Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
c1b6ab06154d60e1f2cdbb5b83eecf4c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c1b6ab06154d60e1f2cdbb5b83eecf4c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c1b6ab06154d60e1f2cdbb5b83eecf4c_JaffaCakes118.html
-
Size
59KB
-
MD5
c1b6ab06154d60e1f2cdbb5b83eecf4c
-
SHA1
b590e6c2be31387dcf78e397cab28ad5e43d47b2
-
SHA256
0da61a1a3ab6f85edbe80237047964079b08ba287436d45100db2dcb0e80a77d
-
SHA512
a58b57f538946e64741e03b5fb08cdd38997eb9d8b3f88472575f66a97df4305bb09715552135adfeb7e2bba123a3fd2072b0c3fd0e5d3a52022294ba0c3894a
-
SSDEEP
1536:g+UqVfhWVu7AAr7eedU+bD2cyu6wkX14wez:rfhTr7eedRP2cyu6JX1E
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000022bf6257caeb48739bb07ed1a12bcfa9700d456e0270b909943585188281efd9000000000e80000000020000200000000641a48d9d272fa54bd23059b9b56b8f06bb9394132e3b3840df506ed5bda90120000000b94fe569ad7c910e75f4c29c8d16e423a76120fd82f0738a474218f8575eb71040000000b6811bd0efc015f54c0f80e1f0e4b5c05e17f7210aae37a211448976db6240b62e1cb64e3a0a6e3a5596a6e55a977f0c6e2b524265215f94ac0089fd95b58cbd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430786571" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CDD52261-6330-11EF-BAAC-CEBD2182E735} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9093cca33df7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1660 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1660 iexplore.exe 1660 iexplore.exe 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1660 wrote to memory of 2848 1660 iexplore.exe 30 PID 1660 wrote to memory of 2848 1660 iexplore.exe 30 PID 1660 wrote to memory of 2848 1660 iexplore.exe 30 PID 1660 wrote to memory of 2848 1660 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c1b6ab06154d60e1f2cdbb5b83eecf4c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1660 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD592912874f5b33ffb72b6c74271a06c63
SHA1e9b8c7af02d1cc9f63f04fe58aee211344987dce
SHA2562b0d8f525d4dd81c5f2de7471a48afa12e64a7cef8fa475e1c6ed341960df18a
SHA5127d7b508daf0a55e4622b36a9eb1659befacb821dcf304ae996eb20eb0206bc6c402d2f7baf570d7c9d5ec6900db37b3a459058c77d9e94dc431c8f7bce18bc64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD54f0d8fdc1511e61334cf73c71d591e96
SHA19906186857097077c5e8e7718a772ffac9e76ee2
SHA256d6790ace3379d34547d2c74080402f64891b618b13597db25f10bab3995f7279
SHA51285398133447265ad6254ab79e8f9899d71ddb0e8f18329fde9c8b74d8665977f6d100e33eb4d1e69bc55843afa3f9feee052a99547c5075f2e4209dd5e8464c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5700c305b55b26c9823cd322e370856bf
SHA1129775684761b1e54a9b47829be79d783172438e
SHA25687eaa8c7b79533ac9ac37f85be3e44a18ee35af0d389f7c8f82a845e6c225bf0
SHA5125b647b995c04fdf87f71d5cc420f89f241f829f5b0370387be40ac8f07353b2c3f0f43c40f3d817130c840b5f5cbca00e890b250f0ee3b311acf8c6be9cf2923
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5333a65b69545442dc49ff790fef691f0
SHA11ef83176cbbea9e3af0efd5db13e5b2ab4b94131
SHA256b722c570e075e24c35037d8a613ea1a3601d30d0009c23a48c3adc8130f4efbf
SHA512435d48a7b9d2ddcdf1721ff938211551f878f059d9a4a3898e1f660e9d6f94948eadeabff4e48278ec17c64185433bf86b843fab0191a297fa4cb4c4d04d821a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5831d59fd965a79545affa09496577ba2
SHA1f2ac8efe1c9cd534975ce2222cce14ec8e9deb21
SHA25619b4f9f4381ce72f75affcf63c471e3a994386441e2910766ea124b76c5fc064
SHA5120d03ed1f35655d1e5b7a677e9e2a0e1720417d3af373a89be8e4ba1587627bac5fa7323d06b2e2f978645a06c2e50601265de23bbb265faaa0936ae27e5e7d9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e6e652e648a7970737790fb34ffbb3e8
SHA1ba90b68ec3d342514e07540bb8325504e9447786
SHA256a898947ce667abc1472bddc8f56033b998bdf6683b63eb277e6bdf7a02cccb9d
SHA512d6178a307e5b578fb73de64ded78a8b9f30ae064dad75821b93e80631ac7704bf93124a278e4dc6f903024512c122b50828bab917936765a865ce739ff155f52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5efa4b487f0728202ba250ff7c0c04aba
SHA170b84033892894da4aed883de26a35a9cfaa8d03
SHA256c6a1798e26e2b6001517ed53baa6aa31a306de30f0ccb839675f0858cc68ac7a
SHA512efa8070d0fdfb2d843e6865e879954a919111c08d27b2d417c5c20131824eb1a4f18b918646af208df50f4e23d9eabda0aff3df50c6aa7b3e729cdd33a09c77c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD592a77c86a932b602d15da20f9d087d5f
SHA193767b65fc829aea76bf9f88698d368fd917e020
SHA256b35c077f521820265a956c468d8e407de34d28d968e2e26befeb3f76841141e2
SHA51208bfa8b3202063dc3947c583392b81c73cad6d528ca4f04fbe5d39671003c3810c710eb17cbaf7729fb3618ccef52817fa543d229b3ab7a3e4aaf80cec4e0b28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59a9572fd9455a18d50e47219347669ba
SHA12345f07d73a91d19c28ebc2d1fd96c4dfc7b9d44
SHA2561794f2ef695fe82b5cb1db2c09801251e175ee0ccb79f621045991cbb65e4640
SHA512cce1a341ef53dfbf9d1ffe285f66aea6748590730f40521c9be3a9403faead177ce92a9def9a1d75f3454f3ee6e712111fe0cd87f9d6befa159b625f10d36dfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54921d6be6fbc172de4815a70dc459576
SHA1bd60ecf60180bc8b7c12144689d341bc66fa589c
SHA256251a1fc455e80fd63fb1b5c1f2a0ba4f915f1da6f35060b8cea58b300b6c2e75
SHA51254a1250b50caf0315c8dff9608a209f7de5faaebc20d58ddb94c2b9fcfe206287734bab41121a6110cfbb24a8ec5982294fe8251b3f59248a4f6edc6845fcf7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD577adebe885440caa6714ce15b25b9171
SHA16e0ed5b998ad704162daa25898a8b0b5a0a04807
SHA256a07bc11d1f4756e59005f692903e34baaf2834d4f8a658727b4d6a11bf051e84
SHA512c62388783637d5c5fe8c8cdddd460da0f3ffd56e7c9337760343f3fc84dab6f85c0eb2a132f960e0e8102e90460a29c30ae04a8eca54067f2ab56b1d158d3275
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD582b74331a9ac0d2eddfcec276f2ad24e
SHA1abef4349a98a32bbccba17ad80c5e653fb5b5532
SHA256b88ff036cf64b1021ed3ca3c612a7a286401ba8344c4de42cea53390e2920b53
SHA51271bdf682eb072169ff311680fd531b458bbf1c2d7478610f93488454aa324a1ca3886d9fdf014ea5d116283ae97a05c6e80498fbb9d12c6e983ee32c0878b67a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f09c03afbda727aea229ae2408fedd16
SHA12cf306bc71c6ba3b04b991c60f51cc721efc96f7
SHA256e5d0ecbbbf28e8dbac2e05af3bc339abcce47219af620a43f94e4a2908168840
SHA512cebff937b4d03a872691ddd6d85ff8c6cbdc63bc140b428c4d799bbbe50fe57fa7ad9452657214f56d9741cc099a1cde318a569a086d2bbbb1959bd74c5fb9b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c92dcd9b13556fbbbc32d2c2a6c52da7
SHA1b937bc0ac2aaa0d9b606b303f7b4f688845b09a1
SHA2569c71fa8d7e2ab9e1967ac09d7a58c225cf3d2acd911a0e639e4e61e19e87aff9
SHA512ddc951d1ba8b6fa21edfe106fef79e182bd128a0a73157cbebdc31acfe39b44535448336324b9a61aad8908216ae3e3290708a94b8d2afb6faf0edf8439a1a29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54ab5f41c9e19b56195d450c58eccc118
SHA1774159dbf7883e67f0671274b529797c100a672d
SHA256e3aecb7ed6c03d1da93de4712285e429925a6575859c6de7c73dd004336613c8
SHA512139061b024e1c08250b2fe4d83981cbdc79c225d623b3c8ffc3794c643e6b6ebee6df60dd5d4d332a1a184fdc8dbf8ccc2935df788e800fa13046cb20798c204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5ed652c0dc6923c4e2017cb0789e33611
SHA166ce04fa32d0e3b0c1c8add0f5f05496ee7478f3
SHA2569f154f9bcb251faf8f019bbe1701560e243a155a7dd26effc6a48771210f1fa3
SHA51243902cd35829529653937c27cbe7edc3ee72bd52f4731b59ffaf12765d71e440338b08aa3105bd79852a96b06c00a98d4c0bc2b545cbff6a380f02a38a3c72bc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b