Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 09:52
Static task
static1
Behavioral task
behavioral1
Sample
ef8a1a4cfa0b466d70225747191e12a1_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ef8a1a4cfa0b466d70225747191e12a1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ef8a1a4cfa0b466d70225747191e12a1_JaffaCakes118.html
-
Size
26KB
-
MD5
ef8a1a4cfa0b466d70225747191e12a1
-
SHA1
cfa827ced642de448e32d17ae48ae17edf46af6a
-
SHA256
7874839d50811693fdf13c73fafcab19a6120ad732fc29a6defb6348cc69ff09
-
SHA512
1c8cbce7d90b1e3529d451e795139511bf585384e2747021af00d5526f7c0f9fda56b206f067cea56fc3251aa705ee8a2848211294f2139f5ccc9defb30d9cd2
-
SSDEEP
192:RsnoduQb5nTnQjLntQ/UnQie6nOnQOkrnt+RnQTbngnQT+x0m6Cr12BPQl7MenFO:unoIzQ/BYsMaIBOS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{419EF121-77FF-11EF-B467-D2C9064578DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10d5d1170c0cdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433074235" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000349beac53bfe81bf5a1a7e0a415d9694423117df8a006bc41fbf34138ac92573000000000e8000000002000020000000a4121c505fe618d11fa8ba3cd354b60c34ef70f03eebdf03c5da799ea1b4f6e0200000001da66bf98c59638b6f698500d9d2289f948c916ca03fbe0218f40a58c5891f55400000008832ce923f846099d060a8b2ada2cfe3e25d0e64e7f59a54744a31c5ec6524799fa66963f671dcf3be081e7d75a3c346ba882c85019897c7a4e7d617a75928c8 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1704 2368 iexplore.exe 30 PID 2368 wrote to memory of 1704 2368 iexplore.exe 30 PID 2368 wrote to memory of 1704 2368 iexplore.exe 30 PID 2368 wrote to memory of 1704 2368 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ef8a1a4cfa0b466d70225747191e12a1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b138f3d28013ac0cedef61cd13735189
SHA18e79ce351cd1ab4b62cdc0c8433ed9f4ddaeb513
SHA2569e6233ff42fb31ca4b55f4673a9dfcb0362e62f849f5d9fb2f95a485a42b3619
SHA512a140adc323b0c6d46a32a87e5bb461b10602cc4003acbddc0594195eaa8acb527b150a0a6451a4565c2ecead983d4b9905abc44fc14201b16087668f6596bcdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df9298cec5a9135c5e78b4211bbd9e1f
SHA1f62d74ca5651d1b1264a07a7703f0d92fae876e6
SHA25676de6e5a24b775bcaff0310b878aafc88684b152b4fc9bd7e1feb0b50e51fcb0
SHA512887f14a32a57d2710321e82ab9edb525352412bfea29f5178aafa74b0737570035bc3ee3e01f6ac479608904bd75236258f257decfff531f71ceb70a737d5857
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569c200c7fb52a9383ce72157bca6543c
SHA1a3fd30b790be6fdbcb7d5084684a9292c056f24c
SHA2561d168cc71c14662b3c6748a6bb21602141545787582c8f782ed53f5ac73b2118
SHA5128a8d602ccb1cd91188e9bf27159807e5c3858556498dba50860e2ece3465b814eafebfa4d8bd068e34784065cb6be1d497498ee5fd7b86a39e5696bedaf1fb8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e395a58d5081cde6994673fd6f7c669
SHA1f001af76436799a7006eb76e79498cb0e6a1549c
SHA25652e0c2e90720689d2241f0b5b3ec0da932a973ca84982929b6e7792d47e0c191
SHA512221bb6e61fc2f809f4d2496da287f224dbfcc0045d45533a72a8101f46b92867dd81cfb0bbb7032460c044ea3c680dbc4e145d205d087cf2b0672ed00d629573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ae07b87a66a5c1de435191aa44ba2b0
SHA1007a97e589720c814f94de28a7c9ac3a00752e88
SHA256c63a5fe7bde50af6627f520492ad827bed6e7f3f8cdf11467ca3bdd56ab1f422
SHA51269814f92b6d2c9a9b2ead674bbc4cd6dc88f628d7eadcfdbf2eed987c093b56539a4a9f6a7655c45f1095817b97ec9991730fa94ddaa27d92b2b25275144bb05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51877fc647c9d0567e9f4db651752f039
SHA18962c3544320ea88e5280cebb67c5d12d03b2878
SHA256d6b806113af18aed8d1093898e65d5abc67fafd8e42929efb33ebe0091b361b3
SHA512e6ae028325c256c57ae35c62e154d6dcfc440ff135d537eacbe1c8fbfaf831fb61bb608e2fd813639dd3ff5cdcac5a64e3735bbb2e98f69e9903d72a34430932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543bd579b18182e7188158b0866f67eda
SHA1d6abbed9d83f85b0fece10f4e0a0ed108c2d7c34
SHA2568b7119973ba141f061c3c8d5ef27217df0680c61d24b383a60add2a119955282
SHA5128c7641ac8e549dc6a883bd7feb001e30c0b135c6b5b5a8eba12a49b8c91fd25436f691b6bb4bafa1b4e25bd49f0cb34d28a40351243db2a614729dd057c90e36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50998255ea3f38bed474ef63944381f65
SHA1f074e0a1708f4e3b8c431e3375a51fec00f2e52a
SHA256e243484c5427c9b4aeb2e9945c6db0b7b5b7a86280fed5c66fdabaae0bbfdf8f
SHA51282527f03d17e6ab36da5492b2133952983a23d407f1f176137e5df79702ee1c4e2359912b0f9dc02753102bf640e054bb2ad5ce072774151af2bde662c83cdf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef28b0828828cc2c2223f4d2531f9605
SHA1d0ee75160a002f923a53e83c07d8329c6c410219
SHA256b721b9009af631379a52bd0a33ab115bb4312d6875cf09d9ff7fa2eece28a189
SHA5126ff480c127ecfe261c6147cb03dcce9c4921804d7a230328a5cf1077a8ff42c63e5ced17aa5fa0fa236f1dcc730aa838cb07695a012458dd4adb04206d904d39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d09dc34463c3d1599c5b8f9b92f7fa2
SHA15de68430659bb242051f13bc0ca635b88b3be9dc
SHA25661be7228f00e6a609b548be678117c1704d8704bcffefdd06b4b710ca8030d98
SHA512dbc581c23b42f4eba7afc8fad1bd69228304308082149c2abede362a0c06f52988cd5f39bec37f59dfbf3c905a28fb71e82a238f045c8cd6eff32dfc4eabf430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe837441c86045500ca0b52a01010d96
SHA15afc0f9f38cbaad5d96a1a3cea37f538aa8d6c8e
SHA2568184399a2c4ae0e6b3df40e919b1664c5b4b6112376c1169043e51ecaa9d963b
SHA512fc919b5806db08005ebf40b6cb81dfab3a9fa7e2fc72f8c27af78a7eb9fd820ffb982afbe92079ef5426057b0053859f8d63283f07a2889925b7dc8502e0104c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcf3d425ea73a2d5487dc8f9599b667d
SHA1282156374208b9508964db48c28c6b913891e986
SHA256986c75a94e7f6b3028d5b73447d46b58ad86b41fc1c7f8c6f29181429385829e
SHA512bd3084714ffa64c8abbc64535ef8f89e771aef96d7aec217c2a4397838e340c9efed6ab819a7a11a6deedb21a81323ea850ac9c8b58d1acc0ffbc21bd4bd2e9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50031bc3a4d3d8cdc9726ea64e83a5eb5
SHA105890d21cb450aa560cda215a0c77ace136bcead
SHA25667dba872529484434a7226fd0e3b1e6c83734aefe64be213d5611c8533f15ab3
SHA5129622b9b07b81eb0797fe282529b431807963bf420a3797642d05f1910b3120112d48a1ad768a926e39153c2c90c2332ae44e5189c006188a438f13c09034d8e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5888a4c5250506291d8c7a9934808abb4
SHA1b087841026850b8ea21fee466c1c762ede788e12
SHA2569f437337e6697f9fdc8d42a503a07b6d8fecfb697937b6fcf505276e9c7072d9
SHA5126402d3c9dcea2e64a5b71ae537719a0285d2e3c3da646bc84f5a06e629169e51bb61a71ecb88ed105ad395270e70f88eb5cab305c4b6123ab389bf5efed23fdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59761591ab7034d23717fa9284c792c04
SHA171a03091dde5a49953781193de7bb8ad485ec272
SHA25631ee5d6a7102dd319733088c0934c2b5a94f0179b2cfe2af79c5d4c1a51b8f6a
SHA512a14efc08c96f9165884480d6b4a59a995c742f57582238d3cd7f4a9e6fd12d2e8b1ebaf456cd44876df36a114044ed080aca685a8370a2f671d0eed836724723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e46090e46a85ca002de75700eb4d3d0a
SHA1048e0d9364b5a1fd4b20b5c13bb4ccdff8329c1b
SHA256b16e34af84f8573925ff7409d651185c3851dca5b656a74c483802bfc186f2ab
SHA5122bc256af86bb43ff00a60956a856eafd1b44d1c57e7e7075f74973bc5bdb2901e86438b4869c22d69af774636296f7864102d0101544028bc5ac828781ca8786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58eb00e02881eb657660a6ec9c45f163a
SHA1eb155d2b15e1a37d15221c0a48b0fa4160a1d947
SHA2569ada767f5b461d471a4e47ea3987155f8b03bf50936ad73b5b7d54f65fb33f37
SHA512968f7b82fdacfb720a9ce435520f0b4c8a3fd95dbddcfb1148fecb59d1244d6a72686430b95b4d29c4bee979519319c4da0880776e0ecb13e64617c2b54b438e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b680e1bb8efb35c500e0820b060ed190
SHA1f99df5f3fb65c6f2af6abba137882f8b8e530375
SHA2567cc228ac51930db336a5b777b2cf5a1708c95ede196dfd6183ad03b1227be37b
SHA512255ef2113b06b1e0ece61b94ce8fbfb7c12b8273a57bca4eef4665993f84956b370aada13f2cfdc95ec1dbe699b8ea2c53281909848781faac1cf50b468ffd02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aadf0b571ecf36b31e7590b34b2c665
SHA17d212173d3b7f649241d94f223718c942a2bf075
SHA25643b96fef89d3f46bf4b1cb5dad33a49fc728279cfa47680eaf87eb90972770bc
SHA512f32f489cd268f9e35400d1ab899fdbadfd47aa1ff3eba139819aa9d223507f5664041cbd01be04f5df0dd16ee048b68d3236bdd01404b88ba5f199edc09d60ce
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b