Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 14:08
Static task
static1
Behavioral task
behavioral1
Sample
c0e850329ab69ddfc6c9c3eff209b3df_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c0e850329ab69ddfc6c9c3eff209b3df_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c0e850329ab69ddfc6c9c3eff209b3df_JaffaCakes118.html
-
Size
60KB
-
MD5
c0e850329ab69ddfc6c9c3eff209b3df
-
SHA1
ce71497e9714de3dee1e1ac3991ddb2ca21bba0e
-
SHA256
3077183c59e028ec34294553dbd229ffb9a38dfdabe40e3832012b5505410733
-
SHA512
956316f26e4eebdd2978446c7ff4cfa8c994c363b6c70a0b432c1ae878016ebdd385ec43035b9492c0d997149daf0dd246d463bb12297aa70ab47a8a7e69c5a0
-
SSDEEP
768:25VvvDDtmS9ys7isP1Yrf3D0zv5ee/i1zv5eazv5elePfM2PPwFvj6dBTKxD:2zvbDoGiUCreeeeekelePHPPwFm6D
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000de800be69acf8e48db4d651a3713687a673a3ede70cea8126c7c813780120b50000000000e8000000002000020000000f419743a01e2044ebf4558e6d9cb06be463e047813e0af2b1159c8e4c42d9611200000006468452126ce0ec6b566d18853cb7e09e2d208b75a84cbc2e07643887aa7d341400000002b783d73ccb5c4f5affa06e78520f6b9629607eb9923cd0f7c042656cc3aef62285235efa1fe65458c3bf4845d3623cbe83df6652d107a935c7cb9298444d582 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{852D2E31-62EB-11EF-A0AD-C26A93CEF43F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0884b6df8f6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430756784" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2772 3000 iexplore.exe 30 PID 3000 wrote to memory of 2772 3000 iexplore.exe 30 PID 3000 wrote to memory of 2772 3000 iexplore.exe 30 PID 3000 wrote to memory of 2772 3000 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c0e850329ab69ddfc6c9c3eff209b3df_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54fdd07e4d42264391e0c3742ead1c6ae
SHA18094640eb5a7a1ca119c1fddd59f810263a7fbd1
SHA2562cabeafe37d06ca22aba7391c0033d25982952c453647349763a3ab5ad6ccf69
SHA512626261dcc0001d3bf73f9bd041067c78cbd19337c9dfcb2fb0854f24015efa662a7441dc5389de7c1ca4f464b44bf99b6df710661a9a8902ad907ee231dba74a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2e351d6b5e559d122e7ff190550b9bb
SHA1e2dea90d5dd2724f8251d9cc4f082c7baafd6185
SHA2569daa5309d107163ac7f9dbb2d6db14e97a45451f2cb3ea9dfdc4984d5de29044
SHA512ff7ffe4141f345e9bf196aac96923b7f498f64d25f532b3637a4f877c1256be15bad9b0549a22ffbda15fb5413c621d01b9d461670cc851c550a5cf3a47cea94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53809316df110fa0ca55e504495b2b1b9
SHA111a01b76b2fdea2c53129f7d225ab13ef837f25f
SHA256c2310f963ef41b5211fa70fd57bb19c653bd195ae53e3188d1379739e6cfc996
SHA51271e60e2b3b8240169c61684a955e48393562f3c78d26f006cde887d85c1c1e0a9aa9087f9ba86d25632ecc6e5ef7a99b0c6fa022e8da0163dd94b2dc2419897a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f7fde270704f3da3edad6ca8e221d42
SHA150a6103286dc1ba8c7d511c265591b79b9e9601d
SHA2568285ede7421f818ab5924dc1559c05bf008bf76a8dbe93f95e9c51b7cfa82ef9
SHA512e3f68ca510185c7ec0075ef10fbed2ad425e8ec92086d788eaab16fa08a8e102c562023d035a1e00b4ceebb5d6111663c7b4629501546177a2ca51534ccd8be6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5429b06639d3f34c2269c59808f163866
SHA197a6bf614e0ee4299cd686bceb7ae256c7adbce1
SHA256d1d81fc8524e3d07a1faba99db9d6fa31681bfcdd171867f0fa3d2da526973f1
SHA512f2332220d9b1a9df2c4cbcb80744443bbee62f41a60e03fead4136d015ec76891e547980210c3fa43f2505c627903b27d4c8f754a5816e82ec7e703127fa2336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e418d43284233109e28577f94c9006d
SHA15920107c648c0c4d9681eec9647491a0f7172c3a
SHA2567826666dd6041e75e047c355a32cf8aaa66ad861d4d5bb74c469d54b5c96f6a7
SHA5128f2726e4d0f2a8201bfb61a586a75277aafd12c684862735c8ea2327716caed98f60a35e5ca16db9e9c3c98bd3ea57794db917e25d8e9df0002ace86775dd5e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cde4bb1c4150a1092fe45b0ac6e9da88
SHA1a97776506f6a51e9f5021dbef7a7c863d36eb084
SHA256b10dfa2ceb32d9dff9e6ede75e2eefca30d0c667d2710930495ee80b9ebd78a4
SHA512de56bf63cddb23fc9a93bcc5861b9d1e76e1be9ce8df44856ac92d3bcf34f54bb53b316fec39f5ea4443502bf31228f16423bfba03603d5fb363c94c9c849e0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa880dc997171d36d1849d9d72ad6f84
SHA14e22ecc1989567c039e5f04fef327f530b826918
SHA2563308c2325b5f6830ebea19de499cd5efda600b21313018935bca452d7a3e0270
SHA51260600c1d41d68732816bb8b3d019f362e2bea6a8620db3298de2bd4fb7e1b1df7783c15e9289a20c8e4dbb9dec18394a01830f3000105650abbc12b7c6e81ef3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573d963129fe165f0844db5b43d6a1121
SHA13c336138a9996d19f4dbafd118c0ac21c0f6510b
SHA2561988aa63760afda01e60a2c05ebbd0e0ccd0f11c7fcb0fc6d66247c99caafecb
SHA512872e2dc2251a4810bb856cd5cdf6655ec6da036b7c7166c8df8e15bb267ca94b2b4d162f3f7095aa071b0c9a67603777e3daf6bf86acbb389c57131a64354855
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dbe33171ba06bd7b3dd1223610e930e
SHA118e42b1414a228287beef4e537d746b4d39af73b
SHA25633b29b8bc62d86329ac315e69d8ad47ee9306736710485f1bd51f19c0cff7977
SHA512f5bf694c2baa1d3935461716bad76a7f1de295a9e7798ddec83e398c4bfd8627c52f9b6a60fabe59a5247da729158294c837e24e97ce9edbee625dcc6d651f90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b28e89c7dc1eab5b256a2eab5a9f7be
SHA1568d21db0551207f511032f1fc2cda1b9deeed28
SHA256822145705ca8e2e3de4c561e43f82b16c99fefe742b94a73ab09543690ef424e
SHA51226e0b3f6dcbee1be9ffbc4617a3a549909cdd599c5f9b1576152e15992fb3c6d60db15ee31840d41e03ffbbd85dda7831cee788d9eeddd4249dceaf1e3e58d70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5437e7b7b88bd83e839f677b90d8096e0
SHA1bea7b955ff13aa14e19a90e7c5481f17ee72c453
SHA256a92087a0b21ea5890967392dd1e2ca1e83f4b639981fdb473fdd04cd5de1973f
SHA51296c79397771379cff55349e1cab84ca02757363db3c5714f1742c22d3dd3ffa704636de8bef18abbd0a4e0341f215ed3785d767ef9162a626ae7dc9a702070d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b86cc5e4d59f5fbb0fa4825c6e76332b
SHA1999192cba66e65b9472ebad2fdfb5a1e4672d2a4
SHA256bc0d1374d32af85be33ebb37ff06e5e043a0569f82b8b66983137967108f6fc6
SHA512002031f6adf5aed2d40a89ff2bc50269195f447a0d1f9a4101449b1f053c72fbe1427ac8f436d1c669df8de5f4f7739054a15c7d5f9d63b65cb199143701df78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e3f48e793edea6998c5252d00826f84
SHA139e1b9ad2c4186e31aba930b269f6704fb5ed0da
SHA2561b00d858b6afcceacd6cc6cd8adf053cfe11be72e8d1ee1af51dd1b21b2a856e
SHA5128b9d993c913bc6761c790ced426990472bf5778e65a2754703d1c28c3959549859c304da253aec419f463ea53ca754d11f6f4be97bd3bed3d7103826df527784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d04e1d10aad2dd4786765e759b89ae2e
SHA1d05b3b3f2eb51cdd98e2067ed88181c35f9d1c8a
SHA256c0eb71d441bed52ff9d48399c0439cf318045dc1fab6988cde0719d9aa6954bf
SHA512d8b0128eaf72547327bf0fa5f3177ea5c79e27f97faedec9fe3d9e41aea094d7234d7d05f52d9633fdbec2fe9e99eb904be572e3788d216bc4c752fea8dfbfa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552506beee2c9ca80dd3d61d18eab5d64
SHA1fead9b740fad52758a7827d132ece412617ba5b8
SHA25622a1b15a7ee637119432a7cbbb8120c1ffdbbc52d38c343e242a1e6dbbf0d541
SHA51284128baa888337c7cf1182d32258967d70491814d29fd883002813a04eb7446d96a0fc630838cf4f3cb1162f95420474d8b87b2fafed68e939ed7384780dc57f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C0818D6C839FFFA99AF7D6971537495F
Filesize242B
MD580ae9671f2013363fe46fd3167d6f1e2
SHA1a5d93e520091f5f7021bc179bf34d62db8e4ea3b
SHA256532f814a8c817e08c6a4ae5a97bdaa8e3211e913822061782ff1e4eb7e3b33db
SHA5126c7623094d368529bf70a6147793d2ce7a424fc66f313e02b1340605dff293adc09741c78d75560e043d9342f92b4f383075da2d7eb46f8b8c78b0c70d8abac0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b