Analysis
-
max time kernel
121s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 15:24
Static task
static1
Behavioral task
behavioral1
Sample
c1077612d1d763da7965599fcb98f6dc_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c1077612d1d763da7965599fcb98f6dc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c1077612d1d763da7965599fcb98f6dc_JaffaCakes118.html
-
Size
33KB
-
MD5
c1077612d1d763da7965599fcb98f6dc
-
SHA1
b9a4af26c1e747f0bd55f4d4e29b38c98602fdda
-
SHA256
6832363ec417b02c54cada62c58e7e0374be74ea924f4b1ec6377a23520acd55
-
SHA512
a57e7b8c4e132a382703afcbc50f1bc33eeddd0e8286e63c7fe3790fbff13b0933d1a3a3d697765b0e3fbd15e223251f1ca892475935d35d28ad52f55c8c6132
-
SSDEEP
768:ODtJaxS4zi9saa0M+l5gTPJiBY886f8gKwnoM6IULQK+oqVEg9w89J:ODtEaeLJiBYt28lwnR6POHJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430761364" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2F0D8211-62F6-11EF-BF89-E649859EC46C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 408e6b0803f7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000004dcde364b06d2f5d4d847614beba35dd7b4121a66c8219e01c6c46d0cb9dafcb000000000e800000000200002000000004dae104e807b94c1006dd1934e8bdb89af8a629cd737794b78ac79cbb829024200000001bce69bdacbca49eaacc57c4e1dd7456fe23283eb1fd593965b0d22c1093108640000000fe0208d6937dd499fafbc95e45838b878befe4ad6bfbf1361cedec488f8cadde82f185acac3b0b911017fa6d2db21a6838487866b1bc419a63949aff47d0d178 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2380 iexplore.exe 2380 iexplore.exe 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE 2992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2992 2380 iexplore.exe 31 PID 2380 wrote to memory of 2992 2380 iexplore.exe 31 PID 2380 wrote to memory of 2992 2380 iexplore.exe 31 PID 2380 wrote to memory of 2992 2380 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c1077612d1d763da7965599fcb98f6dc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5affc58633e0e451cbbabc246a5f1ef4a
SHA12519c0cd507c22b4bd2f27596ab8ce91db531486
SHA2561e11b4f608023ec10d68c79f6f728c79d387a314f8de2e4c13ce20f834300757
SHA512ff4f6beea6cb1994c6be6ed9574a1678c5a55ef2f456772aade0cf377abc5009180187adf8c81625591ed44ee8e6045138628cb283c9125b9378f044c08b9df9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD594fbbcf444a8f20d35d5899b4cadb099
SHA1d14ca54959e0eae7f6d2a3bf495a25fb4b439105
SHA2569ad1e25b1148593432524731184ae6ca46905f49b54a57fe4a16534d704bcf24
SHA512ee86029e987257f3a1379367a901b83e599a875d4d7e5c8279cbc2e3f63d776cd90dfbb6d8e91fcb2c5804e0b3701fcacefee0640cb3d844534fae830569e138
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55d203ac92569261e610d379e4f3742d3
SHA1144301dd5a667cc724752c632c79db5cbe337b30
SHA256d4a194b99072d9dcb4297783c1787584e9b07aa781ca556ca4f30943ac80edf4
SHA5127f4e40fc6b6681bad4bd0dbebab27bc00c7576eaac6f70739a5d1fe0cc548f41d1cbb77765ef26d2d893ba71ae48bf1416ffb2e9583ccede90a24aa9b73f79d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5961509e5008f2f32dea0ed6c18bb7d6a
SHA165846fb1efed5ba762484a20e0220db46e642044
SHA2563cc011c0f11b8b4dc43a18303c39d9ef0d17bac69ca724ae1c562cba3863eec5
SHA512df487ded4cf666170ce7751ec8eb644614ce595fe6761cd3448b0458e52b84c433268b1fe949fed5555c118aaeda5945a1250fecb4608f043994dad386e5afae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57435a0e793684e57f7c48cf7a8ece24b
SHA1415bd86453f4aebce59b94c006ed4b34a59b9279
SHA256ff79f34ba1db0ebd3381aa035cb7a344c15109a7405420dcbae89631eddca3d9
SHA5126b947d6c19bd79d4027baa83ab1af957e70d0f6cce5e629d0dda311856ce17974bfd48757eb7b04e12386f365e6e79640a8db24943294701955e9cf12ed05d05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d7d33f3f9ea65910bd362ee3b9b49675
SHA19b23b403a27a36e7b4137021c7437804cb0d45c3
SHA25607cfa5f562f124966438daf2409cdeb9af6a3310347335268210f7f5c1c67121
SHA512fded261c0cb95ed100b8891d017b7a4bc97de8161473ac5404c3d23038de58f877d2bfe34e70bc642db64376a9504bcd2c3b073fa7bf786bee7cc228e1e32fb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51ca31f432d2ad575ee62a876bbe469af
SHA169b6b19261dbc1083964c734599c5a10b76432a1
SHA25662c7df638a70db416ffee05bd3a27010c7d9208093aa4d4dcf77591e372f6eaa
SHA5127979b2321229c8f1752a58d217488cf0b7ee21d19f549a390d6572b849852a30e998a28c5001db58317c708c24ebb64d669083298637d9ce43da4a732b5a205f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5eb5ff8eb25ac166febd8ca0ea0af64e3
SHA13eee600ae3875ca3ba06b9c8cf80d6362ce45ad3
SHA256f2ce462d5d21861457ebe2926c58a7874722ee6287e2ec36e79ac7f40acb919b
SHA5128c79acce40fd3ae0cd7f6d09b9234bce8646473820ec0ae339713cfada5c0bd1bcbc1521fab89bf2de7d35187b8c1cca1c9d27985372cd8d75282209040b1f8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5240640ea4c3ddb50ce3205acbf8c9c28
SHA1d5c2a7e3d8b30ec7c55662c7bedab8cc151d08f6
SHA256537051caf7039d9c5cac2e1970f18fa0ee233fdd337e4eff726a71491a554389
SHA512d705c70db137ac2138a6e034609bf82e4b07674b6fcc5b60dc46bdf9f318beb831ab88271f33e97e8b4f7639a80d238e5a1d609849b5c389a14267351eb131cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a36e8a90bdc7da8f9656c0655cb3d797
SHA1b13968b5c6e8bb3e35ec49a7fece7190f4ccb212
SHA256edf15fad141709d67a5c5f3df6fcf27b3bc5c04358433df557adc9b906173e06
SHA5129c07ac05340ba2fa20d9f1da481f59b6c159e8479a21d6e673b0d6bb11d64456336f813759b69134c195c9ced9388dd04e90f8b942e18ed2a0d8ad6f0aea0d09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5219d055f1de25b3e01249407eb1e5f21
SHA199343fffb60514adae743d5562cb320ddbee24da
SHA2563cccf2e1e3f1a6dd2a396056830e33d984bb723f1b2f136c4d1bede22245d879
SHA512e3a99a89c210a6100eb28e6570fc7cc346b92b1f8d28c58084a02daa68540100a0c9374f8b9a4b2145bb3dbd6240f5b570c33453c9350aba59cb6f48b465801c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD587b45693db763e465e6e5da71f3a2ee7
SHA15c2ccff32b4edcc50a709f7248b5068f653c70ad
SHA256209675f2dc720f879e5b63394b48f3827bad9978ce5cd17150fa70745acef188
SHA5122a5efb193947b582bdb0461cb7e829c78cfddb47e6218bc1098b3e7d265bea940ebc5867e18fa37efe520c39a3f64c5aec2741e52b4006a43b1395b70db8930e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55f93c2cf8f02b457ad75e48c8a0516f4
SHA10c32dacdbb037fa45d8e055ba1c0cbbab67e29c2
SHA2560768f48aae36b9f2c417fe9584abb3066eecfd22dd94e5fa1df37526df220a3b
SHA51219a852ddbe9b5beeca0d03881838eb3d7d1771f329781548481a5d5d962d7988312d31cbb3b9fd9656050b587cce5fbeca531cc6cb8f069aac8e38a5c10c61ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50bba513ed8c2b136e8ae35b9dedc8153
SHA1cdfc9b58f7f6c9829296f89e1ea34b731debcf62
SHA256786dcb03a0952fa91201edff00353bc179195fe73032b1a921bb36e13ce3881f
SHA5124aba5c4028a43518e8734b75b782e103b2bcd864d9364456363772b8e1ee75b2de7de1f1940f2a21c2adadd3f26d88ac8753d652e5c34df91daab018553bb374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD566e7cc25b81b1f1fea35ed25f16a9f5a
SHA1d73764a3160c12ce081c25d18ad7072374a1c9c3
SHA2562ef7e33879de85382cb0d54d6d43ef87e680e13c20112d94412da0262864f790
SHA51226a9d776f327caedf561be0559b889203475ecacd9c25e728cfe2b225dbae513127e8b6df1529770eaa2f6083618974992712ef4a749d30a90bcc1dfc2f240a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5316ef0fa0e8b02a41d0144e53bacd5d0
SHA1b971cb525093530b7ace21e42aeebbafcd707b47
SHA256666bc7800d52e3f0e7477f80de89cf506781b96186893c94e7105d3cfc730d50
SHA51224fe2fb20cb1726e6033c26fc86030a94bbc2ea30dc5c3cc0e48ec387ec57ddbb4857d6f2a06c5ee5e1aa4de57d923e50446c91952cdf571fb5263cc3742ef1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD596e5e5624b274f83313f6c0aa1d77aa7
SHA123479e7912552c2b94a3196b2c64aa3e9c711453
SHA25668ee6dcc3bc1d9379f58698ec736a7a6f5a7ea9b390932b927a5ad334156e402
SHA5120cdfbee8166fb5d3a3a576349abfd5ad188977492cf242eccde7f89f6aace8f2cdc3aebb8e82b5dc6cc409377d671ece1394bdf809f72b0b6c37405c3322d26c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b5acaa7fba026e9bcc688f7c2a62e879
SHA13043c1ae33c3951dc6ed5eb3b18bf02084bf167f
SHA25633e93792ed6b82f3e8d6f5639eef08c312758b865d9fe87716758a28a62e463d
SHA5123a110244c62059a9ccb9803948f3ae8a91fea23789d7e2b39d6d757985245f287ca08f086dd9a50e9e03019d5bc9e91b0e1d5dff6cad336e568500aba68f78fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5690e6eae5d0bae88bb50f47c0595c84f
SHA176b67f1b9d6eda31d486c7aa69a08a9c59c87d44
SHA256c2857cc1291f74971839544fc9105cb5ee82c36f0c8123c28fa72c3bb068448f
SHA512fa030e3b947345de42a71b190e709fad34674afe72ef6b443b400e9dd4aa399e744992004c6bae84e8b39d0c98d578c30c7c1e807a681e3b163f3fadcecf28e6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b