Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 13:53
Static task
static1
Behavioral task
behavioral1
Sample
c0e24596a41d45d4e801143a4fde10b4_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c0e24596a41d45d4e801143a4fde10b4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c0e24596a41d45d4e801143a4fde10b4_JaffaCakes118.html
-
Size
67KB
-
MD5
c0e24596a41d45d4e801143a4fde10b4
-
SHA1
6d0202d607658730d66c2bbfc8a06238b9ead428
-
SHA256
b24717542d3e54c2273cb0f4c4f53176a7a0b60a54d855c4fe71b6074354de50
-
SHA512
8442d6f5bf8c100bc49502578188afbb688e8ecad297b730dfd9993d0c2ca36277e6df1a88047aea954e523564f3f1967367bd0d49130514166bff0077d377ea
-
SSDEEP
1536:7qVPhPJRt0/Uh2ZnH620VswkSiwRZoPeVmbhirkonBoYkikQBpzJoZQ5i:7gPhPjy620VswkXJbhiHBoxDQBpzNQ
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 94 sites.google.com 95 sites.google.com 20 sites.google.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430755908" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40d3a36af6f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000d459a2b4b3c0f158dd2e74d8274bb26d173fda005dff01e141fee274ebc688ca000000000e8000000002000020000000c6e92efc8ae39cbcc0fdd4b01c4c2451a516ce03b0608e4ca70f4f2987c42be290000000c319ba10cefead0d044901c8eb9ae356ece11a024139c2a030b99ff301cc5ff385368f64c6af8955bc46854deb9a76f0589f509aec9e15190f4937119aaa473dd44a07628756743c913555e906a3c238371299406962bcb3f776ec0b0d67ddb9bce39feafe9b5dabc58cb7ccf8d2e3480be0acc39a1d09fc16067cc680428223c040186fe26e7ee412e9d742769753bc400000008d2183c59fba364b56247a63ee70a3e0ca4a418b852df979708a1b267fc5f24392dac20811c8d7a9ff50bcafb05bf30032910ab23dbcf6a06ef6de638c29cb64 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{79413001-62E9-11EF-9A68-F6314D1D8E10} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000006eb0724a4e6a6fa99fc39759be0b335aa2c5cd47b659701430ebbfdd2dded939000000000e8000000002000020000000a51e6e540b711cd0d386ae33f8d688a749e01e715ee23c26b78dd82769b13f44200000000050cd5fde6922e3277beaab5a0c6eca388c0c0ab90726354a4c865653b4173b40000000a553f07102860210e3cb15bb0359f200338c781ebc05233644fae6373aadd6e809ef477e4f0ae3d6b7cb0770796f6daef5a80f40ee1b4ae8e87b7284ae825297 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2448 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2448 iexplore.exe 2448 iexplore.exe 1760 IEXPLORE.EXE 1760 IEXPLORE.EXE 1760 IEXPLORE.EXE 1760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2448 wrote to memory of 1760 2448 iexplore.exe 28 PID 2448 wrote to memory of 1760 2448 iexplore.exe 28 PID 2448 wrote to memory of 1760 2448 iexplore.exe 28 PID 2448 wrote to memory of 1760 2448 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c0e24596a41d45d4e801143a4fde10b4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2448 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5dc7471dc19e13287186f5915738d5b26
SHA1def6ad9878efb01bd4a9295bc818bfc2770fb430
SHA25642032d798b892d18c370872009f645e832da7f62d266cef28b2c315266f47452
SHA512020d6c7b06cfd6bb2074af5bf7fd9d046c03b4b603d6e5b02cad8ccece69721a05fbe7042de8c216ba24cd0ca93a00ba5024d2085dc747edfb331dd9d10dd261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3d6c3f813f48bec8eecde045b4980af
SHA1ba80a01a0f9ab1caa9cc63264434d27be673d2ca
SHA256f067c503c1b62e54f8f26dfe3cd6fe804af246b72e5ff82e93f92d91ed6694e5
SHA512715c2403118e17601ed00e96d92a43761bfa5d8ed90f674a23dffa2a634341a24f5aae04d5fde4d6142fef4c18272fd567a34a4ea8891893a8a2bfd44526f8fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559b63b61c421e918c4339a9decaf71b7
SHA17cc380da7df668cadeff1d81650d2f3d85eeca9e
SHA25690c3b76ea4982de60ec2439c2b4ba0e743dac6910e2b5176134372046be1fde2
SHA512f6b44f562b4b98fbcb57b1b5b7d335f0368e08984a56f63bc747a151fdff15f903d2c55902c2a8dc9ee30c7b2fc10c1c321cf7fe9b072b927504b764a2953621
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a6cdd905ba003278687c46230033164
SHA1da77fdf7e0132761857a967705da631bc836b68a
SHA2562a125413dc598435c95a506fa9d0400567a311f2dc389a5e6a1ff0a1c3e1be13
SHA512da8fd669075825ded0d3c6bc1d222d9fdbddb2f1f72b4b0ad5c8247a056a04aa596966515236392b2f9009cbb16d7c69e8e6f3327ee712d33cba7a30d3c04ccc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59facfb59860bd24ab71847f3558e884b
SHA16fa7c415a5ac6f802f17f0930a8d17179a8cb9dd
SHA256d98ee89a1749b5b3de600c8bc07f73e7ab54e9091d060a346f1e26dd1ab1a983
SHA512b911a1dadf86fdc9ca2b16bd12baa0ce6a908ba14214427f1abebacaeba21986f04d92399fe485c4b329231b4a1f1f9fd4f122a579b82d1bfb79f8051fc18906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dc6356a2e608d76651942097626ac48
SHA111adc2fee8b6fb84e4e0e0b83bc2f0b8a139b520
SHA256dc922f3365e1e7e2251b55ee30afb54013adce76e14752e64b59385dd00e296e
SHA51271629bbe9b99aca9f469222a902ca669fe559f277355ac749baae770cec11e57282ad6c7670d250d73c7e81548bd8fe682dad50e6019e6f5953b0b1f96a9bbdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a0aa9779ea8aed392a4c28dcdf81132
SHA118f743e8c002348de7e1f445e91073128fd78661
SHA2568a8d42a10bc6aa6a50f6157a01b78e08df0ee91edf99b7e7a0f4b51d2eca0ebc
SHA5126f4fca2fe495035cafb6fcbe4325a07f70c9eb293245d29229166f7efb7ddf56fd4bc30749788c0ae9bcd896e01477da3590f7aaa7430e427a919dee28c3bc45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e9c4141aeedd945253e9a0d8dd2b850
SHA1770f4ec5e7cddcfa24dd2bf394f0b7fc6bba84c4
SHA25673f768d069dea1c131630dbbafa1f38143f87942b6e6156402f315946b941b4f
SHA512013a03825447c1adeedc52d7107df53e338f1193274e91f6d382f18de011ab4966cd1f4d327926283e9db78003974c016b3fe4c1e5b8f2df88e190d2eca0c392
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529530081da85ac2474bb938a2bcc1baf
SHA15b70180cef325413f784625e51385b38b1a1bc91
SHA2569f204c86963eaec2c0fce39ab36981230acf387a21da0baa6958d861e29ef04e
SHA51291ed21c7bfd9ac732f242fc5216ced8f3147b2473686fea70150866554cd34d63d8f0b018a446e932eb186415da5de246ac66bb9207eb036c58e5d2325be952a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a92900e7a426f1d491d53976388a618e
SHA16eaf074af50ae70b213df540d05f281abc9bc5be
SHA256081fc0b2faf34657978aad81c2c328451b0058723bd1a4f41725c7bfaa61e8f2
SHA5120845f08e23e921898451153b612e55c0223d4472c28569245fbd535617ebdc7d1af0185ab2a4f161526dff1fdd8c9137ab6e9770778da573eb9f384e58af225c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550e7443cb117713bcec0dc96e0883022
SHA15663040de4d0e470abb54f4c07ad61e87279c082
SHA256febc5b76d016cb54d4bd40c15e20d38d99a613d1254289a21f28889584b0bdc5
SHA51227a149df5228cb853f3e59af88a6c7598baa5eb14e8832783e72d2d98fd4ea5b0528ff70d0df92e9f85958e2215f73258b07036131cb7abd39f31d10323845c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b0823697bdac0058376b9fc45393776
SHA13f7395db3cf5588624f61abc0dd679107193e348
SHA2568fb8a178ee0ba4c6da431e93860ff6f3237b9295eec40b74fa3ea1ffa9543285
SHA512e4fcda1ea2221ece624683e5538401dc0841643ffb7904f74fe72ab39ab5d5bdb67bf69967d0cba71a4123f9565b33522d2f31162c4b6b1467f605d3ad9677e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a099f191f50a08259d72798c8293ffc
SHA1df1db00aa42269f892a21ad59a3bc3b9ebd08198
SHA25698393ae0b385c301fd5f084f34153ec0e06b785da7965b5f2966b00181d062a3
SHA5122db3d3b1db655b334baf00a5e0d6b8cceb229b53647aeb7c01e793d6cee62856b5aeb81df7bafcc2422b33a6fdd42fc9a53f5512ac5afb721fb2a289d593c6ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d386ce2bd18e4a1f9838e4442be44857
SHA14b94600c638e6186487c2d9322c7031ae5ba58e2
SHA2568098a46dd0008b89f10861589fc5720cf92a170c39096762b8cebd1ec51cad19
SHA51226de218063c353690d14684c4f80081e26abad3c325206ae32fb32108c0ddbf218de6f412beab115f3f5dd517f4e9b5d381bdc5afb5ae11aef37457f86bd23b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD55991cd21e63a24c84167d51c4ae11f33
SHA10cef45260b6b0978e8b65149019301099898d812
SHA256b93d95b8d437411ae3776b8a9955b42e660a2aafe789ec997d3eacd7083530db
SHA512509c73f7d143686d7d4f37ae31c4948bdd4a01e99a26dd170ff995a660a9ed1860711de51b33ed3b9efa2cc25a90fa47a01328175bd1e36b4df12fe06dc538ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c3ba5c2fc0fb995ed79a8580b7e1d910
SHA1d41d7b10f58c38b660a3f2e677c7ffa10279e2c6
SHA25677346ccec7aa8168e2ac5ac5072370044d073289ad330b84e2878c0861008057
SHA512c0bfeed2f77e509023dc8bb4def9245349249f01ec586543e6b40bb88f50513d02d346c8da1b1231d04a48dfa8c66a268ff311255a68923039086233c1b72abc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b