Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 06:36
Static task
static1
Behavioral task
behavioral1
Sample
c0281a305be881f7807c7306c39ff81c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c0281a305be881f7807c7306c39ff81c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c0281a305be881f7807c7306c39ff81c_JaffaCakes118.html
-
Size
460KB
-
MD5
c0281a305be881f7807c7306c39ff81c
-
SHA1
ba781a0e6b03e3ccc658aaacc092657e52b0a99e
-
SHA256
6e8dff69c98b0cfcdc2619da0d12a7c58e561f7959764e447f30fddde1bacc5f
-
SHA512
3c6bf5b0ab7f8f9492a05d545f2062a801886d3c91c88590b274fa1012e59483545c5e9155441b81d5a5131345b626936dd492a34cb121dd831f8bdd52ef52ab
-
SSDEEP
6144:SfsMYod+X3oI+YstsMYod+X3oI+YLsMYod+X3oI+YLsMYod+X3oI+YQ:45d+X3u55d+X3p5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000d09f498f997b7b159eebc272e74e9361385ac3f59492374728203575ab273943000000000e8000000002000020000000b43b73f0dd6cf5aa466d12841f3fd69c5c9ffdf49fb5b4d515fe8a1c2a7a844f200000003ccd841a8af8302228551d697937c5dda651d449fd7042894ace9e83ed55ecd7400000009103fba00c82470224b947e659023e5cdb4e3f84568e274ef1dbad1517a585200a1f28801dda20e32f974e0ecccef44961988412bc10b873e4b15ce0ff1b3ce5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430729655" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5B0A4F51-62AC-11EF-B44F-526249468C57} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c07e9733b9f6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2276 iexplore.exe 2276 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2776 2276 iexplore.exe 30 PID 2276 wrote to memory of 2776 2276 iexplore.exe 30 PID 2276 wrote to memory of 2776 2276 iexplore.exe 30 PID 2276 wrote to memory of 2776 2276 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c0281a305be881f7807c7306c39ff81c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2276 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c56cc4a27ddea620bc2f5bf68657a9db
SHA1db8ebd0b0da8dabecde3effbeb1b518e61b13b99
SHA25696937c66511ca969c246c4ca447c0e8a94dd77afd78552008f87eea564ca825a
SHA512c94e18e33cc78d179dabe9e745a4db59e8716300b0a13733c95b029116e8b091219d7b4275fc78fb4bee9fc7ad37fa6bb810638a6cdc87cbcd67e134abed65b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b08ddb91aa3bc6ba53e96f1535e21ab
SHA1780c77fdaee95af1edeccd0b4fc03dad8eba989e
SHA25658cd850fa079570c222ed97ff1b9bd99c62546ea8ac25bec1f4ea5f4ac7e2f78
SHA512425f294a88f2afac61c0fcc0c976768920a417669075928f9e74b888c2de869ceedd190b04ce2618b5a63fd239d921f7ae93f1f49679a1c37d7d1b43ce72b279
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534bb85b6b912ae7932605c3e65181451
SHA1f028f125c6e46a7972d9a4bece3e949ec7451d32
SHA25636a42b4baca736f0f83e221e0f75faf8d48094606589f67ecc72ba111979972b
SHA5127eaf945ea290fe5eb778b0569eb4ab2552c2fc5c5311903f6f7a2828ae3d3d9c1604c6ee3288fafdd74bab20546a9cb6ca01740ef1f06d796fd26f5f2a5572c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59663c2f098d0cae1c48e1d5f58252c05
SHA13178f01e6dfaf108d45447092e7ef377c961069e
SHA2568da29ccbc591a69bd5b03fc538ed53b0fc0ce68760f94e877bd727942c4acc55
SHA512431767a332299c177c2e9af77b3a9d9e3d5430f6c0d28bf883c125414d99847d0277dd4c3e47b8cdd8c203299f128d21aa1eefeeeba67c5de800da435f388ca0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5009cfdf7006a4c18a8848afab6a74608
SHA1c8930b5bfb2e514dcaa7dad959d38c65f4564aa8
SHA2567d28cf2501ee28ffa68820a3881f2c4d9236f026b4f7bf343ed8aaae218da92c
SHA512eb50ba8d840ae12e5750ea982122922f13329775f30d832cca09ebf0699f4127ea2a5339d207e83d65a867f1c68a473fd0cc38cc2acdbb0479bf9f8fd68df490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507b648bd995a0a24b4fe6a1ea8a01e3d
SHA147d515c146325279ac91e6a56c143630886bcc1b
SHA256bb5905f83e552130571669dd8186aa78910d62b1049a3b29926169a2b49bfdb3
SHA512f3dc5fbac4c47fc903ffc04f60d003ece7f03b4607d981e61bb7cf1ee79834a7c072dfd89c986ad3410554326a4c57a8358e0f53d421002c42b282e74ab09332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d302d042ef40f2fe9b4a2a647303294
SHA14e45de4eb1e77a6c3130d5f810d78db2197cc328
SHA2565a4408c9318fbc3c259c40901e25e7637eba01926574f536ce13454207146ea7
SHA512d97328f1eb3297498a3efe6ca319813bfdb79f8d122dba04e35e76cda9098afba92058dbac12a4382d7789afbec562ccd6f4c233d3fe14f4c9064d070a02a045
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f85057e51f94257931d6ad9eff3a9b9
SHA1d5414a3f690de377b6d763e37e735abce59664fa
SHA25658038b74f6bf746bb56765a6886fb7517e2c47643a680b7731d5fba247084d87
SHA512ea327a90d3a839c23a04e483d73a8424480b8c3996649ac7c677b50450b594ece3936f162e471b2904753bb475ed894706f3aa741ff9135b7460efa780864d26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586bebf0395a0533b1064912f069c9a24
SHA100b3bb3d0fe70c552fd95028826be547492f7b22
SHA256732fc408c724c5b829b9901e827663bb026ee16e50717e7372a7b25e5b16d53a
SHA512a72f4917b73361608af24fb20a1b6efdedfe3141874be9c072eda84e2750be28813aadc3310d5df1dd9429d9a995120de37eaf43bd045a9d45acdb5fc7ab292f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5131ce6e7ee5dea2d64ac3751d1a7a189
SHA1590cf3e336608b1f90a2ed1f9c6f634620019706
SHA2561c3f40563378456807b60e73db5ef21bd20c8d6320daa8c85f8047ddfa1bc13f
SHA512e35c0672090b4eed6305dc6b433256ab8c6e8f62c25a28e6e12fbeb24c20e5c73a96c99f4159d65d9975ace063dd0aea5eea1b7f05667aa267a959fbcc6898a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523a96e0e2a83e0a281e23441b27b9022
SHA144df7f3349c38093bf65e52bb8d9017ca46b445a
SHA25601b107835540574d046edabde96ac4299fa849366fa42003edfc90c0cd012b70
SHA512cf0e298c9bbcb602aa24011a74ad9ec12b8aed5b19eb62d82ccda4e73d9a594687592f980e5d9802f03a5e69b77a3ef9e5a0d258437fc01d8d6a2b2494a7e8cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7dc74df91147faf360003f04816b8ad
SHA1bf347b9f4d97788d613342254d50559d290e72d5
SHA256e057dbe2f25b95fa607048acb938ad03a755a51628348a56a9a590885e07b48a
SHA5128d9430046ef8957bc9442f4ee1619d52777f411dfaf9e0caf3b5c2dcfe5defbc9c77a0ba8e1268369bf32cf74c35176d51a234688f097083fe7b73e3d7f0ad79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bf20364c65299aad97387b9e72afca3
SHA185a6bfa4b0c117c96326f9eacec9a4b052cd82de
SHA2569e8b21e3a93aa4808a31fb5e1c80488ef0e79514dc2fd001ed3d8a47df180cfc
SHA51218175bfd93fec1e586ce76853f0456f92b5683598cc295f3685203bf25c0424ff89cfa81d66be8847bbaa36752a68988c930b462d99aa30427992e2eb0a11fbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50412273c4048d9f34b2758b4d6212d33
SHA1b366938f2bcdea07d3e9f0e2acfd02a94d1ec25d
SHA256ac7b9c8d27ec8b1eb910fd1db1d483989dbef2bc83eef2546d92d732b4552fb4
SHA51204c57dc6e075792bf27e49310b3d9ac78ba139cd7acaebae570301c9cb203d3ecce3a982862fda48f6f24b3b77ffe4dfa41ad9f91e24eaa3deadf35ddcdaa4bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2cf85120d2df726bed0eaa597cc24c7
SHA1416790d281a220f3f75f82cd0bd3f084a785de22
SHA25609a30326eafc9b2311ef51bd807e4a6807292cf1c77a16efecebe5462bd802b0
SHA5127ac405ff975ce8767d4538898ad9a65ad6e5ddd4328c490055b96eaf7734052786d13a4959eda8bd1f35852a73dbaac5a7d5e7819204b2942faa20a2413edb06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc8f1d0153594f591dbae7f063090986
SHA1ffba49bc41d9454d0b4f1fb2788f8e14fd944186
SHA2561178292c110222da67db91fa8bbdd0edf735383bb809c616d471f184f3c74a57
SHA5120bd575a064354751133552a13c5dbb7029ed855edafcd7045aee332104d4d5ed616fdb5617331a6d3744dee53dc6418cd4007faef5bf799ca7681b0c850e002e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56895a6e129f3b2d91d1167a8bce8dd9e
SHA1d91ec0da45f18a2f4eba83666801d062dbf043c2
SHA256f69d7644be71ec6731f7c5f21ded68566703ec02468f772ee8b1cb5ce309b2d8
SHA51237b8bb69c1ff73cb598cd328168d74f9f49c3aaf3bf276545a3344770983ec28c59cae50b98ecd06d86ea5a842c4f39cb1299128fdb8e84832f252e6b45be509
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6027dccd33ae74487c3d56734d740c8
SHA1e0b891035bc626b5fcda9a2c2a2d92da96d9243e
SHA2566cbe1f37d313335915c75947337ce72baa484e5878c022fa8d9b78d643fa7175
SHA5125313b64da663710921b99384854d3e5c43c7eb1f14eb3e4e89efe2f6844f80382728ca285ba9096834ddcb4ab35d143ae2922f10f5e1eedaf38741a125c9e99b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574a9f83aa89e406014f07a58987f85e4
SHA19232a38d879f8eb4c81a2dc53c936d2dba7d9fd3
SHA256413e081cc1790670d7ec914dd8ffd7710962aab783a07111c932bcda3e7b0b04
SHA512fc15e830cc311a6f6300af69fc15136001cc36ffa7c8bc487bc5a9b43b85badeb8574b01dee3a335fb683cb23eba4ec25f9f49493dd9af6e0b25ff99ac60bc9c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b