Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 06:12
Static task
static1
Behavioral task
behavioral1
Sample
c01ec4bbf45f3273b129dee0d4e9811a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c01ec4bbf45f3273b129dee0d4e9811a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c01ec4bbf45f3273b129dee0d4e9811a_JaffaCakes118.html
-
Size
73KB
-
MD5
c01ec4bbf45f3273b129dee0d4e9811a
-
SHA1
886e087b77705d6967d89f0698cf6734f16b87c2
-
SHA256
1d9ab0d16abffdcbebd10e30ebce1f6448ebadc9634b71c6e192dc8bb7d23254
-
SHA512
dc6192a1185f252429fff4fbb48c504dd2be8838c47496c155b7e5b934cbf1e1a44e0d4d83a4eb1175a8c60c158076599231d8b2b481304839bcc632f3a00b06
-
SSDEEP
768:Ji2vgcMiR3sI2PDDnX0g6sc6mmpqoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:JaHTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c70000000002000000000010660000000100002000000092dca024fda3ef37d37e303330ce0f77800ec2d815e586389354e876143f9d72000000000e8000000002000020000000caf42cc4afcf69ea3cf232eaa785052349a5b0cdefa5e5e1b24b7a4b174652cb20000000e9b4e03c4ced787279959054b08353cdb21b1da18bcf90c7d41c913f04bd1d9640000000c855ab6232ee3103bc29f93c1e2bf24985e922159d7dfa1c48456899e2702289df10eab778d017809e54ed0dd17aec1af9d4f43939d0763f7d0f281236758596 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F73685A1-62A8-11EF-95E0-F67F0CB12BFA} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00d984cdb5f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430728198" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2572 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2572 iexplore.exe 2572 iexplore.exe 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2572 wrote to memory of 2132 2572 iexplore.exe 30 PID 2572 wrote to memory of 2132 2572 iexplore.exe 30 PID 2572 wrote to memory of 2132 2572 iexplore.exe 30 PID 2572 wrote to memory of 2132 2572 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c01ec4bbf45f3273b129dee0d4e9811a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2572 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a97ba989debd11753c5f8899c825d414
SHA12da0dac4de516f241039d356ce3afdd205092a72
SHA256d8326714985dbe37e6be80c03bc0c681df4b16938cf64a2b9c33df887eb2207e
SHA512fa71f569e1a3742ef7fb6adf8e288e43a0cc1056aca4173cfc5b72c56e00a013d7a2a9aeef4810dea4f2bb66d1a0f9ae7314683ce09200a4f1f321792f648052
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549291680e762f4d42bda80fdb2f9d6a6
SHA1c1775b3e28f403961fe9b7ab23d8e3132f706046
SHA256fb78f19e8942361ec3147adce6afed1a840e79e12e4390189ec9dcb9d605566e
SHA5120ad33ddd88a1b5046418bb155d77a188cc95e090849ffe7fca825f56b34f68343fad23ba8b603213cc0bbd120fa4d8a921578598200d2814aa6d694edc11e54b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f89e530128ee264d9cec1621417666b
SHA17da5d1313f9401e59ddf3bb871c6143800963339
SHA256c97a83ef40ceb841308a9dd449a05bdb403abc1980d4a92731848a65550c39c9
SHA51235c12b367fdc9576440262ff2c8d30c1bd2a5ff194b2277ab97a32923590decb4e26454266e3911ed7eadaf12b36627a8e79c511c6e469c5734ea4599cbd3c17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54999e95950d923e1a4b2700a35ca0fb4
SHA14ca48515bc1fa179ecf87432caf4f17621579f88
SHA2565882768398a8e82a19a960e367dbb00036440db12bf580fe4d93e8c3d3d195a4
SHA512280b60cb197b5e70ea996ee9b55ad44b736ee5d63b597a84e0bd321c86fca15ad25355df708b96fd26a4dd8348cabe2602a041b9b36b7d22ae3c46fd1f6c116f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be273cb134470076c74e034f2838a153
SHA1b2c64e1e36dba10cc72e21f487d49a7a3951c452
SHA25635b01b957a17f75ca43e827559ac85c5ccd21d65163692ef1f5c5dedbd33bce9
SHA51225d8189669a097b2f615d6ff5d802d7943a4eaedb9f8ea2010dc8422f3e0e7e4f0ad37a63e1c9fd3f27a32eb455785d6bfbc52c46b552cdf56aefd340ace8060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554ef960ca149b1c099f7e58c038dfd1a
SHA1d8927ab216366b3a6117b54f85598033e4882cac
SHA256734c5691d47f339c7feac7893fa2a233d1fb2831030e98855eccbb3fe394bd01
SHA512d459c88a2dd0bfb2e1979dd441183e9387875005f19347b1c600bc436dbed1c808e800e31963bcae35997a29e75074f5373c0737efb9f7537e4fb6c296295526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5222f38683c52ca206df402c4d6730544
SHA1ba797140c5feb091fed88330b723faf9762d937c
SHA2566188ac06d4967debbec9fd6dbbad839577f0006a1d0efff4333eee4aa99c2ca6
SHA512c34c9a2a10f4b4c3c8628bc910ce84a8b3f05f78c5413194f71ddfec1951e09e7e8b0b760404a1386a48671eccf425536084f3b11faeaceb3e30663742acceb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fe6094f252e5260ae8edaa9e482d41b
SHA19b11a0a3f2a37f74c146ba4d511b954dd62a7b2b
SHA256628bc7c2b5c9aa26dcae72e7a81bcb25addf5ec4302362aa4795b677ebd13cea
SHA512ad7be98ed9386c3f829a429bca6818b439bf6f47354bd275f4ba4b13b0feaebb8f5919f5a86e38e498ad82f9c016ff8213ff99dcbb1d932800af4ca6f8b00be7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522d7aa2d9bc287e7a751a5f99f9e7932
SHA1e2c25f78b2fd96e73f42bc1044e48b9d023da027
SHA256a3e284a38d4d2bc77e8f627de71306430c7ae433b07c9c0804d57d67c85a8d15
SHA5123ff012bf1f1f8be6d478b830776ce930f26cd4c0878504b3ca095ab1749d609c9cde953bf1da46c41382c13cac38577ed1a75a92cd94a35c62ca63a37c8b3d5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569c398e467cfcea1c25d4b4fb98ba225
SHA179e5ca8fcb87968eec1911565f9ab2eee6b54d2f
SHA2569defe948086b779b568f0dcd69181aec0298bd2049bd9fdf5e622f724ec2561e
SHA512cb3bea4f149eefaf4b0c208c0f13e65c51f6db77ee761d397a9b72cffb72876e4aea894a2b4e12f2dfd814e626fe1dfe7612110879a8d3b7b27c8a62326c29a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d04eec45d49ed4e25da4e6964cb37fb
SHA1e8865d93a2632bf8a4d842a75f7d3dcaac4cb4c1
SHA25670f8bea21ea1d5b287be847fa4fa2c3359967e67f3caeceba0be405469f0bd44
SHA512e4e5fdb7340bc023d37c8a9dbf052b3220d003775c56daf10c8c36a1e53f860e7d1460c1ee114fe8a7fe6e9feb69a137c126ad69ca9910b9cee4d88e86fd654d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e289d2fe821a4b5b603006d68b99462
SHA1fa91949ee2e3ec5078c1a0aa920c2c1a7c11b886
SHA256e41db0e8b55b94cd0630e3d9c999ce6983bd3e850a54f935c5f4371cf0a36433
SHA5120bc20ab32027d0bbbe7c56abdcd4b7aff9c089898530970c0c6c2037b3a4dcc79f728e6c6d8ad1e177994c883c98ea6d989667e9104d6d55e877a29447891652
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f720c5144de1e29c533e3a57d77f0dd1
SHA1fc1e2f360e088d38d86a7d87d9ad5438e742d20b
SHA25676cc1bb8412af48f0229805f0543c27386242557440d57a92922857438ff0c32
SHA51297f5429ce783f4c99599571b5eee5fa8e4ab8d3a378bb8a9ff5965d232cb148df52b2e0bf3b93d9e9e5a6c4166b2d11b3fd87c5f1b4fea76867dcb6a37e4dbe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51afff3c7ba5be196fd0187eebd33e37e
SHA1cb62efdf7709a21d12f35babbeb21a8f154bb4fc
SHA2562dcc1f187b148cf342be8c3b1341e4aa858e6fb437170a44e308fd59a2cfdbd3
SHA5127f9d2cf5b02cc4a873c73b15ea6dc2da3498e4c2cb7a4dc50b62bd976ef3fe4f9b7d9d07d8ce9cf4ca14410238f0ea27e530145c0ad88340cb3586e1035cb5c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5421933fe33ad8f2aefa66fe1aef42c43
SHA17c2e3d65d149e6e7ac74816e47a172488cc81dc2
SHA256f61950e76d88b169cd2b85a2fafbfde574d57a760e5f75631f6c832d83f9ed97
SHA5129b72831c4f5845d2a2b080ec56bb1858ed398e67a551805e90b1a14c11d16dea046657440501abbc6a2afaa5d5646bbe8b0c994308f92b89b188e9430f0a11d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0951102943a3cc256a39f31052e1f91
SHA19c8166e61dcf439a3da9280fa7eda607464b3071
SHA256873624e2bd33393c02993bcbf66bd9cfeb819f1d3257eca38358b0372ce2a4cb
SHA512d66580363c1656ad5740002337f683dc4721035c025e0df7bff4697f2974068ad43d9b60ce2c6394002e65d2bea30d4eb5f8ab7dca979b71b559176b43c961d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cb7cebce623d02d6a3913937621e264
SHA10d2bc40ca9b008d4d72a862d6cb7e5511c0ae9b4
SHA25693c6f503250e99b50fa87c4038d7689f11fce9e8173f034a0085520c4c671dad
SHA512dd97ecfcacd917729ff62796c445741f90e2eeda4b4b7ad16c40ba628382fe6d6116ccc77b8dffcd7ecd92022023394b7ffc7604b2cb1d50b0c2bda548229f27
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b