Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 19:32
Static task
static1
Behavioral task
behavioral1
Sample
cea8355cd60f7f0feb6f3866ac95c973_JaffaCakes118.html
Resource
win7-20240903-en
General
-
Target
cea8355cd60f7f0feb6f3866ac95c973_JaffaCakes118.html
-
Size
4KB
-
MD5
cea8355cd60f7f0feb6f3866ac95c973
-
SHA1
7e1da1e756f242d88a1e2e6f06d78ebfd6c526d3
-
SHA256
ea72c3202c1caa69d17ebccd3498dde0bc0cbd0c6102ca304d7002dc9d18b13a
-
SHA512
e087b0ac710ae71833a0cb7884e5db6ceaa4f0da4cff9bc5e3988358218a0793b9a555ab2df84f60fa7ceb364411652f2b6d7da74d33a84375325b3b31a5743d
-
SSDEEP
48:t8LhELTR/a+KyvLZuJZavtqdlvuLO+V3qQk6kkmkTTi1Nakpn/dHC1gZy:AhEdIKLo2tqdlvuLVV3qM85diT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439675389" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007282fb4065e5c3498e9a179240c216df0000000002000000000010660000000100002000000099e31a5fd60e606abb781ddde7bee8bdd16d369d65b374d03cacb1be7fc0b7d7000000000e800000000200002000000043f0d7d5b8a0f1888af9b6e1bff45bc3a2caeb8ec0a768bd2c551a33921a6de4200000003820514c5feb24a0303ba3ad27cc176ef845afa3a9f81d0683aced4512dd2fe1400000004d14aaab351e64d1461d69f1e3183b403739045f33e35a0c9e79368140cab77663b1ddbb25413f7467a6939a4ca5c1f69123187d2bb4f522af563ccb1ed79678 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C49B2A41-B408-11EF-875C-F2BBDB1F0DCB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50f99f9a1548db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2684 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2684 iexplore.exe 2684 iexplore.exe 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2684 wrote to memory of 1808 2684 iexplore.exe 30 PID 2684 wrote to memory of 1808 2684 iexplore.exe 30 PID 2684 wrote to memory of 1808 2684 iexplore.exe 30 PID 2684 wrote to memory of 1808 2684 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cea8355cd60f7f0feb6f3866ac95c973_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2684 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af6ff058764eb476d6f606b24dadff6c
SHA174c8a863962440da2217b9502aac833bbc68ba78
SHA25617925f7fc960f22deae3ebbaa80d7098a87ea6dead13894f8d810e4745326357
SHA512c7b9ca42f05b9f89c24caeda478511b87fa426068f2d87ca50763f49d738181b72ee21072cf25b2f18f66773fbdd67d5e90fdf71e3efc62963543f851ca8f02d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586a4a28bd84d9fcb2655b8195d4c256b
SHA180705db95021d67f3bc50232c195066b12cc40b8
SHA2566d0e695dfee661f26fb897af1791d36415157e39737b3a17614fd46b424dc182
SHA512557f04150cbac36dc37c12fdfbc0741ba9ceb9f5a9d811acd892513c916f0070e5cc675e4243fed597884a03f55bfacba3f8f2440133a163d69ec8ea2388db69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578cec8539a7d25e54d9fa75c85a16b97
SHA11de338bedac8dd5f99ab61729d992faccd03e24d
SHA256f4ce0db9482ca7d1abd973a41a8956cec6508e7d1bfc9400c63431570e9bf503
SHA51293e0bd9b4aea904fd54daef771c739e201b2977fee2bb0cec42d7f0d8cee936144416fae8dd3d8a31fd1b8f57b57d6a545ccfe581f498a186bf068bf19405c90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560a4a3a0d473afd5bd99cb2df62a239c
SHA1c478d765d4d4400805520e0c5c7d71d243b8575b
SHA256e496132a29ade6b73ef3fe628c439fd18b185b028db24ef0140e732192a4e698
SHA512448b677253c0c81f4d7748f5ca782def79b83638ed890d6b34b03c3ef56828af7dfb99d46fc5a9a071a560f2cab81f91f3c34817f98c3fa188219058b34a5f7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548b23bd528a6980d302eb8f315b1c09a
SHA1db2d3b7f69e776f40fc0e0058c0d4ffd30340f0b
SHA2566e718dc2815beccad8a480216cb8fe21a053a8cfe8eb94de9ae26c808c31281b
SHA5129d5844b0e00a4bcd23894ee294fbfe63910d8c1feac8134bdbfc82a219105e08a5c84d55b07b0def92807117b7bc2e70f2c96a862908c4f54d0f1041263ad6f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d34ff5f49035cdf1117e908c985dbde
SHA19750557285a436bbd7aea08f65f21190259e6a01
SHA256a09ddedba0e85bac7e7d3613fdfad474fa6e61b6da408bb1664deca78fd5b7f4
SHA512ceb0091a487cbdef7b28e00e4f23c5de0dd59e6259b2aaa4318099d521d12925adb78b5612ef5e66288a5d555860981092b15a766ccc94086826733277228e3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac93bc2c534e589a2b74bcd26e625a48
SHA146dc918b66da168b47c019838993a78290aaf0cb
SHA2562bf20034dc92847fa0d1bb536006edb7edded1320321c1c7d66cd1f25eae4e3b
SHA512c39afa447fd820efcdcb1f503bb6985966af61bc935eed9f0afc2846ec90cbb84ceee196e2fa1115fb93f2aec3aad2c1ef01686343bf37c9513fdceca9792a6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eabb4f792144526757e82169335f42d3
SHA1ecba733795d8e87782eef5d70f43ab239de777c3
SHA2563e043ab20f0aaa3343d56da6c9f1f5d9d4078301f7921a4a6dbb13032f69f6e2
SHA512b7808e0c35ce75501060e95722ef5986a0aabc1b649c9b28a5ac5fdf14f1949d0d8cb7774e890ad5650cc7b59a93513acd3aa6cfb0e6bf9215627c62c5422d69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e971b8c668407bc55cd5c7d60dee862
SHA1a3b6b1054adf527d9cd9472e0bb2d19527b9c425
SHA256dc924011126f0c5e56020427d254c9b6a8d7b6f102c5d543669f395f99bded87
SHA512880c3510dfe7170031b8a49993bd4fa6514ac6fa868934c819fb4796986f1f303a9bdc2add95972525178957a71f31928476526214481376d379414887884004
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3e24bd966aec6534ccb72c7031aaeee
SHA1ecb9bbadef928d95ff709d70bbf7a5dc53e7117b
SHA25668c5bdfe0b9ae921345ac53e9689c79071c1a20eff80d6bd826eadc33e99f409
SHA512a7862109a2af78efd6158fedbf52f94cc6d937a745967651e9039b53628fe026fcf67e6bbcf5c58db6f4fb8031e50206592ca8b4fb5bf3e8ff068bbaeaa163de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571114096cae33e319957028b43944b4f
SHA1fa3cfe214d159f840bc1f9159b540ff84ffeb193
SHA256624cfc592df5f5a23d8d539f1c0aa6e2b51fa0c58335d8449c5d92054ded942b
SHA5127f67825c1bf5bf996c3cc5f8b60279a09f4a4e22fe444e8321db0b1bd20c6fef55939edcdc8aaa9def1da039bcff412a2f0419a23d3736642ea98456ad32e212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b00a7b94219d1bd6b95b1116feca7d07
SHA181d71a48181a710ffcd92265e1e08036c8648a76
SHA25623182ca737d883783ecb3c7b505f1338b09d223b8bebfff5711e5e7a6588e6e2
SHA5122dfa549625fb2b670c5e69eb0d1791530ae3e416556392cbaee17d8f5b732da76fe7d3df10160c751a272b9db212cb9ecaa489cea936156ef720875666287f45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5589d0a3422132b2f19ec5213c07d733a
SHA1a73012854beeccc80d77e724d06141dc8c286bc2
SHA256e6e0e8f2e484f3fec90d3f287fc17daf79246acad3ffbc5a0d0f0cb23178b554
SHA5124319f4ff7a71970f1a7c39e86fceedf2510738416f8e71292b16729aebb8bdfbedd4e4ee979ebdaa527f1b3e0ae05d9723fc2aa4ceb725395a0132281f4a67d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8231eb80899ddcd8ad1e7c5dfa2ea93
SHA1a7f6bf67d0440acdffe208aca63fddab226861e9
SHA2564c244a9dd78cffe0ee1fecbb1981ef0082c844bdc0304dad88d608dd1128f307
SHA512dc45df36cba3bd15dbb612531b3fe9fabfd8b1e7efdb1e6da2ade59dc69cebc8f2387503be6833209ae318a6c7e517234fa95dc7546041d6b9bae513a6621435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e9b9ee3cea275830f1560daa6868d46
SHA1296af54538221edbf15e44f41b975435f583b65d
SHA256a6687a8d15e8a7d2e16c3cde5d06dcd878b93915fe3b497e87b6102464f70f94
SHA51251f2fa3dffda1a37be83b590c585ed117aa10b1e9383aa7b878a72efd164d03299c570f1f707c42f3bb69fcffdb4db6dad9df52e05ceb3fc401cd154c9a9181e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4b7b52d243ea96a388431c5096dc44e
SHA12ff8503327cdc2fc928b62003400e4601fb82a4a
SHA2564192d7f3fa87b8818bdce30df627b9baaaf509ba745c1c45954dc0ec1d509415
SHA51287bdef1d2766bde19f077de5412dabe97ca931401c8bf3758a665a2bafb281bfa3aab0cf411aea9df2d5eb886452c288579fa0c0417f8cb3ca0ca2d76581c3d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbdabda2ec3d8877c1dcd246ac6945a1
SHA192a964d1d6f754514bab0113b3a6f5b4ba128827
SHA256c33aaf7fb84d47f00dd8a173d007912fd21e51a4c2311cdb444382a7665ef248
SHA512b6bd24d8bdf794ee781d8c9d600242ab378fdcca73972070812af461d25d54d13dfc43342b01c3ba1aa658eca1dc3db692e162076e44cafff69debffb242c764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d58ff048dc48890f587c7849303f963
SHA180ccfd86dda0eaec88624da19a196bb6adfba5bf
SHA256a8be19bf403f8e60dc55e8bb5f70aa7ff011574b99a287ebe1074ffd9f7c6c44
SHA512abe86b3034159dabf69de653c22c61f57ed0078ca2c39274e054130898908acdbd90b39c2203338c5e2e123106046ef41c3c56322ef9533a445c5d5a1ec9e916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5029ce7e8a46a48540698a72c08645af3
SHA1fef999f05ff11797c73bed1c6e15382742a555c6
SHA2566fbc75220972d82738eb01b561b4005b4ff7e3ae9b981a8bc1bd0c919aa995ce
SHA5125fa362dade69483d59f7307de414a42d5176c95c15a96749d20aff90f2354d40526fefe8cdeeb2a1475445cb06af021cc23d64f32d7fd11e1e79e6ab297d745a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b