Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 15:19
Static task
static1
Behavioral task
behavioral1
Sample
c10460b1612b4b7fedd41101019f87a8_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c10460b1612b4b7fedd41101019f87a8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c10460b1612b4b7fedd41101019f87a8_JaffaCakes118.html
-
Size
346KB
-
MD5
c10460b1612b4b7fedd41101019f87a8
-
SHA1
5a1c2299d38e1a2bb4d93b4cdf31f17c29a16c04
-
SHA256
db35b5d412ff901eff4603e67d2d6a26e5f8d4f5d4aac1fad6792be3f4e890df
-
SHA512
558c889d724e4b5a6c5fce356a9aa27d55a8c88a05e3eb48d15bea48cacf2e3d1346cd8a04e58db44a893dcd0e99b6169a59bb8b5bccf1486c757966fde0bf5f
-
SSDEEP
6144:AsMYod+X3oI+YGFssMYod+X3oI+Y6sMYod+X3oI+YQ:u5d+X3oFa5d+X3u5d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000c024002055fab0119313d976fd0aaacb6c424a520c23e3d223fb38f61ac017c3000000000e8000000002000020000000122978055bc090938fe62eebd474e43e5b912a8ff3101c112e67e1201984b1bc20000000cd69bfc66dba366403750de6702331e4e64552c1dbefd9d25da791a873fde94b40000000eb42f699bac92a0f42affb3c2f323e45f39d2eba558c9e16c1e963466c877d8617b91a82e53469490ea4a573ce1b75a31b36c563ae426edbb0f42f663f7f252a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0d4303102f7da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430761011" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5CAB81A1-62F5-11EF-BBC5-7ED57E6FAC85} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2840 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2840 iexplore.exe 2840 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2768 2840 iexplore.exe 30 PID 2840 wrote to memory of 2768 2840 iexplore.exe 30 PID 2840 wrote to memory of 2768 2840 iexplore.exe 30 PID 2840 wrote to memory of 2768 2840 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c10460b1612b4b7fedd41101019f87a8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2840 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deb3ee75358ec1df307338371843ef73
SHA1fa955681a9881a8840217ec6fca9407208ca0628
SHA256215ba7ab350497a96d3f83b1f12f1a22bde34bba71f4b23ecd061ca502d663d6
SHA5120e1092bc46199215c3aa30316aef16704ee1559b0cbfd739eddebab7cbf904b615ec9bc604f2ba9f349a0464bd54d0f5ea4a07f34117291a9e7789606493e6e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b551f2cc551824e590e4ab073e1b591
SHA1a219a9e7812785f76ddc2a60968f4410ec54d00c
SHA2566e1495bac11f3ed3a3905256f90802cfd4f6fa560c45ccfc88fef98673f7fda7
SHA51218b7d149ff4be6d7e7fb649f4c151658dcba171878308732b360253844c3b1c8f2c0b6c86bfc032b66d7ce7b551e484831054a6fb61250e5c98727562f4b5a72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad701ab60608c8b4e64c6a39db8adc89
SHA1f5101750c3009691da52769c36a7fc7cd823a5e7
SHA256d242aaf4679d40d55f47dcfedcb3e028153174ecb95a45e382746ab9be3ffef1
SHA512cb4bc8db3d92c997c5e57ecb290e70171d331e3227b3b367f8ee69812fc8ad47739cdbb30f4dfb1b5c3f0ed91bc01c9b561a1310a3ba985633ccfe251c050ff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a3d7c887c36ec55c007258dd131a011
SHA1f73aff2c09db7676edf43ce0d10ad927e49049c8
SHA256314665e719c52c04a34ae3876a8d28c1bd46f2c12b0532082e02d1af154e9bbc
SHA51209de790e57df0977a69bbda3b21d839db0fd7f1ae7c56129db761743c3ded175425df4020768a896732933cd248ff98a74efd94b902a0586cf2f603888a2cc6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58381b11e9e5ae8c5a3ee6619fab7ae55
SHA12cb486ea7d732fcfee5cf97cbb538c210ceb7fb3
SHA25650e24891845e1f372ce7113f0228097d6d6a2ebc105dfe1aa1efe3573fdf5573
SHA51275970bd2b94b97a9e477c6a1deb5c30846ba6c3c0cec35da03d1c9dfeb418c2d2b7387ff4d747645a765204604db5310224de1fc72d79730498f260f75b0f346
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fe10bf464ed0bba0c4bd84d4161b2cf
SHA1dc4eaa16b92aae3287efba95f22f22721e2fcbf5
SHA2564d3cec61f0eea608a1a89a9530d5a76cc3ce5dcffdb58fbd4552872763210789
SHA512d79b608ccb82c42b4bb749952f9044e5c6cdc47b597a7ed8428cd5227ebda2decc122e8ed3311ae6d9dc9c75ba06c88e563919c33d95a0b93ed00898feea52d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54af5181ace6eb8500d3e5aa1a21690ab
SHA1b73f72f65e6d607b949417644e690ad4e7e9ad8b
SHA2561ad91f9d3b6142cdc6a32f21924989f8363a46566ea922df43dff7d959b7248b
SHA5124903bee84819e86dbab8bce5be2414bbd1b61447da4b004b7878275ab5abb8174d5f5412ba33209ad7df0797cd752edd161b79b04ca5e3b0b03448c102ebebb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfbf5ec8e79137ee0ac0e02309dd8fac
SHA182fd716cfc30fd46c7f7accc1753c4a686f686c6
SHA25680939adfecba8b354809810fab804c939f6ee4e840bea794aa97682ba0f4ecf3
SHA51227ff5e25b8d8347fa5b6cca0dfc67d8185df07750d0ed9c4443056debae0b59437a79bf307100b905cdcb8a43cdc572d00ea4c1f5097efd23e89fd8d1bb39b35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfaab7095e46d448267d3d5be12f0047
SHA1acd119375fa09798329c8a93b7b7e0da8282ddcd
SHA256deddd2dd86b0a7990cf1e029e3ce15238e81694743aea13fbdd3f66d9a5ad03f
SHA512112eb0c77a7f7e58204c1b4696a11596224cd01627b56568cc4316dd8d07f5caaa7699433d299711ea5eb53bafc59ffe1eea9ea338425344285b398b3dcb4886
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecb5169b4344078314311653bcfdf533
SHA1c2737227353cd0ae5a6ac943eb388e289615300f
SHA2567979ce9f500ec9c026c0c53aaf10d7fdbaeb0cd73bf01e68f4a33aafc9b4e399
SHA5121f2ff27aa70e39e7baf0d186c88a19c3f450a7b8731bb54ca55d95e6c393311497b77c934d4ccc2fb39dfa15711f4f84b202719eff150fdc21ba87a46bbdd707
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557ca767b74ed7bbb905810c7706e3c48
SHA1914125b136193e90e09a2c7ac0ce7d649b9c6248
SHA2560b87b002e07bbeb70433a5709b426d83902fda200090977e3250cb9c308eb668
SHA512145894a138d299738a051e7318d453744b58a4f5108c1d9741c4dc63c3ff2fe2fa5482cec8f9628e88be3bbe65549580c29c984d85f75aab7c372b6b2a2d24af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f60d9f4cc74a289b83a60aaf0d10b802
SHA1333b2eaa3ec98dec3214da97c92672bfa0963b10
SHA256f8b96040fb5583da0b8c8bafb8fa301e3243b1683206e0786e487dde9c8825aa
SHA5122f65842c533a52085f9dce257b439e1b23e02231182e62ab947ae9aacec2506b937ae9e36b941c3ca97272de1a4614baa2c40dd6051e184f30cf837036d1d808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b1b9027b2fba0281893c2b9fecebdcb
SHA17e16e9299b62675ae9d1cff76cb055728528d325
SHA256b6373c9cdaa00b81b332544426e7412fb255360c0620c6ba984a6b063cd8f307
SHA512dbc1c68fee750614531b0f43070404d074b0bd66c6b496cf45059c9aa195fe0de292e16be77772be390ce107b298a9e44ceb53421280edefa26d63d4cd527077
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce765880ee70f3934a7cedf58bfb10ac
SHA1e347b231f96e0e6272e1fc554e9fa6a2ed990afa
SHA2565d94ada9514babb26c8e8e033e9957f9e2d35764c2ae31087f7969216822af6c
SHA512f28ecfd5fccfe37d281404e6d75eb1ec61f4b356ff429f636b3a9707b6cb237b65db2c044bce027e7b8cd8a91b894553ef706092e5418de2ab7de39b1eee4cfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9fcb0fbfa2a15f12c3100decca01595
SHA1200f949c1e3a0ab69b92293b9292baade79b29a0
SHA256bd96a08b62fefd53e7272f28c8f9fa29d080d14ebeb1f151fa8bfd4084d6497f
SHA512f273015e57b206600bef1d1d87627976724a45c2de14f724ebfed5e2ddd88f89947675471718a6f88f695f1100ff7bfceed0dd5718575280a1aa47ea98b18051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a819dc905b33764f44cbf58624517b9d
SHA14480ccfcf70f86f311e6111f634e3a1bac1893d4
SHA256d734a54f3b8102615ce0b71b9319f820450f8b12d898c0be16bad9ce2a4a49fd
SHA5126f01004a332deb911df1f977fed06e1403b9b51e5550bc44e99b0dda9cb86878ab16ebf2b48507b51947d90ad4b3ea44a7dab12fcf8629c9e4e0c8ee86a86e29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfd12ad4f5b9fad80dff8dd9bc016393
SHA19c16c46f4dd4cc3bc04c95b3c0438da993d7dfa2
SHA256388c7fe095215e782b119faf855cf2633ef41b6437f098c45ca954121ec0a65a
SHA512c0ea5006a33b633cac5b6196b958243fb69b7268b8a7ea6a849aee544802b24edfc19a76f92df26187adff7fd1e33dc451bd5599ec1759e61fd8a02cf91ea110
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2c480b2271a4d558eb04a9e25e9a2ff
SHA1b716ff17df5657aee6aec6dd5e75f22e0a43b148
SHA256c790b5942440532cc0f67aefa9a69e065068676b221933234103bfbf164ef939
SHA51239ee56e6a6607d8183f0c5b1664ebfc131ffe1635d882a88e2fa9bc96761de34b69f036394d085e026535617fe3a20ae96ac920eb964e6d4418604db7ea4a46e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b