Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 07:37
Static task
static1
Behavioral task
behavioral1
Sample
c0416cf814d18828b89712db4e49a051_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c0416cf814d18828b89712db4e49a051_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c0416cf814d18828b89712db4e49a051_JaffaCakes118.html
-
Size
6KB
-
MD5
c0416cf814d18828b89712db4e49a051
-
SHA1
ed1384b3589216240b92eadf509c961e6cbd93b1
-
SHA256
8b40ab7d44e5d1714e5e45ebefd93db6dce02cde045b14b807dad51143ed2c5c
-
SHA512
060b1b95cd469931f773e7f0cf4f0a11fb6341a686f39488503d11a9a725e1de05005a7699f22872b5a849d8a6f8c5c323e66b66a32d83a0aa29f4911314b66a
-
SSDEEP
96:uzVs+ux7LzLLY1k9o84d12ef7CSTUB9cEZ7ru7f:csz7LzAYS/cb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b09a33b5c1f6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430733315" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000035f7aa77a73e06e9175fecd1bb488334bd572c79970f8d42cd5a6b482b180793000000000e8000000002000020000000ec6923c8b883c9741c50ea22da282939c831e2cdd236eb6bf7b3d35b09c3c6b8200000009783d8b06c159d4d687ea38dbf480b7b5151124f6f1bae198fa3826c83c8415c40000000aa605f41900eba6310aa619f7157372c5efb3b3a96960ca5ff321d15123eec8b41f2560c172a0079380b577d6889529326d7623f10bba534a9cca74923385f2d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DFD302B1-62B4-11EF-B062-D6EBA8958965} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 624 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 624 iexplore.exe 624 iexplore.exe 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 624 wrote to memory of 2168 624 iexplore.exe 30 PID 624 wrote to memory of 2168 624 iexplore.exe 30 PID 624 wrote to memory of 2168 624 iexplore.exe 30 PID 624 wrote to memory of 2168 624 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c0416cf814d18828b89712db4e49a051_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:624 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cd0471e51f7f797d563e42eb5618ade
SHA198267e812d5049b5d5c03fded876a52043822a12
SHA256bb54a4b0a2c5546d6ac639c72fd85b8348383ddd7ebff63311622955cd4f4c6a
SHA512072a6f8b8a085783c5c1a0022a4848e64f643cfad1b9c0e827d0911f9935f370e238cfbbb062ce203624ba482e48f94754f181a40c8844b8671501456a9e2fd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55041ec3060bf36124242faa2c5d4e219
SHA1306f874d732f16e59927db96d87f0f2ff686e36c
SHA25653548741843022b1775c29d7696d4d233946c82a8ac2af830d6f444e3d09cdb9
SHA512288c335652a2eda27793169076d4ad53a4b1d32c0b2bba56d404236593a0be10ff7a8838cd2091c63cf0a854114420879d503b1c15f8591f1f99c3b084077026
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bae9302d190a8a22f1f6850ac1000b82
SHA15d3f1ccb7d1bf31e6d4efe856fd0c6705b607619
SHA256b5807054b5dab67a9d100573956e5af3417ab8169a7d86fb9e74275d03ad1db8
SHA51276bf658e5239c60982101d0b835196bc685bf30f5b112f8a3d0c50c41b9a326ca6d30fc763981df20e8ada1aabc6d9b9be9e37db9ee8427dd386c55f83188325
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfb012ef1bfc4c46cc27e7ae8f487d2d
SHA1bfab44a145892f114e066ed50741d7938d9f7b32
SHA2564a737777f4034393add25242190a4991bd9b6514e9f38a3e6d8cbfbdaedc5c82
SHA512f68ee392cc07bfb73f0cdcf9164d4831460f392c06b9fa9a2ee02ef49847f3e550edd1cf4ff74f893268594993faa9ad31d91d20aa6a70cab30467b73edcb579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52da7f6e21b5bb882b8417f1c8e493c43
SHA19419c2ad6e33ac708db361b209294c1096b765ed
SHA25676390c9ec1c3a46d59276dd9a67de9e6df18f15af255b56f9a6807b0c5e35799
SHA5122cef9ecd9cb315eb58b911e399a18bc535c56437e97abba4f5ed52a01c2093bd0384e20cca90bd267bd7051280e52f16bbabb775ab6c853272cbbdb911cff333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c4b4be2475c00db30dcf7534b9ebcfb
SHA163436aaf19f6d26aa53a7081ad6e470f2ccbc334
SHA2564c76c3b232a75aeeabbd0baacb89c5c867a2633a0e23be7583db9f8809aa1ecd
SHA5125d6e7fa4575ca4f91fb201972b3117a2b327f1f15e5e0396ca77195c21b83ae79c7141aa979477c7733e3447dd4996921c46da00edeeba53f6e368b89d9dc2cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529065f1f29bc6c1303a56cdb2d8af899
SHA125048a5666306632326aa6f33895e7937e1c52a6
SHA25631dc317eff17f735cdd2b96279227baa00d8df2747590ede0dcbd5c5bb0dfe65
SHA512e79165e98b1e4ac6840a8eabbdc702afaf2cafbc7c15ddbe91d57f7315b77453a6bac39626b2fc3d7562a702c54a80e9c96a587bbf2f4e33f46fe1f447d3f25d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59162786b3ce9743dcb2fc2e898014f52
SHA12b976f17999f8b354e5bd9dcc653b91ff0eed324
SHA25699c3ab2393b98205831874476495db28ecc06f8e521e87a5d57464fbe9c5f089
SHA512d7f522b469e94321a58ec67ba178fdd3da79ce475a49aaa8779aa95c7ef48fd863ee8a60e7ff248d44ee133a2fe380e590b9313000aa3ada400c2a13a08c3e65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d22b1fc94bff47a3ccfdcff0b171963
SHA1089e2a33c98b6bd7c843109a5dbc54390463eaa5
SHA256f2e493d86deb635324160128ea1b9cc6988709db4ea6fa46e252a00816555abc
SHA5124b95fb828082b7463be0e153a5c3f5e5dfd85994cdc592321bca01b32566206096c3f1b949d57ef2b32b171d66bdd98a3429547778c426d02e5e76e67164bdec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf7a0b87a52d45f7094d4fd1733455c9
SHA1e8669acbad148d56f6d9654fbb5ae0f824020814
SHA2569c7e11b97e12270a8ce913c00cfa5aba818abaa571a892e77cc33a478d53421d
SHA512e13b5d23cbb43ca6a27105a542e8fb6873905e1c1428ed233f60f0ae5ade57dc81c708f694a088150d6784ef023736b8a06ee3a92cd06b631fff48e0123dab3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5471f87d9d8571d5ccdf603aead88a29e
SHA15e0fc31180932a2616024988445ad54228189a97
SHA256dff80985d176caddb7db9a5eb5c4e3d74f5908b3e82a7d5d0c0f85d665e6e989
SHA5126971f6c307f05d8ad2bb8df017edd23129c687b7ee369c8abf7d773b22c078c57dbbcf08f3a772c42996d20f76b2f495a4e20ce0c14befa2c56fe75741c75c27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5aaedbdaec39b39da29ebe5721032e3
SHA1f9e2eb602e4a9d56c6af61d93c0c057c287a000a
SHA256c1a7fa27891770a89ae49fc3ab024027d07ed7af95eccc8fb56d79ca1a5f88c3
SHA512a67b3a42f0ec0b24bfcba12088e174565675684b48c9be0114c375af0313bb698a044b28320a48993e7c961b2be03e62cefde819d39a59a280c0b8bd92ccad9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cf07c6dc14a7adaed8b6998d79e0c9f
SHA1057e1f506b247a6772cc83b9796b52370f805e8c
SHA25638dd390672e30f1a1bfc8854743d3ac01fae59a219e535f5d0abbccc3f0c9ff8
SHA5123764693f3f0a4cb0a7172c42a13fbcc3d28b01669ccb7389b37b625ef8e1e3ca0934d29571f3b379e69abb689af1582e51626e159d412d1ec5e4111cd624d1b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bfe977cf590f0523fa475ef94e04e72
SHA1630700e702c8f4576596d17d36475745eeb547ff
SHA25612431ce23c574c32d99a156900cee1e941ec8e36156d2b7b911604b7e8e3a07e
SHA512eeba4cd39a897fd75bae36108fd78bed53c426328309a214251d2d8dfc83ccc526e15477adc57ab02a5217134e3d99d6d8f9a805c85ef8a3ec8f80ae55a301d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525363c78443a42987698d05b817c63c5
SHA1088130f59e1a69541c1630319b3d96abfdd5014d
SHA2567a4c786a6bedb917d27b03d4202e122dc1a4049f0205ce5dcea7ea67b8dd8cb9
SHA512a17a8256ba4fb685ef651f89624c5a4930486e3ce0ff8d679ff08863976b6c8c94a325f1e1bbb546e6a01a7f6fb7d87b0c39b6b7270d84dcaf800d5a81449e7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5872129c5ec49cabcf9172d547d879d76
SHA1fb7bd7fcd3958143d0d91cd286d84ee98a16ae2b
SHA256b9a5952d645b3830181c23e173605d103b134efe06b322ba9dad66aff5c9b0cb
SHA51216433f0ccd8fcfe20f50a54a4e034dd8e7261959277cc43edf2e10cc5a6fe9438b6ca6b7fb30574ae1b746c4ce839b393d7e00daf4a4640e3317dc83f0f865d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0624d66d499d358abee2054b8217832
SHA14e77f0c123a0a03404459ba6765b66ec3ed98fdf
SHA256695d4b9a7582fe97ca2b80528012c781c9d2bae6a803d17d47b99a5b2c55cc64
SHA512b162aeef0f8336f5286cb03163b4faed76d53abaddc990f5133cf0a52bc453c94183d163bde6329240e578289f80befcffe129e805b89c1ff4a6b5d138e6e1af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f7482e04003c6596a8644c3295a3aa6
SHA1029d8d7f4512fe90e3ebe1c7304e93d28547b8ad
SHA256a8b64a0bfaf30817edde286f95ff42d130d042abd53987b9fcba8ae2730885c2
SHA51290cb5050f8a11df26f603635827c14c5ad3dc010c9104aba6aaa5fb4f17df4f23dc831b4068c1306bd30995dd2d63bcb016f9cf508a2d558bccda96dba5803ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534a73f5145a6800b230b0119c9e442a5
SHA17885d7d9cde023dbdc762aa4a2b4c23d03f6e202
SHA2566896cccc38b3cf134d6d6f27917c9e378541714b716101ded7381dd575152433
SHA512ee5c6314154e7716be0100b43bc25f89f1c406da8a547755139c0a9e3b27ad6d54a34b39188d26635883da90262727c6cbb0ccc2182cf290db43a4b5fb9eb33c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b