Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 15:50
Static task
static1
Behavioral task
behavioral1
Sample
c1123ed4928d193eaf8993d1dbbea6fe_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c1123ed4928d193eaf8993d1dbbea6fe_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c1123ed4928d193eaf8993d1dbbea6fe_JaffaCakes118.html
-
Size
461KB
-
MD5
c1123ed4928d193eaf8993d1dbbea6fe
-
SHA1
672f5d55c27dddbe1d03bf5f966cd931f65cd3ce
-
SHA256
f0af57740ddd1e575f88d693365a8f4d9db90159185131ca321910452fa4e229
-
SHA512
c87a62b66cf73200c0bcde43435da072b149ede3b80c009fb6e604b71d608339844034d0cabbf9182e70fef535ec4ff4caba57c5b15f6ef954079ebf33f81d8e
-
SSDEEP
6144:SEsMYod+X3oI+YFrsMYod+X3oI+YCsMYod+X3oI+YLsMYod+X3oI+YQ:p5d+X3P/5d+X3W5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000008206a06344b45f01d5e72c1b7c9d0371ca54677f684d0767b444869933d9ed9d000000000e80000000020000200000007f60b9634ed89ec4de905aaea14bde759eb0cfc6bcbb346b3042ce758480cc5f20000000b124d4444fd930370f26d4ea764378f656c8bba09ad5d50ec07c74d2f2d6a475400000005f0bc42511ba56c84d29859a27911c7081c1b2a21205ad994971a8a0aa16e6fa5b6901576b59d682d31900d592f25f7b6269cf7e6a3b7a03d8b7dcf833757223 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430762896" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 909b4c9906f7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C0D02D31-62F9-11EF-AD9E-EE33E2B06AA8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1544 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1544 iexplore.exe 1544 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1544 wrote to memory of 2800 1544 iexplore.exe 30 PID 1544 wrote to memory of 2800 1544 iexplore.exe 30 PID 1544 wrote to memory of 2800 1544 iexplore.exe 30 PID 1544 wrote to memory of 2800 1544 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c1123ed4928d193eaf8993d1dbbea6fe_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1544 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8c3127604664a6281bf1ee7d5a6e09b
SHA1e47faba2320957ed73eceb9b5f88bd01a5043b6e
SHA2560ab536204bcbd372d76f431be08aadc6151bba3b7c5076b28a31b0ff46ba5390
SHA5122b68a7c30f9d8b18193a6ff1d17df96fae5806eb00471ee8ba547c7b0a8d34446be8f895a8391e00af4928e9ec2959632923a5bce47c52b9900b16c14fd39a53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be10ddd86e0eae8f7d76859cbd536ee8
SHA1a712d6c1b0038ff44371ec2cbe317f49e6c36691
SHA256a5526b3f01f4274256570bd64bb59afe8bbf36fe10a3baee530c8661e2ebbfe0
SHA512aeb8bdeba5da57bb61fdcff56a7b28641cf783811dd253fc4edd957bad9f910bd9009bfb6cf044b7f56ab2d8defaa810fff703c36ec13666749fb65133c48419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a390c8ad55d39235e7345238c0af37c7
SHA11a94518e15de7537086cbc6b854dd15092945251
SHA25636c1ab2435880b855bd90d6d2f3476c9e3dd0228fc0ad365dd331e2d2b900896
SHA5123cac2b769786266e63820e6eb6fb09dc44fff88fbf68053345e42bb02a9777bc5a1a033d44e18435aebb1575566810674fa3714a9ff8a16a4347b812c37cdacb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b6d624f94c4155a23f37f1d0e1bc7d5
SHA1eeb2fb9c1b588ed9c94880720dfb9cd634a7ecc1
SHA256eb29ed65fd6e13afa8c39ee3ddd286e0c9efb17b865e8099593684a7ef812d15
SHA5125a548e637e043acf293d54f89d54a3c38ae06adab8139c20bf8f4303dbadb368eba97b1c317aed92ad130d9327f32d1b87f07ce988506d6740dea148574804cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577f26aac04e31243870ecbea62a64b27
SHA150f98e794272fdb6ea472394e7b1d214a0c65fd1
SHA2560efef0ddb9639f255eadc708700f799615e3affd43097e6ec1f371e86add772c
SHA512966eab3be42f0d3f3914dd266f80cddf2029b00c46237e0dcd5a55fc7788899ee2c5d44338f5f84516ad57fc6385e8e3b466af103961b73a974c5ed73442e0a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfd31ed0e560cca8ec048f90fc934c37
SHA144c7be2b143d4452e41801c0b1a48a68e0f70515
SHA2568e7faf649641df0610b7d6fdd1b17c0c5a36f1b8631acaedc06b69dcaae352b9
SHA5120ab7d52c1d521f1b31a3630d7851e9357d391e30fbeeeefdfee4495a68cbe32490f3357c7afff04f8d8cebfd66265d7d115db186b75f530f1bd8a3f811023399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b919430fbd6c7f3b46e331c7694ae4b9
SHA135dad6eff81cd8a290cc86dfd27f56d6cbf47d1e
SHA256f33ecfd5a20b4a4a86343078570a748be63ba2bce3b7fc0ce2852dc4631881c6
SHA512de69b6f215ae87a6961f1d24767532393787ac9e0cabb92fdb1115a0145eb83dde2bb4469d79cbf9aa8277ae9c6158d9d4ef0bad84a058ffb14e0018431cdc8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f6660b7dfaa5d6e2edcae59fa49c52f
SHA1d59c77531bb848ca1c88566836f50be7dc4e15f0
SHA256cb0ef1462aa679c9a358c7cf36b62a04388c14e8c4fa3cd8e03d76e099914072
SHA5124cf2035cb67789ddad2b88f154094ec35e4a02b7c6a43b94b55434d9fa98c33b62c489d18977e67448b77e793abf382b312bfd4306edf4cc49c05c29d52a87e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515e99ffc5df21398a315d71337dab044
SHA11ef24b95726170202080e6142b1434407bb27c19
SHA2567fca8465899b0dfece7fd53caadebda7b6b64e34e5343cca75f3f2c5a8852aee
SHA5121b4455f9b425fd2732955e4a5db33b5a07f9f5dd25ae74b8ce80c825f4ca4e799f34980281f248b0c5f6964947806e68b5ae7d310b011e74cbd0271bfcdca85d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b8a7ce798c8fb6d6108e35d6798154f
SHA108516f2039df8e0ea1df13c34fc4d2ac30f95c4a
SHA256f3950bef9de07fdbc79fba86c9dac6683b182c36a51a33ae8c20fd9f9491aa4e
SHA51265db53c16d1aa4d8eca0ecfd315a77543d86f3240600bc3377deb51b52df1eb187a76a9db8be02ec46ea8668b8189981e5301ebe5ca4a6ba90cd8e35987eaab0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc4dd1e39f05bcefc5c80afe1520fe8d
SHA1eda88d1609db385109c452132ebd0f6a6f466aa5
SHA2565ce50d8670ace64d29115b7b44933c576924f65574654231c6d9a7320bef3ca3
SHA512b57db2a39d342362d2afa69f23d3ebd0c91d56483f9f5be3c8469044fa0f7c7364d438668decae597c3c097e54061e1b7029aa521294052f0ff1091053e10765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d37741ce408587be0f1267b596baedd5
SHA12d5734da75bcb9dd2797162159132f46689f3e57
SHA2564abe49df349fcabecbaa9e6ffb3692f5e2d353f1a7d09fb398dd2111db0a57bb
SHA51224f3ccf534531f06709cd57d8af0e9f4d6c406c7373017d2aca8e26bb0ed8cfbf3f204a41c33c8825bdce755bbe9610e9c953a064da14ea22054f78ef9d3b934
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d91ff4cd8e26dbf00f3423e27f62c77b
SHA17e62eb1954793bcd4b7db443eb5274f7445ded3a
SHA25663601b1c02dd988feedd11176f3a6c704d3eecaebb3a821ee16f809346aad7d3
SHA51262e104b92e82fe77e533c20012171c13a2c28a29fdf7bf6fecf8d6c101e53ace9db27b40b370bb4d5080842533d10a95beb53f6513816219efd22f77d92427fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c52eff3b620a2ce6a335f82aff6a33b8
SHA132605c731a0197ada10149ef27d7017f654d2059
SHA256174497781dedd03cf25d9d69a80b0a29cbcb4bf8953e678b3ca325551c0acb1b
SHA51239e63745c1047ae938eb9acb818083254fd8804c822a7520d6d8bc861ea09cd5bbb09b568743280a8b5c6a1a12f9c7b082cb272ebf9a9b8c21824faffc569525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f0d449d59e139266234993f9d0d0f25
SHA17405be857131f5509c743246ed3076fff97b0fc1
SHA2565738d0187185124295783a21186148d02752ddd092e5836ee3c748783256a11d
SHA5126652b02168fe8ec762ed31ffb0845bf3a09c87424dfb1c5a1d6b614a08d8b3b0c28da4bbfe374c11d30a892abc60e6c5c914b732b8bd0b15ecfb2aae38d6eedd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542184fed5d5d911164c0ef229c57002d
SHA1d9c6aa7964d987dfb7092885f9422de375fb2d6f
SHA25611bc73a5c73e044742397e5305ac622851d66eafdf6f638d193c04b1bb85990e
SHA512c898adbe1fc346bf03f4d193325305021c851a6ec1ff0b88397442ad699620e8a66980ea6c10e45b28495cc15597efbd532a76219f0c9d81739480b430c3e542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565dc3d846398e6fdc3f6cb104a6b143d
SHA1730e95b0cbe6c30e83c72da3f8bfffaa065364b8
SHA256074102f0bdcfd79782d47dd07a6cc55d0fe5f871c33ce815277d5405d5318163
SHA5120cef7d48bb02338c9aedb0f05a4164fd0fe1394f0cac868c6e012032ffc774049a4f0561ff00512036aa82f29b42fd5540803a8f18e2994f5bab6a4fdbb73770
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5bd06ec41f4f0216959a381a6387465
SHA114b16b6cd4e9d98bab4fe5a1b734a5b83612e1a4
SHA2564fc1670ecd810758de20d8f82e32e32b64f35d6464d37ec6ffeeb7663938a982
SHA512c4053a846c4a2e2e04a8a0f2d1fcac356c14dd946bb6aabd594a56b3eec222d5ea23c77c1fff6b7b63779aed05ee65801c46c0206368967aefc35fdbc2942ed3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b