Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 11:36
Static task
static1
Behavioral task
behavioral1
Sample
c0a91ba13b1a497fd686d75a9b942ab0_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c0a91ba13b1a497fd686d75a9b942ab0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c0a91ba13b1a497fd686d75a9b942ab0_JaffaCakes118.html
-
Size
28KB
-
MD5
c0a91ba13b1a497fd686d75a9b942ab0
-
SHA1
0674ba18c4206b947a43a923824d65bfd9097c12
-
SHA256
fff2e739fa12c10bc04e33200fdefe2bfbe12438afc4d227d07ed083312900b8
-
SHA512
8f8c9f52d331c619df7f3219f67b84166e17207744538006d508b838f2facccfae518474a680bc470ed94c0458d58e2b35efac91657a47c03bccd9b52aba7f16
-
SSDEEP
384:Q+jzFis2w2BG9HdxI1y1MFfYBY3Y4n2DYXw2yYXUbym7Yi6/DYpEd25:QSzFis2w2BG99sFn5IymH6qo25
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3CB3C341-62D6-11EF-9A20-C2007F0630F3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf710000000002000000000010660000000100002000000002bb3c2ff0f0307bdbce9debc9111ac2c1682ea6a4edf43598e8c0d044d19d25000000000e80000000020000200000008a19263919997cb6d589c794bdff4822d6e8ab4f8b1860388457096ac60e8d892000000021ee6d1da052980ac3dba2296962a1d7ed17df69629a25cb97a34857643f068940000000dcd50f71d79aa11c3686a5d5a2865627b6dc5a53e5e4b2fe04e416147c0bff34ca559f7c384b57502b092997f16c126d06c5bbdaee3dc5a26adac958842f0250 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30ee5f2ae3f6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430747643" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2640 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 712 iexplore.exe 712 iexplore.exe 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE 2640 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 712 wrote to memory of 2640 712 iexplore.exe 30 PID 712 wrote to memory of 2640 712 iexplore.exe 30 PID 712 wrote to memory of 2640 712 iexplore.exe 30 PID 712 wrote to memory of 2640 712 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c0a91ba13b1a497fd686d75a9b942ab0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:712 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5302ab86c840a26fe1205a5d23a279eb8
SHA1f354a6eed2030c4873d703f7c29c27557b8cde9a
SHA256278313a5a7fb8ec7c9a217f8928bcc05e79b03fe2fe327c273f964e5c1545794
SHA512d0b7aa3c5ba318ba1439c62c187b9d912a00965b6d8a246d3fd9627a6925abb239130ee67b03ca5734ba1c596b2928fb273a46500345cf24805515f0750755fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58918e8b291f923f375116c37a9af1014
SHA172f543174eaa995d34bb7afc351c2d8e0c55a3a1
SHA25691f806e526af34db46a4cd7f63eab471cf9371fa050ed1a4d6731a2adac3d90d
SHA5123ed351cc7893d19e85f1dacdbb3eb6c130c19b5bb00041cfb20f24694723e5dc9e17a9aa720764f1593979f1796e603135f8a4b8b7c8effc20c92d75eda51c55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52da44cdbcc0fb235c287364421f4ab72
SHA147e3267ab07a9e2ab99586e51f00f806a454c67a
SHA25690dfccd91257e1b2d423ddfc4fb41279a28e2541e5816d4e300676be924d5102
SHA512ac6d3d6bf4852225192693acef0a0d739d6a070967ce25037c3cfff08b97e989e55df0387f4a9d128257a134edd5b9ec4da77b427176fcffea4892444464fca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f7c352d115a2071e983cb14208e389f
SHA1b3c259c699c6f7b35123ea70279f14690e260b93
SHA2567ee9e56225db4612cdb0da43646278300e7e64d0488a8f5d64fb3ae5e88437d6
SHA5121222487d6653256cf8642b71a35bf543ff72e14bac9999a67c698aca2bd3a93fc24d118a2668c79dd3908baf2cfe856ba074a871e9f694fb54e769d05734def2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582ca5701973b7320ddb3a0abfa73c8e9
SHA127713a94cf9c2898f4461b62e27b9331d6ea00d6
SHA256c0c005169041b0d26bdb405b697dbf7d386bdafd9ea3a9f8fcc24994746209d5
SHA5129e2c30f685d01b35100ce1f843ee558cb5c6dd1171cabf15e17ab0c28233ce1101f43f6f37afe3b27c9a5f6de4f1a9454c20e921b809ff94e42b966edbfb0033
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a8f715326a2534774993d7279aa0288
SHA1a40f96d6f30221829377b664097906a2f28c2e9e
SHA2566fb2e5d6fea68ebf60ac45b691ba71fe188b0ca02ab628d9e04b82401a305383
SHA5120fce065bb4c069a616c65eea9e90cdc3f7c9e41ba2fab08cb4a9647247337507cb79513ca8750a46e40b1da390c91b40a9726b19db6b615220c3be88ddf5ca79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c204ac871680d3dd196524593835a19
SHA138a24878192b0f92a4662bb104b0339074b21690
SHA256641af4a4d167c3df0a3e46af66f294e45d3b7a25b07b47cf90c29ca6cf481af7
SHA5124a7432bd447ff74077abb66a3be467cb27a8f1ba8fe715f006ffe5bbe45a094f051bce84a10d967234aac23880de9649762c85c366615ad42c37456fcc5a8e96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ad144cb097374096ccf7857a8c29c91
SHA169439f501684017f8b7aa8ee7c50725d12322eb4
SHA256733da9c7bc397dd38958ca8f40a81fc242a3fc715d767ed9ec1773d0aecbfb48
SHA5128eb46fa9e1397f6d7d0dc903c38b0a3b60fc64af22e96f45cba5075ae64a0090a91288ffd0dfbf0202c40eb5d6840b2656ce30b219b912a4c2a3f9b7525d8e73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a98eb5c88f166633a96477df41125aed
SHA196e132045bc91bd0681d6e8ab0da05a256e8e689
SHA2567cda5b05202e68c4bf92b3780a1526eb6fafa6b606216e131f293bf985b9c189
SHA512124eb371ef939a8666375058e5cfa0e3aa2f609296196e2e5e6ce7924ccd3829a5e7136d12939ef050ac0a6b60d7cf9474c51ed38e403b132c109e7187996c5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512d5a2c31b3f34046f1406f0ae3b2992
SHA1396e00804f40eb3157cdc8a5ececeb9ae0ee9f6a
SHA2568faca86ccf85b72d657b43b6af24bbd6c57dcf76332482eafcfc150e15b4aa29
SHA51270a36d7e335b04af985c9f6bd9906c45bb827050bff1170730a66b7141270fa9f9da4625512c037ffe7936b2d5185a815999fd7c3e82d24d9b86e08983b28eda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5974ffd1dcf355268dc4268c5c34dccdb
SHA1a47f038b7b0d9e98382d113405f1b4ed3d44a0b1
SHA256dc501109c8010261a45b27d00d846f5d93ee3b6f89a29bfb70dee4c2185df483
SHA512a1c756ceb4e610de79b6a006fcc0d1d2c6de9236de321a0f27fe3c3df7e551d32aaeaa8e884cf371ea707cb4abecce2ae3e365c027623346d2299c80a8c3e937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550ac18c5530d27b4c06c753f7be4f17c
SHA1f67e8a84e83894b0854f652aec4585a58239a71a
SHA256205e8f576a3820b4ff5a4d247b8c7dc073a5593c6e08f2da5a628b29612a2783
SHA512869638d9c07225339a1c4785754f7dc67b82f482f4b917721b8d31b09ddb33a7e460d74abda8d8c110822d5b40b3606c4719c5dc76202e8a096757f89b647a0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5317097e45d30d772947f5cb5c06720a6
SHA18614c8416b8e496c3bb5624cd8f8a01a2c98ad79
SHA256523f3a457e0bc4b50c0b7359810a5d3b307fae8ab13048a6fb867a4a078300b8
SHA512ff2c65107019f151dd1b7d5f1d198ff0e4fb1bb19e275ebdebb005147915c6a3c202dfe6b03bd00cbdf2e012ea837fb42765b73ac30d44ead1b142514b80728b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573fa73b2100eeb030cc8132f7027cf44
SHA16ed0921b13a832042c140cc8b01bc33a28f8a89a
SHA25646c6c9b09965d01a8c42afc159488967485c0a19c0b8a133310dda1473dee10b
SHA512b29e77d945711888329c1ba4f2a45daad1a409f073919547ef3b451daeb724549f2f333ac3d4b71e6510bcf9ea007752d961244d358e74061a76ecde7a2dbf53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a8756567f255495d5953adf34d4d50c
SHA195ccc04fb3bd4e299dd76653c62264225fa58616
SHA25603af249a3ffff845ccac8c92a80be796cbd8b0da73515005b8d93ee6be97686d
SHA512d676990c83fa0dbafa1f9ebb0dd136e0d7c035da159f7cef38f179fd46319a336fa1d9379b71e02635e44dcbab471f7d461d4f7f672e9d3148426a9081a001a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c40daf2c4004559abffad9522771a11
SHA158b446a27bc141b0b088a70fb39c8f6b71bab7c5
SHA256699ffa6ded197cdc00b8bba3ee50ce7f6da237dc3d61374e87469c62488b2b3a
SHA5125787e61bd39adb47614bcf3b6d607f7dc26250d415cb3c9252bf83990f6a091a836363b1015327e5fece19b13cf483205949d7c2900452b2636122ff6755bdc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d80094de7ae4a42168948c1264606896
SHA160ea1d25cc178c4e11fa785b95dbcbcc91e15144
SHA256471d49ae4788a5eca95fb864d43a529fb86614ad2d472f67bbf23bd1ac46b49e
SHA51266803f964ea4be4aa5273c982851e5d61fb7165e9e6d0853745d9e66f5ab247519c3c95eefabd561b543bfdb89cae1fce7b0ec17bc18b9d0d94ddb1d247cc54a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b