Analysis
-
max time kernel
135s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 07:19
Static task
static1
Behavioral task
behavioral1
Sample
c03ad0690317486165f60252731e33ce_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c03ad0690317486165f60252731e33ce_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c03ad0690317486165f60252731e33ce_JaffaCakes118.html
-
Size
151KB
-
MD5
c03ad0690317486165f60252731e33ce
-
SHA1
cfb178d2836089c16a9fa79e32e6e5e23e7c1db4
-
SHA256
6fc2bda045158b2db35e9ad1f32082f172b4fea1c58ed2a85ffea9a53c0f7221
-
SHA512
78ca645d9c237fce7ac19387f38226895d20a74d7843e166ad86564a9f821487b8e291a34c4d8f2fb391352cf8863e81643255ade04cb6e356983882b3deb40b
-
SSDEEP
1536:pqDohUooppWWBBkkaazzKKII66MMKKlljjFFNNllQQHHQQjjEECChh66xxxx++Bk:ADoAtYmST+U1CuxdtAW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000004b6c121fd4a296a4bfdaa1701691457d12c79c591333b6d1ee1b2bbfab699ed000000000e80000000020000200000000d680e08d5877be7899a30cccceeada43c3f32ba02d4e318f9f8a8a69c47dcfc200000008676a64c88561c53ebd5c6fe392c7c91f8965c5df9880b5df144a112591c3f72400000005e85cf90c6c6da2e5103d5cece0c769171a0052c7068fe8d0a7a19250344060d7d2fdba9c83ac6d903c2d128ba6e63d2bf2e750d6d8c471b627c27d8ed4dfe5b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{65BED281-62B2-11EF-9AE5-CA26F3F7E98A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430732252" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90142f62bff6da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 808 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 808 iexplore.exe 808 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 808 wrote to memory of 2428 808 iexplore.exe 30 PID 808 wrote to memory of 2428 808 iexplore.exe 30 PID 808 wrote to memory of 2428 808 iexplore.exe 30 PID 808 wrote to memory of 2428 808 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c03ad0690317486165f60252731e33ce_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:808 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD501ebcd36a8634f39cec38039b0cafdba
SHA14415e43083121586a5753e94829cb2fb6ec5ca01
SHA2563ee4962eb49a50608fefbf5d32a846ea702e5324505708b656baef9406cf0fdf
SHA512233f8ab9319b4ab19dc506bbc607d782a651a5252a7fafe909f8855587ea59a7fc88b3abbcfea7ce61753540fcaa678d8f4e96884c85a1d95910f47f5038c229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7e7126275f99a7c22fa64ef32707644
SHA1647005484410cbf5fd606524a834fd3ebd9b4d18
SHA25622ae40a1be5c4a4b937eaa7f79226ff1c58c31796e0e22dd0ef7a4d26260ff63
SHA51295eb50a10e4e474ab6c660b0bfcaf9dfc7d9451899f134e95065c11ca95ba14232834f73cd26ee5f1c33c6c1158c98e416ef81bd358ff33139fd1e6f247fc188
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c085f3460c4324584cbc49024a0008d8
SHA1819d055c95eb13f0c149760610fcdef333cfebd1
SHA2565fc8f883aa7fb219316538fc972a28e180fab21c82fe03c31f027670e9ec2b29
SHA512217ef2268136c2d7d19bf814ad7f29a7d83af6097e203b26fe4666acfdb89648286ab51e490301d2221e7e7f4276010ba737cfb0c2006965efa58fe9654c80d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e87fd2b0947249bc0e049f82541e1af
SHA16db5376d12462530d4bbcefe0227d8283633019d
SHA256f75db3bdaa7eccfd01ead4d4b8a2b70fd358974625a8a6f78cddd6380227f114
SHA512488b3a6704e2db4853b58150ddaf06df3f4421bec87b7c053eeced29fcaf95fb1e624cd95043e8860eb7845a24a097c6aecc74594541c2f4517c4b3671c96d53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569c6d72d1a34f6f4042e6c2e40cafe19
SHA1751d254d3419eb1fdae018f1477bd883902e5272
SHA256241c1bc9ee9d07a507fd9b9798c379a9c8844d80f6aee5dceaf95ca5da43de35
SHA51239454dfd8cd7e07f1889b684d6d299d596c0ffb8630d9e28d5bf943559fbfda7bec1809e948d43e83d4c4339c395279012c6b9c779702faf95b154d5dcacc515
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa7241cec8411e5313a4fd75666be6c0
SHA1c160801c91a9c175489eb025f1dfca5417322b3a
SHA256d07795116eab5ecf60bc6eb6a76f05a0fe7abb8a0a5a53aaf3831048ad55ab78
SHA51252d425bc341760701f39774d4b3f350f9b190cafe7e7163b8ec74f20487dbf0dff2966605ffd37b6b060d8ffc97c1cfb0066fea45d88c14836a18647e7613c55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce5d0d32eb31e0d153516f361746742a
SHA1e3e7e810c62905f06f59a5867d9c6a7423040fae
SHA2563e26fab30dca1b3a5230f6c3a01ba205748385c57dd08f7297554fd2d47d4dd6
SHA512d13a86e02318dc77d4cf4fa0cbd22d6ace7b3d5f99d7461caeb08dc68e6932166a91b9f2f65a9ed4bde537bc087d695070d4573b341bf2a090f85dfac8f464ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1d9e4864bfd825974eac7e9fc41d6bf
SHA10d44101d569b53aedceff2544f9ba5d2d63ce0fc
SHA256f267ff58e94d2ff710afe52cd0e727485f9023e414dba4df0e0b299355c7144f
SHA512f1e9a3d5cbd0dcacfd167c94a43ef02a3f3c61a3f7e39bc4a00bbc284c159a268cb8e3f2b8ddd1168127fe49fd72b95ce754eb624414848e9d690afbc99a6cd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5534cf69b1e9d67365d7392f4d5480df7
SHA18786a0cb6fad954ba59f7d35e6f2e9bb213d16a3
SHA256dad67cc4ae96592dfacb4b2aef520c4eb1930f2daa7a42efcbfdb10bfa5ab66e
SHA51258d1ad6d980b12809358d453f3e4216c5bdfd5f99d0564b9b9f250e8ce7dd3bc22bacc47d601c1ed80beaab653fd7003c7eb7340bd376898cbeeee12b74e2b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1c67e4dc9733e2926188b4b61cdd275
SHA1a7cb03cea4f372ce5316ccd9c9f990152fb57872
SHA256a6516b0a35d12cad92eff4b044664d49da61b39576c8e69951e84bb1f4131ae5
SHA512bc6c604c4b45f58e1908263f23ec919028d2f895e1d25b381c5d477ce6cd2a869102bc795837d295f12b88f50dce5e55e4be92da14b4b6df9a4b496dc284b318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af4f424f83aba77eea5047921a8cc398
SHA1499b944c5112337c30a285658687a1d28bda97c5
SHA2563434475b4c6f185af3df50405fac83ea646a47834fb52ea44c3352792d2fcbe6
SHA512a3745f2c6996cd7330870ee8c5d4b9091917b462c1bfeed72373f52e882526b485d0c474af710a74f15afbb10bb8e81fb1aa374fb3a0b062c3f3e3eb467c0a30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510bc6bf57f618e03c9e2928a3a1c1813
SHA176552e2bb1f3f2d6281b66826787af41aa7ac92e
SHA256ffdd38de8e979a8eb7714e5dd06e1e61584d712053418b14b7efccd1370e70d3
SHA512d094921aaa86a5fb074ec24d406799384ccd4d5cf4e344e57fb9ac8b80f4a1d0169e7aa73d2598b31a67ff4a5b689bfdbe76b99b3f1e74a5b57e170b7d1e622d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a6fde80e8a022ca9ad8dcb1a338586e
SHA1a20d573c40b7f824f5828f767887c8e3293646cc
SHA2561b388b9cfb8040e93b38bacdd39f838c728d9bf61ac0f370c10acd6088b8a150
SHA5120e5476d1849fb9ae8d7e740769c394493a19e98d62652c48300d0728431ebc0c79c19060c7c411589149fb6c6c5bb128020f5b60fac0cdfdaa70d0cbecf09e41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a943debd622327c54a0ea95d24bf7967
SHA1a5eec45ce2ca4855195ada5535c531708b868d8a
SHA256636a0d2cb67b5583412d727d10a951d2a7ae82a629cf5de411768bc031e3c9b9
SHA512c5087c06898abe62af5e09d4abe39a2bfe0d986b0f447f1186a7a5f0ed9dfb57e278afb7c569fd83840b0ccdfc37778f9036e779aabdc88f3b89432e0a73d822
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e188726c039ba391472f3e0f59987090
SHA142b766c01c0db8c4ca27c62e45ed6b951a8ce5cf
SHA256a1691e7a5ce199c9c520a7ec655fff59666a91df5b8dd6fd2e864317c1dd7ad5
SHA512273ad009453d36cdf9c790c98ed03a0736793cb7e734738e316ff82b147651ae16792736f94d3a30e7b00cae62d5273ef7f16d199bfc51feb1d1e140f23dad07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD53d9c92afc518e4fc35d467cef7387e19
SHA193cd94062d6bfe4cb90b4b52bf0be0e653f4525f
SHA2560e953a0ff05c405446d0bccab25f3d9a610801623bc22456cab7d91599416970
SHA512a1b2d90c3833ecc7f09ec4cea25485c89d75cfe2521644fa7128ef27e196bf45c5bd31d41dd469c001c0d73ed09c22f835e0d1086934c07daa1ee5827f0a7881
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YW15VCHK\plusone[1].js
Filesize55KB
MD5950e589a42fd435b2b6daacbdbbf877c
SHA178dc5743d4b541018adafe3a2b49b6be5f1c7944
SHA256c5e3093bd5e8a58f04846013ead66d36ca25457a0475c9c72d8cde60e598fc0e
SHA512cf2aa139ee4c2f79ad5dbca6239e4d5179a21f54cf2c3672c45915b3282bda5f5fa702c241d3b5c02805cdf1b48427d34e86b627904055a46ff6ef11be2b2104
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b