Analysis
-
max time kernel
73s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 14:01
Static task
static1
Behavioral task
behavioral1
Sample
c0e5d4a99535dc3ad42bbd11e60d1627_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c0e5d4a99535dc3ad42bbd11e60d1627_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c0e5d4a99535dc3ad42bbd11e60d1627_JaffaCakes118.html
-
Size
3KB
-
MD5
c0e5d4a99535dc3ad42bbd11e60d1627
-
SHA1
5df57f04e8e5d8371a7a649867f9422aa31ff85b
-
SHA256
17e776b829164d3bfd29a6dd20f21795ddbaddb641243b4e8364aa76386ae4e3
-
SHA512
6f0d3de29266811c008a7a56b79f17f08ca474219d43ef1f3fabc1e0e350be09f5396457a578e9a8690eb6418397b81c93d171899570f910373c7d8407895d3c
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8F1A5E51-62EA-11EF-B137-6E739D7B0BBB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30386364f7f6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430756377" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000002ac1a6f0b75effaba9419c66305ec1c6a2d589f3ce0744aee258393603d3f745000000000e8000000002000020000000c2029d801f568b2fdee9312b45d2fddce2ba6a7b3c0d5018a8f699fe2851c69e2000000094e1fa298b28933e3f9f4807baa3aefd46718fe105f0b9e16edd24e758d56b9c400000008ff5d942d936070cf2d76d6b27ed4f05cd7c72cbda96c7d04b5bdaf52ffb41392e7af97d89a0217ce9a1041e87147169fa5d61ab73017354217ef7d51d8fdcf5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2488 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2488 iexplore.exe 2488 iexplore.exe 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2300 2488 iexplore.exe 28 PID 2488 wrote to memory of 2300 2488 iexplore.exe 28 PID 2488 wrote to memory of 2300 2488 iexplore.exe 28 PID 2488 wrote to memory of 2300 2488 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c0e5d4a99535dc3ad42bbd11e60d1627_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515d93004ac2d3a8b0fe66c062439e8c5
SHA12557ddc2d5975143096ccc0be628cad5f124a4f4
SHA256c58ffc4c7c137646d76effe500af8474ab42f71a387260171bc46e7d66051a2a
SHA51281344f5fb2d49936ebb9b188d5a42b92257b31c24ce0402b6c46d8e03a92f1757d62518627ac2e0b992cdb5adb417dc18f315754339b94a1f56b0dc247d45d68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55837a31c90c12635afb0d16af8056deb
SHA187119539b864cb028c3446f977d430a45c473e11
SHA2563944ed20808638b90c235d33a02e2566cee3ed28387fc54c1bafc5d806e2b3cb
SHA5129580bbb3f6018e9f68399f4f4085c089cbbdecc8c456d6abd85aec740b4ea0d7d9162693d6bd0153d46e12877770fb9e2f7df9121c1d713ff634927907afcbc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3a2e7b5513e54d9c9a963564c47e02e
SHA1b6a5e5d5818937f5e5c11b2090a01110e948e17f
SHA2561c3905f78941e8dbf66186f4a9e691977b4a3c1d26f782659d74c14681ee2d20
SHA512dc5bb105b4b993e635fbe4dc7c0b4abe43d46fd37dc8655cd355bd35d17f76d65991eccc1d5f3363a7b8a495f2c29bde31607e45a2472508bb6225a4c9d56ea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5220f2f1ceb7fc78f90ea43a470800c3d
SHA142989887b261b151f2c5ae52ace00566d5bcbe9a
SHA25611a1fbff6c095cbb22f24f1eb1d56984825bd8fab71a0bff70614973dad8caba
SHA5126e17a756ebae33a572f2987bffe5a9f13c6a85e405fc6fcdd34ff9eab8e27d2d5e0e8b7a3907b7e5eb07afb4dc85e45a58d77ca728936b55b8de674c0b835ca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542a5757abf026eb5be16d31e44317320
SHA1df29204d8e2e1f0107db6bbd9cd32a925a0e99fb
SHA2563c83480c2cb73f46ab4044c342b7201238567790d7ed16c1f7fde1b8d1eb9923
SHA512c69689131a6ae78323ed94d8c93d2b2c405e9d44d75e5030edce25822eced959b959eac9347b25eeba2fa18ccd0649aaf6a09748f5a8c335882dbec8f75740be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5148dfe2b69b3091336eb17eb5bf9e868
SHA17683165ecd3fee1395c4101ed7a43c8eb0083a58
SHA2564595889103b8efc9175109ee681fd5e52958066a162105d9ddfaee509bce74a5
SHA512885d91ff9c8ae765efcf62e5416a9a2be09f5ae32cfbb508e4ef5f233e145dceae7e8ac11d61d102e8a225eaf1e419f2d971c7d06d8302858f9f1638d88b4b61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526c70cd46cbe2b8d0f11392b8b8fa416
SHA17b2b066aa227114d32d727a5e4b50e4c2b742506
SHA256b74315a5c233a8756c1452c71025e824f8e24cb69e255e3c0d0854b5ac2b622c
SHA512a0b2ba694e280300a169736c41f03598d5e0400e4df8245f1aa0289ebaaa7b5288f902ca21aec1fff024f60c57437960f26e5e988092f8c47d412fdd3f77cb97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512ae5084f33f2fec865569bf8cec5d74
SHA1d839a970975aaeda130b852cdf60ceb8acf6869c
SHA2564e0bab3246948f37204fce67917b98b2a17d6eed751fb8e11f200b5a49215912
SHA51268b60160ae3084193f83742fb0ba32956ac87102d5f3808d961fe7e26e72a7afbf65e7d385872667c722e14a58e5bd83e0c3b4807b05cd848e68adadff94788a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fa31e00897be93d6cd03218614349af
SHA10af1fc31ac87efc2de87ec79c63e10cb57429d9f
SHA25663e1d87c625f0576f223237f391f3b878b51ab4d9b414730c93d14e188d5055d
SHA5124fe0244ad811b5f824f868fa68a9d79dae400e1d910763f4f050a0125c4d87a89b11293e83dd43c11b4e409e4e82e41370fc31a6c1d83de3bdccdefd554b1294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9fcb5b8cddc1d0f1cc9324346dffaf1
SHA1ed9913ebf6b326128b19cb628a03760ec980afb4
SHA25638b146f95aed1a4bcf287f51cad2f9fa448d523da195e30b12103f9c013305d4
SHA512aea484a6230997d22eb218087e8f1ea5d3a385f5647ca057a9d413577929f0ac538f0a04cb1316b6a9a0e15afe1087c868290ec9fa9550d539f4574302bfb327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ddc46267036142fba52f6cefcd4c133
SHA1c167b670cf97fb9a8207208b3baef763c812c9ee
SHA256b22f7c4b9bea4948658489c482f3de1b1f03c37bcbf7965425366ee4346914d1
SHA512fdf890074ffda59332d01c71759bd2f14e8b4765b08fe0d80e7fd2ba45ede2088a168c2fb576e4816ec85d94db40315d792462dcc2ba5617c6d740e86afb7c95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3441b919d41834569f53c6672776989
SHA1e8cec6b914745f2ca0e06d7795460a8c89d2bff0
SHA256bc4eaa8dad38ddd8643b49e15ce8d2e9a73c2ad178fa342bd8308f948a3654a5
SHA51271172429fae5f685a09b924173951b329085a8d2ecec69ca596939afd95ff6c9ca5ad6985bd544dd6418db9bc3db2d5c2f2aa1dc47626f4331e89a9fea3b1906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533818aad6c1500e62070d697472f112b
SHA16bf3378da18526df492439984c41598e7729a96a
SHA25653a618ac8e43ab532e41fee24b5eb8dc5a45b7904dc78cc5fba45e59634ec1a0
SHA512b1e91ecf09b9e2226aed0b1d3c64a21a7863464f6774d21c7d0088d154974f7268634ecd65d684f1f484aca0c79eaa43cf42409c09afef3ef40682a55faa8e25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b75b511f5597dd4ca2e954a92b08337d
SHA14734b925faa7a5358cf8af417c4832527e3baa54
SHA25633c007942cd6fddde54a6fa9749965f1eec25d2bf046b065cfdbe0b8826ef09c
SHA512ec6de4ee0eb726692c87e1eb53ef9e6be745cee748341a75d5bfb3ef93f7f1a6cc88f55a07551970c2e2b4c67dc5e552db30670fa0b9f4a3c5c06c33f1eae4c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5538744ee47860ccfc44945b2b29fb06e
SHA125b9b73d4cf4b6862954828100e52b1b23c3847a
SHA256747a0e4278a023c448785e85d1b3fc128f5664e9a25daa6a31dcc181cfc8a8ae
SHA51255c3730f4890e71454bb6d10d7bff295007ac8d458353c4d13bd5ca5483dddc8fb6606321caedefbdde3207f8c91fe6dc396d13d4db9374eac157c983496dac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5313d91e444cabd8526d449fe576f5922
SHA1f91307205b65a8824819720aedbcb171a03a49bd
SHA256eee880b70ea8e79e04d4a56f395d2abcb590156cc68498c561a561c93b57bd20
SHA512248f84f1c78e126b6c4ba73bec7686312c756444d64da658ed93b70fcff193b4c038336b11d30d827ec0c00ab14d9399d09bcb7b8159ff2695e3388fbe3c80a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f15a5c74e612137825849b5bff1a62ca
SHA188a2e4103e985909adb27bb7b0ec42c1bda13023
SHA2563fb6ea950333770fc38a50676bbbfc516c374cbcaec7c1255a730d7784cbd4df
SHA512796fccc283db5ee7df376af3c7dccdcf155e9216046afe9f182b22f7bd40afc910ca36055a4c5fe2257b4f5d6672eea97b543af82c117c87a043504ab35893cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500e70f25eb2568077da4c527d75d1e4b
SHA1033b962efcf3c9b04e1b46dbdcef1128e97107a9
SHA25625075b827339ecf5dcc958bb1e1066df19c775462404f8194f335b0d110b2a09
SHA51209d32fcaca4c31a97bdb75c0e15bdb73693f96ca2828c270a13e08d2de733b221d8a574dfc9a8379c25a85f5d170d2862101af0b8e3ab1a6e23a9df319b56d39
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b