Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 21:44
Static task
static1
Behavioral task
behavioral1
Sample
c1a7085addeae14e117e21b3219c8603_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c1a7085addeae14e117e21b3219c8603_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c1a7085addeae14e117e21b3219c8603_JaffaCakes118.html
-
Size
53KB
-
MD5
c1a7085addeae14e117e21b3219c8603
-
SHA1
ab7a96d500e4c0963b55319b865b4ee66822fcdd
-
SHA256
90c61506926c2d23fbc6590d80313f3dafbbdad137373906042ea147ce16debb
-
SHA512
3dec7375bff1feb8c4896cc0d4678d3e126c96f47d611cb6aaf4881058b7abe33040ce979908808a59f3692a08e192e2b0754858fa8094a666f8bb6000911b23
-
SSDEEP
1536:CkgUiIakTqGivi+PyUSrunlYT63Nj+q5Vy0R0w2AzTICbbeoM/t9M/dNwIUTDmDX:CkgUiIakTqGivi+PyUSrunlYT63Nj+qz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000097e26350d5cea1b34a0fb3d1cff85f9269767927c28a3525ed17573d9405820000000000e80000000020000200000000b09125666f2d7a012f8b215071d23af50ed6f832f25246da58ee01f41eba232200000007453ae26446af812f77c5323c73b570d5370009365447ae61e8237787b7aad9240000000010baa8898a0d2cc0875eaa6f7a78acf1f67e8957bb836ddd582db1fda61e6a6e20529120058bdebec1e464b44727f17d97596227fabdb62fac9986c340f3666 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40a64b1c38f7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{43B91FA1-632B-11EF-ABC7-72E825B5BD5B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430784162" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2320 iexplore.exe 2320 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2540 2320 iexplore.exe 30 PID 2320 wrote to memory of 2540 2320 iexplore.exe 30 PID 2320 wrote to memory of 2540 2320 iexplore.exe 30 PID 2320 wrote to memory of 2540 2320 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c1a7085addeae14e117e21b3219c8603_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2320 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564df0a6ab3b0361097cbeee0b45135dc
SHA1c95aa36a72a1a29173398c59b10117a51246882b
SHA256e068015cc3e82193fcbe9939abdd0222586dcf710ddb1bbebc8e8f3a1ee9d3f6
SHA5120938d21d99781676ec448d6df5ca02b6d8f90196588e37426f60bffbfc057f6d558d76ff5e1a233b1e268f701a052e9bbb3117edb40a8a87e4384f524b463439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dce123ae488ccb3d05a0587dfa2d63f5
SHA18ed7d0f0744a0a75802778717cf83b0a57e4eb9a
SHA2566fa5c085c5c8ad60e93a71710640425e93f737bbd367ec0ab126aa637bf3b705
SHA512908bccbc1acc8b78633fcd25192b015295f74f3bddbdc25688c8690733dff6c8b4ee4c7d2de574828bd64597bda4e771972f6ade4aff23577119cca055544fbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595625b20ace2a04152e17990222206ae
SHA1cdd0211cc6b4dd63aeecec325c227bbd00edd7e2
SHA256213642501c4d83262ae6ccbb48821e631a9c94ed10a15dc27d46cbc9fcaacdde
SHA5120e6ac2c4387de2dd57dd471f4945e8c5e1c776eed2653c23ebb537f4f4cfe3d3ce98791b5daf19634750694597343e79b32d1cd718713a05f51199d874344e06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cae51d52aa0ec588759156c54ff4bd2
SHA174bb26d8f14a3b98785ab90b45e703ce22b2112a
SHA2568e8e97d008e192b2249fc4f3790c59ad20dae14dbc3cbe027cb246f183137f5d
SHA5129ab0a7a407c181be6d4149feecde21fe487d6aefd3823c85f1d3fe7593bc92acea1d030e1fa8181e90618d1438daff1e49394f66a3bd6f0210674ad2ea34ea62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cafabdbd3ed8ec5050f9eca86b8325af
SHA15eb0695454daad678c2619097df925b29c07e95a
SHA256acba9da65800750fc3965c5d5b1d91ac6f03bb101ec7854c2d95a7c6b0b8b5b5
SHA51276112053169d042ebb0db11648ef57e9266bcf21c907f302bdaf1c4130b9f00f9689619815bd3031db05f296e4ca23008927eca6e2c69ba8f4416ae2e189819f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ace204527ef0b1cf1a2139ea88c45152
SHA1be58d55dbdf0e40ea8efd8241a83194e5401ae9b
SHA2560cf5918b0a9472efba44d1a013eff1bbac382ca1d5dde22ab37f3cc402cd3e7a
SHA5127adb25282dafaf1fa95162d8c3e213601a2a60faaf2833afb0475afc44a065683d3ae589051a5a4b393d16a8b324836834f3c5d3dd7be26e3c1aab02eb1c3fc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a089badd5f25eecf5e1c8c4b59523ec2
SHA1f8487e02251831a408c69a504be6077c5864a36c
SHA256a48ecd82faa401767b8b327306e78280376307ab3da6e3d2d7773650d0f05132
SHA5127e51d20a5ed08c2745a82694b9a4243a591d56de5f2e7249d8dcfd74e5368afeeeea942f10c25eaf180374a3d2a918aed5824cfce1fcba9bead53b861852137d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1aa790bcb1111eff1a52d80ada575a9
SHA138206d1ed3e6382a067545bb59fff7959c04261f
SHA256d916da784bcf6e5667fd5ae2ca5f683d65f784b93910b1bb5db92da553c3b175
SHA51214e117a16ef51b6d8ada96082d219a8fa8cd23e92683da9553529fc886b0961f52034035d6d2f038d130ddd186a3f06b121b4c2ea0f3d91a65a4d9e4c498887b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fedbfe1d23b1db2403c277493773ca04
SHA11306f658684b53f9ff8733850358e890a1fd20bc
SHA25673a3a778833e4f667068af6571e2d83ac7d39faaf8979e17c3a240d1b5cd6cac
SHA5120fd89f9aac0a4921b6f0ae5dc602f4cdb476aa21bd5da2021e87a9504a31652c6ed1d7fcc82d7fbadc344856cea94e80526ee9d33b52e17ba4fe4fa2cd3244b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5389aaf7bd7ca5333973a24acf60aeea5
SHA10a43bcb7087736c3b1df385c0879ad1db93f84c3
SHA25694bcf5f7f76d1ef02e9c44f8833823b53d425880037baf6b17507c0fd3aa73eb
SHA5121bdd9ac542f17b5a302c2106fc2f209ca26acf34dc14ed11f2bccb0b626ee75969f6663b80c77b31f57f7ce0757e372a41220709addb08a6f4f4bfaafa6b39d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fa986e95fe7a4abb47d1c567f16f3d5
SHA16767c5ceb639eaba57216dc61a5011428e68b5a3
SHA256f14df81590d4019a31dc5a208cc20d7b04ab4f5b583fba936dd7f8ab3bae1171
SHA512a1906316561013f8ad93b90adc1e8a2adf42d6f4aaa1d12989459f9d0a584bcae3bc688f01d08062e444f13c65de82870b4dc3f478f7cb6c0b4c1a17a607656b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b47cd896c548c61ca84b09d1a08c0d5
SHA1b1c431efdbebcbf94beec457865ea4d1685df92f
SHA256d0b15fe156079f66420f4a53a4f4f88f44427319477ff389f830893c2aa14cd3
SHA512ee884069ea3bbda19f478222db223b86c38c8c5e2a75b5f6ffa8bb429452bb60639617aa816a57766e88879e8b5be4ec8d02a22d9d7391391cf70fea15b55b50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ed119f6abec420d779159332a6af58a
SHA11886297d58c2da8417e0022bba3c0b83d6a84fa4
SHA256225cb1c4cb37bd3f18e7363852a5851b1412cde5f7ca16705c3870929e962d2a
SHA512e4f1b63515509dfb0f2d5b3bd6f3ce771c40f2f05464ae30c35401c3e531f537a067e368a12704bcccb25ea5a85a168c82bf4a24247f559acf677000319275ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dda9f2c16bea68734fd392b59f94acd
SHA1bc7fc27e1cf71e61d444b697280cfde52ac3939f
SHA256bf41820c0655139dc16359d195126ac5719c0f5ad21ee413061d93f45a4fa15a
SHA51236aba291a550d49a6277041cf1753efce2ffc4eec28debd57f76c0b62aa1ac21c9eaf199e554077214fe6cf0db186b5c48a5caccc105e6efe00c698693365073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c592c6fdd9ad962ce783398d99cf599
SHA1e8325786af57d52881088408b519c272b66b183f
SHA256f837b70715a7042f4dbbabead477c4df3a5cf0f7eb7dbd982038ebc0706ae690
SHA5122b0cb93e94a01f4680d64f72ff5ac290636108b8b5dd781a19ac7836d3d205ed67d991bfc4fc665dda97488f95b41820036aa03f15490f8eeb57ba8c8157d380
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537ccbfe2d9d8c05b7d42479bf3a0ac09
SHA112a567e4a958c87d8cb5489d6e8865c77a3511b7
SHA2564c288efb9e1f21c15fa72ac08c908906705b168f6034b572a77957dcd2a4a107
SHA512043aafb8d01d916c0273b8f8dea3e7b29d3019ebc9383743603e08d5bc1f2778715bfe089e69fbd18b4e91f9b808069bc0f009a63ff2a49b1f7aafd7220d4d91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5b38589604451810e1db5c214763c83
SHA1086761cae56178bbf852c3f99c139c851e0bad65
SHA25608f0129c1972be46b334cb66774093a4eedceef03ae36c1873f605c03d845993
SHA5123988aadf066563ff690be650fdfb39579e14a2def1f463b72ead905e99b47a2729a0dda017e690586c81973fdc9bf22d8897fb7fe936946fc21581dc743f5e8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c6b3fda97c13013e2d38b3b277d4180
SHA146b5f024db4a696c14fd959057ee76c115ffd174
SHA256b868250df7019da81a96d1bf69afe6cf201c1201b8957156f919ceb0395fd6f4
SHA512c51abdbc3489d6059271390e3dbe0cc4d9ab1aa1749a8222bfb4af239b992f8f29dcb07ac954fa7d7d6e585b545fd58379b4a64811dccc5d98247f3e91037280
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YUF3ZB4A\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b