Analysis
-
max time kernel
121s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 12:16
Static task
static1
Behavioral task
behavioral1
Sample
c0baaa8258a8f3a632e07a92373e8b84_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c0baaa8258a8f3a632e07a92373e8b84_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c0baaa8258a8f3a632e07a92373e8b84_JaffaCakes118.html
-
Size
4KB
-
MD5
c0baaa8258a8f3a632e07a92373e8b84
-
SHA1
70fa2527c8378f84cbc541cf31274b66f6af3c87
-
SHA256
5fe7ae8725597acaa3a188831501f69a31e623f8207b48612b94a4a2859b5ab7
-
SHA512
3b8bbb0cfafa84f09b5c9056a04ea78f54044f484b05b017415ebc6fc5d9e1c1ca07a79b9acad357f0f0e2a7e048cbbe9c2cb0efb61f162067b3e3d09f3dfcc7
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8opaBfd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000d1e89b025d4d8efb3b30e24b6a5534c490dfc67df87f0c77d83e307e21a6552e000000000e8000000002000020000000e27f1902a42e7e404e6a310bb12f8ef2c0b1818869e380a46106220efae1de81900000000dfb8d0494928c62ee716343721def8a3af285cfbad36e65c2e77f321819bae91d99d4af6be91515fa5940a82f0eea9619569b3b269675fe43f0afdbe7596ac5c70ac6d92e613a6e73fc6842dc9088fa6572ffa86a75e0d5369e9d0919f7d75e45342ef4d24781de0069f46c11d420942b18040225ebadf7a9fc7bd6d7c42d8c5033b0fb154f0ef20a8b2a7ad50b04304000000077c6569c8751693e0ba06d815faf4b254e6ecc705e1864fc17fb8366921c6c8a8e9535eeedf4732007d808f0c76ff1cc86403ad2ad1aaa31a3e6ea2c32300da5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E490FDD1-62DB-11EF-A1F7-DA486F9A72E4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d99090000000002000000000010660000000100002000000076a167429657d61320576177f89d90fe9cc4a69a69152247771bf4b1da81c535000000000e8000000002000020000000f9a156f1f70335b7f2f9f7a20b999d5908557f70c85853a298f8ce31627daef320000000f84fb2b61ecf2e8fa1b034074a98a5c471068914264dc67447c48a11cad0d56a40000000010eec5730ff38166e9bd3369fd2a1bf04473f590c70a9c2bfa669e8a5ff303efaf0f62cce5bb934444adb0158db59b259bb6d945a13717b266e5f6131ab1120 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430750089" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30ae1ab9e8f6da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2760 iexplore.exe 2760 iexplore.exe 1912 IEXPLORE.EXE 1912 IEXPLORE.EXE 1912 IEXPLORE.EXE 1912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2760 wrote to memory of 1912 2760 iexplore.exe 31 PID 2760 wrote to memory of 1912 2760 iexplore.exe 31 PID 2760 wrote to memory of 1912 2760 iexplore.exe 31 PID 2760 wrote to memory of 1912 2760 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c0baaa8258a8f3a632e07a92373e8b84_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2760 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1278395b4abaf5311b59ef39d4ed1b1
SHA1309a4301a61a27d7c3989cb748cc2c28997bb6a8
SHA256b07c931da3f66c974b69cf8b3bac611bef4698b596577a164475792042f2f584
SHA512dcc1b43872fd2892ee3f140b5036878cc90cb6f3ac8afc692d5e7b179c33fd70c5843419e1c431a032260b2ce3ba3cf2ce15256d86aa624404e6fbab11925d74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be7ca2e6c3826ef03f6b477210ce78ed
SHA1fbdcc788ee75a4a8e072a8745769ce315c149fe9
SHA25675d72f6bea3eac06d2f720f6f0005be4a1ae351b96837908c105d6cc59c439ba
SHA512debf2234ed3428c7d8a2df45c8a79c542b30e1b15cb7dcc7217abb05bf2a566e020817f248205983113c84ff19c1441dc2ba28cf239895f229085993715c2b6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d1ded21d7bc4717602ac6f4e8ebb9a5
SHA1a2610e9191993d0a71665d308980247ec44dcda7
SHA25678bb22337232dcd54f5f15fd6548eaa24f07bcc6f7eab46357b9d74ef68afdbd
SHA5126ac94d18c57b8727909d225c3fbae3961bad8c1ef5f816ab0db419499d7b582bd932e37d85bb612825cc12e4a61a55b5e47a7b002c6dffb92d2f3fd28a3d26cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b07739e7d47af61bc6a205fc811661bc
SHA1797cf68bd0530fb0d30bd5df5d9f8a7abfcca4ea
SHA256f2d431ce9f34d5706869b5d0ffce7457ee1bf55ac55bfc22530a9526e5b422e3
SHA51201554236135af9ed8d18fea1cf48705c7d522ca811c9e3030e280404bb5afffed41ed5cde110da22814d83e1cd6f4e79c29a36c0c7e2e3ce3a5a2c848106087a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534086ab47e1b864778e1a88ae92b63e3
SHA113658e10cdda3a0a12fba49682c4fa954f2bb7a5
SHA256738b4aaa000c19d49a93e8d268996ce56363ed7de71de938abdc4bcf5ed2c1f4
SHA5129893e44b020f5ed681190d8e7ff870a146d5569d241ee1be1d8c1641a47f63e9de4cdb62652ea763be7c66bc30d6a2b8ee683611ece63c0297089fdbf3da490e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530e6dd723fd8b4bb1210d812c0943f61
SHA15ce0b1c0883fd0922a8c2cae810b10b2533b18ef
SHA256c926d008819d65ddb74bca780a4a679986be255ce5a3526491fa2032ee5af760
SHA512dbb260d81af658901dc4026e6584796081354b0fa6e1cb79554a839dac7ef734e02de4a4caef7546ed7bbb128a108452969527f18ce2d1de3256ec4e814f9a89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5099a7f4c2a3a9199147602cca87df65c
SHA12554c17a0b59219725e1c29ef54d507e34909b52
SHA256c348b44b811f29da715fdf0a0ac7527c39db32a9a711292d78c84ef5c203887d
SHA51273bc76c722157ad5dd37fb724ed39c25f9fef6a5d4d7fea9fad4b08c4bc47621e596bbbb81736e614e515681e14a7424ce37bc731dd4cb4bd0b7b16dd07ab463
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55979810c5036883555735cb892caaced
SHA187848a3c04d03fc26a7628711d6797aef673ec88
SHA25652cf980a90f6a60dac7319553d2f381cdadc50d02926e845f269214ffc59a316
SHA5127386b5db4dd08b5da3578c4074b8b470835ec74d0173349adf84ef888faab81d83ebcd6c8b5f63124aa88fd75e5455df03c6fa24948ad464662abfcb8ef2852b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51acc7df75650f77fba0579ddfc690ac7
SHA1b9f47f16b0d83852227197fee294c3e312c48f87
SHA256545f265c7caa2a622237df7c4f38acb0993af90445e514bc7f9efbdd21fe22f6
SHA512f75dbe40ffd247cc7bc15f0e528493921f3ec051feeb5e9f75bb973b929243a62aa1778e40f3aa8ce89d8260b394f7d406706cd5b66105f97bad227b7f59c982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55edf112c0586a662f7756f42ae37f2d6
SHA16e84cf12d1efaa3fdf6fd4cca18d86397de991d3
SHA256d93c9fd967769fb0824179f9c0db0356da762ac844d62fa061deee7136158495
SHA51215647d4ddb80e351f6e64d09c0975f327e2c57f93500e485864e23acd169d06726d0122343b397f43dc7e35236136945e4e4ad2455b66637c7d8c955f1f2f0d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fe5b02ae7fe60df46d8be41778648b5
SHA14aae2f9bed7e6be956bf3c1765bbffe7a3f58947
SHA256132a4f1521df2cc11a10c3518c8a92be6e10df608b2c2c793a18f87aa1b5b1b6
SHA512f8e15255b785dc83ce7b9ac3251dc3ad23f6a09c6034c936e7795053e631e9323d8a8ad7fa41c4110b60171209808eeeb5f5897e251a08899ec3a8f8eb735306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b303ef51225dddfba68f8435b8d98291
SHA1d970d4d666937aa45f68d05b21bf878dfc040f99
SHA25607062b289c5efbffd0d9d8514c2769cd65feeb639a4206ee70488028a41488be
SHA512105d97bc846d92484302795de8628f988ca58ddd2412cfd2a57f72a8f0ecf1a9fce05bf38608e6d751bafd54d7186717dd026e4a7bef81cfb830b5b1bae4edcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a268d6e97032847d9a18edf22b52d8b
SHA16e03a0d3bf5b7a0349842e10d4592604ac910aff
SHA256bf200a7a5e9202420a08b395fca0127412cf6f5a44139d7b81cc0f3e978ab41a
SHA512da92dac4af8cf1a6322a64dfb660e5797c31847cbb9879dca137a66a187edbf7ce508b40edd167f491e98e485c394ee191418ade264c880a9d02ae96a3b1222d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5152236e74242ea7c7402b49f9158f195
SHA18251444980051ff1c21a1ef286cbc2b65583bd8d
SHA25610d0f6c3227dd1c2baddbb211be8caa3d84658fa318ea4b5f293ffbd6f5f8ce9
SHA512d7dd62cf126b6bc792ef59cb1c0f00eff1a15462a3f6c49bf664b711edab51c9b986747cb3e2fb47c8a6635871ce3d5d4505c34293c8aeb68465ab72515e14c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546f002d43416c22613fbb489a88be3ba
SHA1a7deaeb84e84419f6a4886c438f646ab57377a30
SHA25643f5024c36454b799d183d2f2996864069ead3349916032ada860a16c992e377
SHA5122013865a212eaaf6293e083bf967616bb892e7a099a7db84316c255f5828b8693caf42802a0fbc16fc2a1179c7d544b3eb0377e67eaad5bfb7985bdcc848cb0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a74fbe9879251e0f87e0acb9ebb1415d
SHA1791fe527d89d65e0c52485800290f96bcfe6bec8
SHA256e10c95fe7512b66efd5cf841c0d4e518cb8c52ab5d6401a9991d6811458e2b88
SHA51240636bf3e38699e6d7ac8be8a4cb253542aa3d9a055d4bbcb77fc28ecf5a89e07eb3a26050763424b958204aa882cb10e46f9f38b6612ecaa3908741c75798eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5809fb08513beac137e05a6e6c80655fe
SHA11bbc7abde12625a91a7a33d41e28b060de9df7eb
SHA25640d85b62da24dca67d2819f8378e75cdb3f5e92bcaae8b4d92ce7a1050077516
SHA51265d261e320328c3855040b5889d44b162fcf1887145d83738ea17dee256ea31cad14ed8523687e2872d0db22719f975a10f10fab6d60b45b45c3558658427993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5238299502f05f4552c0c7446f50b50b2
SHA19ae19e2b69dff5b9a69a6daf052ab9f087ad9d57
SHA2562e2942599534c3e81b9a5067055cd615471de9f5124d02f0fcede71688ec6e8e
SHA5127b1a42c19c57a4776ba8422372f2fcbfe693a0c79f09d6cd33587954dd11b5017f0b4407871dea698b4f44c611a6e5b83e5faf36d23e2859cfeecc9087b8ce58
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b