Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 15:47
Static task
static1
Behavioral task
behavioral1
Sample
c110ae1f570adb7f131f2cf0b585d215_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c110ae1f570adb7f131f2cf0b585d215_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c110ae1f570adb7f131f2cf0b585d215_JaffaCakes118.html
-
Size
4KB
-
MD5
c110ae1f570adb7f131f2cf0b585d215
-
SHA1
460f6a7dbcf1db3cf98d3069f7782723a769f433
-
SHA256
0356fba4da8c3ef6fd4c410af5b548d6985eb77be65dabc6c618f423397f46f8
-
SHA512
c8ee756192e29694042ba19c25fae96e4dd77152d9dd896780ab0b4d214ee6b835c190d8293fd4136c165f2022111ce718943bdc805f5a0833b7433a6b894309
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o5pWi+q0:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430762735" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0d25a3506f7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000e9cf5c29ebeda668bfd827e92eaaa4bdaa601907104acf97b2f74854ef6ed4ed000000000e8000000002000020000000114ea534c1c80fb4e5ce6d6b3375d355414361ae7776ff02a31a07db0ad600422000000095ef6b98f9323a8dce3346b76b999744b5a99933cf591dfc4c92a7aebe6a6db8400000008098614f042b0d5ba36a81b0e84ebcc51486be81456590442eb90cbf375436e45b0dd79ec9777ca2e914b4ee55e63557627499e8e9cd613ef1eb6ea6aa2c9ebc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{60D9FBE1-62F9-11EF-B066-DEBA79BDEBEA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2052 iexplore.exe 2052 iexplore.exe 816 IEXPLORE.EXE 816 IEXPLORE.EXE 816 IEXPLORE.EXE 816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 816 2052 iexplore.exe 29 PID 2052 wrote to memory of 816 2052 iexplore.exe 29 PID 2052 wrote to memory of 816 2052 iexplore.exe 29 PID 2052 wrote to memory of 816 2052 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c110ae1f570adb7f131f2cf0b585d215_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b40048fe8c7ef284280f47231d2ff7c3
SHA1573f048e0156af6c3ac615c4c8ef7b3d5e48c0fc
SHA25611512796e50aac0fd8786d6353a8a489eeda837511c8a5cfbe341035997fea5e
SHA51280c95b156138608c464c0c7fc25e9418763feed4ae70b6b05f027b2c7cd71eb341858e252c60df1dfb487b4240cb87d6b1048dc148cdcf7d7994e2edfbd2cbe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c5ccd809040148ef8779c80736f554b
SHA10effbee673884d6155aab68d5b313374e74dce6f
SHA25648ef38169ffe6ed68db8670cccdb946234c9547aa40c65b1ad1cbd5ae974862a
SHA512689e18bc5634d4a8918a58693ec1018164798166358dcbd98a97c7cde05726b4d4b9f2d2599b735b676b3f0835af021c04ff1e953f28817a39680046b5961798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b935e93050f0b948b53e0bd65130ce01
SHA1f49e2e5f3b4da40febfc7dbeada7a863cdfc1fea
SHA256e42e599c49ab394d8040eb39f6898239c179d804288d56fc47ef3d03470031d0
SHA512ee40aebcc1ff6f9be068ddc8d099c8a7e070409bae20d44c66764c97dcab7807c51c3e60324d1a42be3a5648116554fecd70c5edf833ac0236ec85fb7c192e5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5579d71837adcd61fa51e847261677ae3
SHA14f0521a7074b9bd34ee43d41405dd44ea3a8a73a
SHA2566a3e9241ad8201f2862e4d0732b21be9b9c2e691b6f3c75dcdf0fe3bd47fcfd1
SHA5129b64a2ff7c2d3f460c5b58a858c3cb97cf0a84a0f514052a2bd06261dbdb95bdd249dea66aa8e0e0fb5b86710f58365464423110ecae6909e40a2a3d2ba9b283
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc1e93f62d13738f9f80c2bfb24e1f32
SHA193da159bcee05909d678b2f3bd1b98144d7a5bdb
SHA256fefcd99eb23b1b3140fc68344c7abc48084ceeb141b688ccd9b7250911472740
SHA51289d74a7532a7c5d79c1c5d716b813e56fff05c2a122735355d358e94f3fca6168399f8e9231f9051a3d822f2c1ecc5f6b1f65097f2ae55e853275d42abb2439c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528f2c4e3f93372ddf01299281a2e9f9f
SHA17f3938b725401eb08788cc0e8451f09343265ffc
SHA256dd67562d77b8266d09e2fdf4a868495fad313ade79f4f05320998820338a0208
SHA5126c1399846be37fa8f1ece9ae524b6b5beeb2c94c4b07454165d9702235a58c91f0d642e6a8bf5716725195428bdd73bdc9d45fcdbd19d2d0b30836bab8a48401
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5579cf70c276ed5b713095c5e7b695a74
SHA160e1ea48025e48f102b1f4dff54cfc043e3b9bf5
SHA256598991bef595b97a471f558f6ac27ff6d13dbd97fc7ed604fed61ba57249c229
SHA512b983359b7dcbe581f4b88d886f03a83ba2d0474617f323cbf38979637bbd6eb2e3531bf17c8ca43e6779abc4d7a3c5674731955f5e99a5486a223293939b921a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d684e459666d9fc0047ae648e14ac68
SHA1794f8b36597db6fe578faac2fdc67c97bb93fdc3
SHA2569c4e990b754cd0745108a82aa2976e7c2e33d5f1dbbc34e129cd387417de7a9e
SHA5123a9105128de148a6e42ce9654d0cdf4133e95b860b96a111e64b75b1dad3f618f183dba96b2c660bbcaf1e922deb395362a55588a0be06a02dc3a02a889f6361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d1f7616088f89ee8ad81eb1a1c37d6a
SHA12c115c7a5776510bc384dd27d809cd9f680be4dd
SHA256c4d10fe7e973231d3616fc59395e4871a2268e00e9fe42ac7b212c9cd38e69da
SHA512281317930e161a266d8e78dee075dda7c0397756686d658693b86cd95e98782f0177ed20291ae8e5d411390cbf76ccdf36e2be1960917313f82baa20ae24cb91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5767419dd4a1b37d06309c6be2003d869
SHA13e232c52652e833a461b590782beacd81181b567
SHA25669024282fa539aa3fc11d0e24e56b831cb4e1a281cbc4a56253ed30c0d01e043
SHA512fcd49d5687101fac140c9ab16b5c5c570931f4b954f4a26f30dca2f0b7297cf53eb6ca1302dade7481526681095daccc92af80f22344822195ef9f6749920f33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e44bcf7dea760cc346af73fe3192898
SHA11af91d4d7c4f5608ac9e208e5c36e0d2132f5ecd
SHA256d501d1db10dd53f73c2ccfcd6c9c80fd6e555f0baf9f3b00468751b45ecd4720
SHA512ad5914ce955415389584615ed5492f0d09f474180eb8afadbcc83e20975ea7a792f8f61fb5bb6655155f25a372274df6b1b02528aca6660768c41cfc16143f3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae268190deaedae175baf5dacea9f08c
SHA17bc277f14aef66a9035b4afb233fd20f1250816c
SHA2561ef1495bb2c59d99b7b681d4c9a6f3aac4604bd2aa50bc949d1a8d5a413315da
SHA512a38743c35ddc5f464e261cb856171e00cec4c04b6ec2eb75badcea3afd78f6364048088c901a9beb62c01c0d729fe7d0d106ebb6cd184d753851207dd7ec4bfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a778cafac638f7bcd6a8fcce86c300c
SHA1ea81106e48f54fcb054f85e611c849bb112127d9
SHA2569d24a12dac2370f59e732782963d220e274c276687d7d17fce24d63f925e37db
SHA51273cec7a1ffc0b5473197df8b9695089e1b68e8b0b385035b8eddd9feee3bd6245e49ba873292928b41e538daa53dca2d8e30821d8693f7f93d531624e28f2808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56773cd8b1fc2fd178a0063e29733f9f0
SHA116da50a6d1006b24c419a999a1646252703aec97
SHA2563c4d78fc78c2ec9a05ac12a74401bf86744e9b9bc76ed633270f0675020b0b7d
SHA512eb086500a67e6e4967b0d548650535b85c8caa77c80647f01e65e9c584893b6d7a32f44b08876516678022b76ed5cac2563641aeea94f4b45f679e301dbc5b0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c31680bceece11ea6594bfb8115a43a
SHA10a62f54a7341ff6d9af569eff4238768d891ed35
SHA256c3fb718a9563641888fb4cf6e5430eb3c0a02179db48906cba6e1c76daab5755
SHA512a34e4b6653b56c319e41dae6eaa71e6ae95ed71cbf587e029c656a1db021619c4993c8de654e69b8094de109594c782ae3c65f5ba899a224e88e91941a5e7dc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5fda6fc54b7e853f5307a7065ddc5e3
SHA198d03ac59e2ccbb0cae804d60a6687974a6e715f
SHA2560ff47599f811e7a92fbf0a3b7d530374ac17ea36c9285e6dd013642510316327
SHA51236e5a60af5fd5623cfd7dfd0ddcc38749593abeef0a90a7a3396eb6b3e15bf6baa660d02c303475c3e7ea03f7a4aa4da8abced149007f74e64dc7e69bf3f6e7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5756289a18272b534e9662f24a381ccca
SHA1e62d2db720414091ab772eaba0c8cfc07cc25336
SHA256d681d04d600c196af996578ea3bddaedd47ef23dc23f883c288ccb933ec4a113
SHA512054a833deb444ee17b5a7f15ff9807a6ad8a0a5a7104b88468bc3f1944001f5fa3a000ce0e6966ecfdd4671b29820ef6dab501b5674f31664bf3468083d5794e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea8b1977ec60ae00aabcd864a3b8d6eb
SHA109840a72536766d14a65413b1a81e425c17a4b5b
SHA25664d49f0d31b334d37d6d2f7d6cac095bbf6876aebb7f4d67a18cbd4ab795f973
SHA512c98dac94d4d9c29607ab20806907ab8bd1a4469e532296e15edc408fe4b8bae231df2db75e201c61c42f05946c8f2c6964dde2ed21f7dca45d538e8c930b40a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522a1489ac905d1d82a77a93f4d7691b1
SHA14c6721241319340037d057d6a6a2d403cf8cd02e
SHA25611292b9686cea5d4cc31415cc1f6631d5f0017e835878bd89e4038d0887fc80d
SHA5129f6f334150562983d6fe42711750cfc5fa8c313841d97ae96c8ba61e0dc07651c5b2350038d447085233bf6fc3dbc572d4434fffb073a370316f7c1cef918180
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b