Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 10:10
Behavioral task
behavioral1
Sample
cc6f5ce9c634e4314eb397f8dd1b144c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cc6f5ce9c634e4314eb397f8dd1b144c_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
cc6f5ce9c634e4314eb397f8dd1b144c_JaffaCakes118.html
-
Size
5KB
-
MD5
cc6f5ce9c634e4314eb397f8dd1b144c
-
SHA1
45a701855bcb6166ec6b90fc3f37d0c2c2c08957
-
SHA256
5773a66e38797528755069e92c8d7c0f02adab00cf75a9a8d6a82e0f11a534f8
-
SHA512
a4534d3d7f50481a29ae3aa298573ee0465328b2a867b82978f1b4803de58425828d0e2ed8c6de6b491e65844fcc8591c8ee3bdb6b1f24240a63456526010c83
-
SSDEEP
96:8y+cAl5azln+DtZognu+mcCAaUyiKFe8LDmmIj0:8OAl0z8DjX3FaOKYQDm6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0546e1fc747db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a91fbe138c26624ab36b8bc38ae450f500000000020000000000106600000001000020000000b31c88b8ec32da7e65d895951fdcf5049cde3399bedf99609b8c28c1d6adc789000000000e8000000002000020000000fc39b90816d2b87e8619eb6d57e2edc1510a2e70440d4b7ea30daed55619183b200000004c80dd8135cc6edc903f31b6884464b932a743b671769f533270265b8aaf6ced400000001e21354e88caaf9706636dd62f9d8acf4a210fede4c03fd523ec57a7dfb09cddb27aba406129e54e0f9b9091f80e43749a11300a6de66094e9beaf4862256194 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4AEE7061-B3BA-11EF-B267-4A174794FC88} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439641685" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1548 iexplore.exe 1548 iexplore.exe 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1548 wrote to memory of 3036 1548 iexplore.exe 28 PID 1548 wrote to memory of 3036 1548 iexplore.exe 28 PID 1548 wrote to memory of 3036 1548 iexplore.exe 28 PID 1548 wrote to memory of 3036 1548 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cc6f5ce9c634e4314eb397f8dd1b144c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1548 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5448da299330d7e4439e333f98af54ff3
SHA16f6562624bf010fcdc23860957fa2bedda3dc71e
SHA2566e842afb8c5a891e91220903f49910918b24d38de17b443be1da5ca2aef13df1
SHA5123839480d1a920f64e6480a1e8f8eec550761e5ae50c2436f40db1781a3093a521349aa99f1f9a4fcb7e396784307069a277dbc8f834eb32d09f97bf198ae2b3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de12980c2074af3f30739575ed031402
SHA150af72c2833f0beefd2afb3f682f757f0012234a
SHA2568dd764f17708a4cc1da1e56496b5e74acf2aeeeb4cd534b44d0c7b0e9806a5f1
SHA512ef81625daa0694e3fcf33d1eb6951568fb2018ab4ebe61967fb0a3287301a5f00afa7dbf3e2b1e3c9ab3247b7096469cbd532e66a8c794a7433f1659126e59cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1f7cd1464453ee433ba24f41bae1d2c
SHA1a0a911e79f3357f71aa69e6a15ce6f36c2b16a79
SHA2562b9b6fdf021d9ae28b3045cfa446a8e1e96668039c899e428ed1622c3c7232c2
SHA512a6777c74a3707d75156954eba2729f4f38141c0cc942f950eaf2321c0557e0920c467ed8d9cb9ae428e61b22653ab7ca2d91e198f79d2ecd2eb884590fbf7356
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff7dda0a31b78402bfd4e6255a658442
SHA1a8a6c4bce570b24994329107d74de9f1065f5add
SHA2566752be004b081b1e75239c24935ce9fbdbe5df0ccb607bf5aa6e84a2634920db
SHA512361aa63b5aaf15a3733a3937dac18a5ab62ff0bc3b7128dff626353db35a37f8f6329dc8cb58a3fc154c524116d8a9bc44763b30ef13cf4857f09c4fb1c59ecd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517ae4fd50a031fd5a702be2317582aa7
SHA1d2287257e9c3732fd6a1ab17a8552b4aeadf1e67
SHA256ded01e46675ce261c7274f3382a0882b327eda21aceb9e09b302fb47741e13c0
SHA512d610795f535294bce44041d2e5fb09d19d5306fa35a7c0c1b222dd822b6ee86388a22976f9ccabbb81d2f5ad1692cc652ce57f83d27de8a9653c79b095d49dd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d5f3b3b5225f2c77da246c1e1dbe982
SHA1f929a28de36e8e24e0be571bc6d0f846f408bb24
SHA25688973f931c677615c0d2b861a5c024edcf6af3226dfbae30219a04f4f01a5000
SHA512e87d10fd0c8e9349b5ce84949099763907e074da0c68a66a830c47be258709e383ee31f08a3614faf22bc0d4a1d763f0217d4ba99bd89dfb17c52f354ecbfb53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2d8aea0b1d47b4d6b9d9a4e76cd23b2
SHA16a35f8687b2b58bd3cb7c59caa9f6a08b75c5605
SHA256f7b57c8917f5483cee4690b1223fd4376a088bc3a5b3c5e29d4bf44b09e17f1f
SHA5124dcfe570db61aa98f3b298b7e39d5a894faa4fbeebfeea1cf70a9ad57ffe8c104e2a16cfcf57dbec1cfa2782052ebf5dd35fed5027239e91e9436431bd8ac256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594c14294c2ee4b22487a5ae406fcf811
SHA1ec2796161f6569d17b23b1b4f2ff5b7a3baca479
SHA256fe23b1f15766de4fa896efb82ab0f7f5d84a4cf6bcb9d9d59fac86b532e8198d
SHA512fc8610b333079f5c394fa918c2e475488925bf28bc214cfaf4deb6f15240f165784c1b90842572e698def3bdcd1155bc76aa1803b39d3d715298537d185a54dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8568becfc2caac78cd90c2e5e653199
SHA1c7afbfc7de1de091949000759f6282c7b836ff8c
SHA2565251add251cdcee945d1de742de03803cf1ec043c054bde5d727a9f85474f695
SHA5125ef72b1007bb03bba1cbcafed2f0f7621e1e825291495d9b2979c319409e8bf63c9b32232341e3adbb35549ef667f7bd864224090504df161a15ca59a49e97a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ec042a0c8a754ce342fc6116f6dd536
SHA1b87d0093029dd672f96e2b57ec0def255677ca1c
SHA2569e68e2f214f0626f9c5225b6a2bfef3ae92ee6cf25e8a7f0ba6c6e80cd3af8c2
SHA512e36ba694d6849bc87ed5f30f3e20c14c2c522249ad0445be0de341bf0d249293d32299970dd7233910851fec93123d104ee940d796fe7314780373eebfc9041a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5118c271c4be2048d9d456e31e96cd918
SHA1e0f05256868dc419233f039cf79a52e1bc9835e3
SHA2569ab2f6f14818c8ff8b14a63aa86eed3287b765b6dca3ec4ce12061ad1df15568
SHA5125ce4dc6092a0fe3f533d4a6cf95b91c47fe8098da2c38d6be7bd4b4330e96be596950b71643f29bf2941b7e4b03b117afa9b4cef04225778d4051ac52647cdde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5782a3d6d13bc1e73b4fcbe05c36509
SHA14a2d52b78fdcfcafb357c2da969a42148c8678cf
SHA256fe13dda00586447b96bd0e83cbd26284af18298b8b2b4309835dd8738d2ae2a8
SHA512ec74ea8399c1ed90f90a0e96608602f02281883a73936a44d462f5af5c6c57f0908f3a26ac5657161591a88afbaa77ce32bacee836845f1042ce94c932bf9b95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fd01c4405759fa79a177040d346b463
SHA1d160b3719c7c8dce078e5b4bf71cdb79bc64e810
SHA256eb9bfba968ae96c9c7046b741da6fffd526d14981309d7eb1113627d293ea096
SHA5124b37e5224237eb754ac92df26357dd98590a44f213fe5392d751bec72a84637f056605c4b34dae8fe619fb470c8f48b1112090cf860457750b76fd8e4c186d48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586b4fcf227313c5c75a46419d7a0fa36
SHA144536e64129f2292fc42bf2d0206be774f4fe1dd
SHA2563ec70a1ca1fe4601505d0a0fc2fac3c5c08b1da5bafc83d75ac2b70c367ce51a
SHA512efcdd30a43943ba5e31e5551fc0be1ffa971aadc1a4912be2dd55a65e0a144c58a5534517018b25d70b0ce25073da4a7d9620d1c7fa7b8081f290ba2c8b89905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533c3df62ee10b5d27ba97cee0675b1f3
SHA12f0d85c033bed0f58a19824132468a5578d36def
SHA256ef1931c8a92978cea1e6cc865097a89cf8e7c7c4057b9b8f37ee0b1ad61cefd0
SHA512f67748ab8ec638b7cb79361eb285e43b7baab986c9cd288674be47964ec779b54382d12f2a19507e42da3f8a5e8a2d59c684d9c98454d033e4fe6800b76c5a11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553102a0adbacee2d31b3b2c223ce53e1
SHA1a13b6ec086ccc6db4dcf15270ab973e5b1356315
SHA2566c45f54595d8cf13d240a394db97e033366e033ad087a9d5d51b355ffee2e563
SHA5120f9fb275e7dd5ea127b22c9c70adeaad2ad62cd053f4f082ebac81fe2504ebe7977b8b65277c5f4cddcd7b5475d756854fa153e3924bda236014b5c3756b2b37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb291f350dbcb4ad99933f0d37e85137
SHA1001ac0d94cbbaaa28614b778ec02b4e8e3f88aea
SHA2567ccfdb1c553058b97218bfbb820021e90ea87a71abb54dd1dc7436366c273f9e
SHA512b70b3b7264268a3b00d8171989064674044128dffb6cc83481b1667a90baa38451bbe15e791d9e0e3f616b6185bde8c8e763d899deaf9c03babd3540571485b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aff3c48e3f34b36149fb977c77c0b63c
SHA170f78f3f71af4db7ac3a8d952fdf222a986f1b2e
SHA256f7db3d831d4a6d13da7e0746df8f15a45a76f8d40747a993caeae5fe99b0b0ee
SHA512774ede54bb592718916222bd14f287c54ca015893b352f68525fdef8169f3d384850c704d5ae2a28f42ab2cfe8809338d56e038128c136ee86a10faab80c3f60
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b