Analysis
-
max time kernel
79s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 11:20
Static task
static1
Behavioral task
behavioral1
Sample
c0a10bbc22a6de1a1c73439b69ed52fc_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c0a10bbc22a6de1a1c73439b69ed52fc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c0a10bbc22a6de1a1c73439b69ed52fc_JaffaCakes118.html
-
Size
496B
-
MD5
c0a10bbc22a6de1a1c73439b69ed52fc
-
SHA1
a1e64078a607d5ea6a8e356ec48f07dc9cd3d8f7
-
SHA256
d70d6fb32db76d4a714a0993830a50f20d5d6a1bc9932427e425b62b88d26105
-
SHA512
fb9b556946f7ca16f95896378c5dab1e19072899674bd2a83dcabd3b367a0ccd7e9649f8d3c5d90c5c886b0dc8bd022503b7e97644e560e0dacff018551943c7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 207ef0d0e0f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430746686" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FBB0F311-62D3-11EF-880F-D61F2295B977} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000b094e8d15dda9c3b5495ba4f2880e88d3ca417aae1bf189e6eba4fa3a1d7cd9c000000000e80000000020000200000003d4240c137b5d3e8c990586b7da40394accde1a7315909b99e356a10c1f4b644200000007ba361cd3554e76ee92282c12ec4c49c17b66af65eaca7c38bd38bc56912480b40000000405c6aa7f8e1596de61a396a61ea2ebfb08c581855bd83808880eb368eb7036c6c46a80a2f502d8164c1f9df32d8ec0af777b7e61aaad68b3fff8e0defc2dde9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1292 iexplore.exe 1292 iexplore.exe 1248 IEXPLORE.EXE 1248 IEXPLORE.EXE 1248 IEXPLORE.EXE 1248 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1292 wrote to memory of 1248 1292 iexplore.exe 30 PID 1292 wrote to memory of 1248 1292 iexplore.exe 30 PID 1292 wrote to memory of 1248 1292 iexplore.exe 30 PID 1292 wrote to memory of 1248 1292 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c0a10bbc22a6de1a1c73439b69ed52fc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1292 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cd2cabe307d2c83c5b5065d00e69eff
SHA12677cd2793b8936716973086cf69bc2ee0b2123d
SHA256b29215f2c197456f989595be9a07dfa0652c524f22f0048eda9b0656dfe60d35
SHA512fe0cc1a2e832eea58607e6687a7554287312301e3a4c4a4530f34cbf0438a15cc07ee36781371ff0bac7b453e26c049b55db8912ef99694297cbba8b86ad3db4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ae8ebd683cdc9405b4c70512f5ad402
SHA10a4fc14d357cb8a2531ad2bf90a5dd09c247ad46
SHA256b1909de256a44803ca1da685d97a9f211ed46be4290ae8979e8e5074c3bce800
SHA512cbcc7e684150783df383c687553b49bf5a449dc18a867cac11b6b2a4a29ef3c3bd725532174d8886a9041ae09e2aa1a4ed63fcb18b3df7995ed2da35d0a11fe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501082cca15fe188fafe46cb05ced9d41
SHA15d96854a45b4bfc1b157c2db1b7d96cfb1a331b9
SHA25641920db9207dd324ab523007c1f2cfb6bacd71d864bc5f6d1e1e02c566500794
SHA512d050dec491b6b79c24d7e29602ec1fdd1abe7ad0e2c435d1a4578487f657f285e1342d4bc85a64926c7e1f5d1a1b303089c414693e4e5a126461e287739efc4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b67ea73ad79b3df267eadc59e8cda91
SHA1dc70a92ab0eb430b6c324f09fea97e7250d4b7db
SHA256199ce154a76d5c899926b296ea709f7735e5e86fa3f9d47e20eefc9b64cca340
SHA512ce4572c67d0beaf5386dbf170db690686f120b612bc3c3f9548d38ad401f9ff1b34586247fc80eeebf5287373300763cfe6ad199b0fe24bfd9277bc04ccc0cf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523d039990bcb2b60a035931eb5154755
SHA1f0151f728dc026a37abf7fc2267f00239784526f
SHA25694e9774133a8dcd0a9edd72b2dd16faa97192211f7569c456356c9dfeca582fc
SHA512c28cc5846c78bedf21238b0807deecffefba7053e77a6eea39b594afeb9614f1ac58268055264ffb0a4d0bb1a49619507868b8c9219c0006899b262e9e905385
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cae3ce46e936fb02cb61a2b9f0bab70c
SHA1197f2d4e00b17fd74af3459a15f5306f36320eff
SHA25633c3668deda1c4978b9d1990bfaf52083d906b4b6a5d230807cb02b8baae2dc8
SHA512e1e58b96de147cc88b15684e0e9b093907815be975d9b733d342c0095fbab541c79614598f41c35605f3d69fd8263f9393fa6c2e4a1f49410ed781905336ea75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e16ade39b5b227237734f625d07b0db
SHA1d83ab424c0b20067ae4c1dda42fcd86b9a97df31
SHA25620a5c76d531334055d771e35494a9741469d6482efa05b7df7a57df2b391d0bb
SHA51276db8ef2d6122fd97037dcc3117f3c82a97fbac44690c148edb7306d93a8c80ab2a5c5a6753d7e8602bcedc0bfd44c99ba224741c15d4364ef67e1b783ee81c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b18da177e67e668efee7e33306c65069
SHA1b58ee85a37546a7633909ac89ad52d277cdf58bd
SHA256fdf26cb938871cca88f0520ce9a88107e0519507672508dbf7dda7d5600ef5ba
SHA5123d1f840f14708b4f19bdb6e73f7f7ccba7ca607fb75c0ddc1e5137e3f245d57aad965f93f8d1ccc38921cd2d524b9fd62b43f9e4e48beaa6c5cc4ff93641c4b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c08e47fc519e6c29c0a706e33fd22d34
SHA1194cef4fd30d58f1e00ce017b2ca01c2c9d6c3cd
SHA2560265a06bb0bf048d66dac6b332bb6c51d80d5ad23034a20bfcecd63086ddba7e
SHA512351a6732df7475921ae89d566fd7fe271ee760f527713d1562e48947684963ab00e695b2eef5123a6b855b1845a69729d1e1191e166a81e610aba53756eeef7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2fe91e06a275f058dd670e6ca8681e5
SHA17d65ab2cefc7382b04d0441912dda84285bda28e
SHA25631f98a22059bb8195eead610fe956c0ccf55c9f19079501f639a5e941c8d9e54
SHA5122ef967efff9f578a939fabb67c93a759af2661e8e059e112d3e02796a3fc277b740284370d90daaa12001f0b68a3302156d1564ed85c31c87c113c1d14a13e96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a7cf6a255b920080d35ad6b3e043231
SHA1768c5ea8ba01042c7add052f341e74c6a27939c3
SHA25628608d60b0ec59eaace13278c8c33dea6b71b8f22726f3e0134e328b94e3dad8
SHA5129db03632e6c6dac890ab84bc7872db6f41252292e9b5024a15cf5594967431be06297d0ca8d4a20c6469d4e60f033ce9659519b788bf7f1606eb600c81cc8f84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56496ffbca34b6b3a6ec20f29dd64dd46
SHA12331ef358b137259ba8262c4f016dc4094556612
SHA25685eb7e2ad609c0f8f3bf91814e79d8ca5e6326e948f28554ed6c58f5a2d85408
SHA512c65ea5a79a420f2f0a054f7c13dcdc903f73cde13587c06b1f44270d8a28be29e7353d8627ea3d7e55f43cc0e6dabd92878f8fb7611a557c19a8ee6ac9f15778
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51955e49fc20be2b0afccc1bba94d542a
SHA1f305b74aff2f599a89552357171abbfde4e354e1
SHA2568a110c20b799d24696e03fdc2bf0a8dd0eabb4f55343a3731fdabe9e2f427573
SHA512e990cc3635800382a0255e30e68a8e4142b166b943d0d74f531bbdf8a61ffaf68f7aa034bb230068e1dc866ba31b2107c995de60ca65ef542a6a6f38afbcc724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57521f1be504025901b09ba2c6efa2aef
SHA108b53ae6626612d4a905d26986ca690635cd51fd
SHA25671d9f79ee4f8c4b8603fe1e21591e37ea59b3898b50b01b54e91856f59bed4bd
SHA51279ba867c1e39db9ce9f865525e76e0b48df180ff04cda7ec3cf86f187c673f3cf7dc32720b483fdbf7a13a413691e2912ce78caaa0c31265eb717bb7ab8e01d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2faba694b1939c1f38f17bb30e94a65
SHA1788d786b65554f5777f9dc567b5789b272af24d1
SHA256ac99031f712b31d9013d2d558cdabbf81923366af829feb9c5b3926ca8dbdd95
SHA51243462d01d2c273bf95f85190a3411434d4d66ad87d0ce3f70943e9b8129a0b29b3e4e70c9464eb426fd26f9e857cb9257f280892bf103e371da3771f26bacd18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5441923ab9138987d1b3ccdb891018d2a
SHA122056c2da3f35ca69253e3f7a609764d62e86294
SHA256fa0d0b543887d71fea3e8131cc65d63d934f180f4ab5ec6c097f4e51bb8c4a5b
SHA512382705b5399670f5f4567fa44a08585708227c138bd4fa602619de06519837cca81797cd69d72e2748bf0463ffc130b066f099b8cf37f4f1da85a9bfd290bb2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595c8f15384906be92fcf71d7787c700b
SHA1404fdab0aa7b633e8d51968df1c272e6c8e6440f
SHA256f7d7c06c2fd4f9dc4c04f6873c0c63b32523ec62c3c6a906ac467840c0aed610
SHA51277a3a78ae6e73b6d7410824b9c36902aece8e19a596dbe2060cd192c5a46997578889fe6bb792521c6d6d112ba78aa07659da5e165e8eae5fcad170066091d16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5067e768da454e1365e229c706ea91745
SHA1eb049aebd087ff14fbd96c5efe7eb7896481194b
SHA256674c1d877e338121bc2f6587f3f611b161b2b5d5c0b1d5411ae428d37e3a495a
SHA5123507aeae6842aba7d3f3e65b434d6a32c330bb22d11f2c5fafd1bd6846c131e459faf0d9371ca80abe80b4fb0d5fde9c4b40863231a1df88536fb65e2db67b86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59947c9c14531ad6562d2e70e86e951b4
SHA16b4d9c55c2fa60baf815f0d860f4c44e9bd0dddd
SHA2566f6d6c8d88a9a79ce9cd5e1fbe9f958a61f81d6d337fd911bb3b72236e2a6ff0
SHA512e24e460b7b0c037b06cb7d5d90e2c433451e7fe28171413b7f37aac6b70a0df1c1c706e3b80f476222980b44cb9fb3b27852ff3dfad12f363fde19904c463d33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cbccb390971b803a113b76f753aefd7
SHA1ef779b789cda9b1081cfeb0a2745f394c38d2623
SHA256a6cb96f15d57930fda7c802fe403a3ab50ce476389137d3ff5629c268f92d9ff
SHA51293c2d2dc58c98eed9a2ffd5a405ecd75592fe251e8d05ea8fc362ab707b54be71fcf45bbcf098cf3803da4bcd9c963ddd200ac60e46442910865b7d93e6ad76a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b