Analysis
-
max time kernel
144s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 22:01
Static task
static1
Behavioral task
behavioral1
Sample
c1aef48aa7a229609e5fc26855a15230_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c1aef48aa7a229609e5fc26855a15230_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c1aef48aa7a229609e5fc26855a15230_JaffaCakes118.html
-
Size
18KB
-
MD5
c1aef48aa7a229609e5fc26855a15230
-
SHA1
d401237e873057db4f549125819454a7f726b2b2
-
SHA256
4f6dd24d4f5d897cf3d494975b3e0a878e0d9719e5f9c6ee001fa5a86c23696b
-
SHA512
28ebb2bc7c52c292f2d9a91d0494ddb2d53d7405f10077e37b860ef713021fbc9ca3c23bcaefd3bc0245c37cfa879f987de6f59014198ed9c24250907b945133
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIR4FzUnjBhr982qDB8:SIMd0I5nvHRsvrmxDB8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8DB29D51-632D-11EF-B985-CA26F3F7E98A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430785149" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd000000000200000000001066000000010000200000008373b8d75ed9c73d381d71d7d10094929c4e16f47c563a46835553683ad3940d000000000e8000000002000020000000135a809ae411466453429f213b8ae7c3bbb47d05e21aae958ffd803be2e7a7eb20000000b855b7d903abf2b784f7bd986ab9031fef9da156bac1c753cf6d60226fbd2b2540000000cc674298d6ccc69073aa819fe8a310cb6220eda3a5f71d876ef9ec8c32f826a1b9483d5aa669b83c177ec0175ed16dc20c05a5dc109df8ef1d47c8f065e16abd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 701270683af7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 904 iexplore.exe 904 iexplore.exe 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE 2512 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 904 wrote to memory of 2512 904 iexplore.exe 30 PID 904 wrote to memory of 2512 904 iexplore.exe 30 PID 904 wrote to memory of 2512 904 iexplore.exe 30 PID 904 wrote to memory of 2512 904 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c1aef48aa7a229609e5fc26855a15230_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:904 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD523b76b1174e873db9a35957e9428fd1c
SHA19304d3a2416b5d512d0a417494593eede12808f0
SHA2563f13396086b90b8e8d6a8606d602b1eb5d2f35bc0a926c40178ef844c3fd82f9
SHA512495a96fb8d143ac927717c0720cc7f679b00146e4f61bc3bce1e0d79302d6b3ffcde68be35fcbb25084e4ffd63aec0ef587ee8dfa426cc229ab2a009c13a1797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca502fd22a9466b4e8f0a609e0218958
SHA13c96e7a6377dab53f161cabc17936c0808fe486d
SHA2562b67169bb24880f5eb31da6367a12b7396439d268f1f0e0f74622758032f0244
SHA512cb17f6081072917135c710cf9235a2be2c95f6078e789e441ee0c2d392cb2e9ae848917bb0d4b6ac58f279b8a20ac783b9b8830d28b67373c6a590dd67127984
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d44d3d8334e6815242f209334afecb28
SHA19f3e12b0a8286da6158ebe3b689ac95dd38f201a
SHA2566c05a02dfdcec4ab453d71ed6a4977efe4cd18ce88348fb485523c646105be74
SHA5123a2204c35c20e90a1ac5a1dec3a9b54e39bcf43305833641a2a34fe6e1a2aea06085113c5cd5886e73e10bc966434d1113db6c9a1a954afe2b3c3ebe6a2d63b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537ba3dea5732c7a8f6f0f899875e0c2e
SHA1ef79a5858acd1181ce4589d54a3392e34c6a4d40
SHA2565ea4e0542360d22c90dac93f5571474348bce6f0bea50992e7cff5b78c4b13f2
SHA5124bbc46b6f446c292593af8bcbfd48f4b77b67d8738f214de640b21be324f44d15cac70e480eb6ce0ca6bdd89ec6d15928941aa6be58bd5c61b189a52288e48d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577fa61557fce255396338a1f1184f658
SHA11ccb5b29a4f48979bad9f56b636a94cc420e845e
SHA256636ed5da923885e9eec6a59ba0b27ebd0e2db55e402f6b6aaef9f1ce97fe115b
SHA512ed8e1a64c1ec68b5087cb2be12681424893757b2bd78dc4f74f5af2fa3baf991e4576c80d8ea514edc16cbaecc9858bbfab2278a5f1fdb5b4ffa165c7199779f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de4740ee26ad2ab34f50a63e7e8a06e7
SHA15d1dc92f02caba5d1632ec2692edf3681c002495
SHA256a613d779bcf841c60c052aed2851c438a71b169b1d0ebf2dd212842155fca69f
SHA512ef66044d3ca717e1f333c14a276a6cfa43082f6cb6725aa380722467df7d46375f567f90b2d94f68544ffcd2a500a9f4b11a0b66321daf273bfd0da3748bad7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb1e192c55d77d3c1e16c274e37c2fb8
SHA197a51a663f9654d64b1254f23839e7ba9dfef1eb
SHA256e720fc9d99a0af41a8ca221ea30daa55838f0963370d1b4b74f76cf328b485c9
SHA512f5a73cd9da50733c37aa812403151c8714c8c16ba34148b62d3ed92ee6f24d15bd40c34d0107d216d3abdf3a379abbfcfda3a62828b7b3dfdfedac46dfde4b15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d1e3b7ca5cbb5d39355f23af8423261
SHA1449dc9b09e985aa03250383139b09942f4c70da4
SHA2565128c3e8810af6ccae91ed5b472d8712bf057dce85db6eb977d995f7f0ca8200
SHA51210396cdeee5b3911312e6e53fd0f0a20b5ff651bd1e07d3f29f0021a8c03fcd7f77d02040e2bf96369d6df9b1eab92e8c596e03652cd93f0d8b3d99633359f6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6151dfb17bf8b3e636351f88a6cd3b9
SHA1e53336b40b467c7c3f40638c3b284a0e43546778
SHA256561dccf32f596a4fa9923458500f01d92bf567f2e8f32a3c64db1a7f8ba5bc72
SHA512b7435421fc97cbd93be771a5f265b7c8d733f9028f8e87f8a932e8073accc4fd5af9dd924176e7f73b12998cf45419c2b89bfec972e452fe6e061559fe198b75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6af078c9ce66f65ba078586a3fb1a37
SHA194d11620d7d3422ec4a3fd281338f7b46efc54d3
SHA2563158f974f0329842a383aa628d646de9621413c20d777908e525d9aae79ac3bf
SHA512327140bec2f17c7b6fc72fc3b854159083e30a65ae0febbcbb9daf094e9f622a05fdd22ccf6e9879d4a405364a80913851e55d4ea8d7efab79ebacc8368c460f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a2f8873288d6ffda5ca21d0bacde49e
SHA12f818550132534c5c9ded9b2baa6532fcb9dc10d
SHA25614d8b700d7db893f09d61d427367d7c1033c407357dc357fd87ac3eb59bc954a
SHA512eec9c0ce5f457caf53989606ca4e80a2eec2d37255fdb5cc6cb07c57f16b3c1845dcf289024cd93ee38f8402f7ac91f03e098ad98d65d05a952f5513fc21f640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f64db6d85ae26e1e49e35ee43017f6ce
SHA14e54192a194647b6e61f563ee84ff8a6a9627213
SHA256cc47ae6b7a74f5d71fd9fcbd969a67202a6c5b0df694a1aa62ccaa5cb62cb85b
SHA51270691035a4c91d63d94a25aad8e35c8ee83fee7c2bba215d3d8b53882112da4345e044295262b5414ae2846c557616f11a4b3151fb946a2633f744262c527216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583f5c84e1bfa8b1162ed12d46148c772
SHA1e6829e9bf0d7fc65f3991779442a4791a1f74d9f
SHA256b91a9356af1f6c4598e5e75d4c0e26203b2a0a06f9f27f014241b67acd929a6b
SHA512d296e11f63295ab7b69451732de3111a6ccfce16e3e7dbc3bb7e46a40372c0f2558ff01323ce6e559277a52539a9e827cf4e70d092e46656cf613f3a81f22399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531f204cf007e18a2034079ff2c82aa1e
SHA161433b992d6e2163df515e234cfae2ad62e22b7e
SHA25628ee6cd452082291ce03a3fcbce34af8a58dafde0116a24f2e46e3c563b5ac64
SHA51213d13979ed372a8dc8b8aa6b26eabc655da80a33261c37ca70e0d8621c1ff017ff1146c4f305b1f9766b82ed540bfd3920d14e6c2ec14cb3203ec17e6f0bcf0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da8b3405dafdc9e4b3f6ae869f782f52
SHA1c1c36f53e4a1c88a84fa657fcec1d710e7e78c3f
SHA256daa14c8763d121bf4d6a7470699b5b325e5d7013d3b990bb0f8eed980cb219cc
SHA51232d304393e51c9fe25ac6239ebd465ef52d0a39be640710a47c46683465ef4274fb0b0d73e8bdcbf8bd10e0946ef2027a2c4aae23bedd55f025a20a697d8d3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5573270e03b8fec408ee210072dd15102
SHA10f7fdea16ca99b5d56883d6c2059eabca81a0d8f
SHA25613c88f6579e393e4c25b86674dd4fc27bead9acdaac7e78b89109b59ac5ccf85
SHA512e7c8a23887f7e251d3d4c83601bb4de3ddccb0d44d591d2999a232fe69b5531ffb6cd01116f1770be5ed864c0f2618afff60f22d74fb8c7fb60bd50adc30e3f9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b