaf385e8bb0333b32ed8cc8dee7d8d0bbdb5bd39aa7244e0e9725356b7a2e39eee817a70dfc20c1d66b48bbfda07607dff23e343a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b