Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 17:23
Static task
static1
Behavioral task
behavioral1
Sample
c13774a3a6396c89b8b42931fb904700_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c13774a3a6396c89b8b42931fb904700_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c13774a3a6396c89b8b42931fb904700_JaffaCakes118.html
-
Size
461KB
-
MD5
c13774a3a6396c89b8b42931fb904700
-
SHA1
edba039ac270685d20487a1e077ee5506ec643d4
-
SHA256
c62b71713b5274321cdcd1ccbbe2f9a317b6fc47f48ae9d5a3725f25a8397a11
-
SHA512
98eda808391557ee045ba8e4fbf830ee937399bae722d6b2905997808cfcff92449e84dc292517f46886b669db8fe89f7a111d473bd81d568513659a050680ac
-
SSDEEP
6144:SFsMYod+X3oI+YdzsMYod+X3oI+YlsMYod+X3oI+YLsMYod+X3oI+YQ:+5d+X3X5d+X3P5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90e88c9513f7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BCF28A21-6306-11EF-8FC1-C2666C5B6023} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000b7ba9f9b69f835cd4820a2dac4a9e56f51d596994551ee8fceff4a8f24212a14000000000e80000000020000200000002177db6511333161f5f89efb9a9fde72098816b5313b6f72183f04fa1a7fb66f2000000045a48cb7686bc902131d3b442b708f957d559c76a7a84babd7a20e9cbe166faf40000000167c04549f758df41bb512e068ad2b0b521544dae5781503254bf2923b0d758ec261c2101621fb78c37dc41a505ab7d471776eff93b395f712cc363daa31a0e6 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430768474" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2840 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2840 iexplore.exe 2840 iexplore.exe 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2784 2840 iexplore.exe 30 PID 2840 wrote to memory of 2784 2840 iexplore.exe 30 PID 2840 wrote to memory of 2784 2840 iexplore.exe 30 PID 2840 wrote to memory of 2784 2840 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c13774a3a6396c89b8b42931fb904700_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2840 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57df81b0b29807a25a4de6de881242c93
SHA186ee7614965f8d653c124fc5f6d3c121a9b6440a
SHA25689cdb64d9dd933950d175f91f39f27c2fed6eb29127f48dedd68574167408c3d
SHA512b8f235ce30f31109c7b133d44af1209409d645dd53d4057b566f79de4da16558e55412a44f0fd0cd8933a6f8eb2bf869a191186b54790f2392f8c18463c84594
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53d040e6c437fe1b49dd2b03e81324315
SHA1f4a3733955b33e97d18519f6b735f62144f164cd
SHA256c384cf0c540d8b77fb4443a8c66052b404ac212af810a30a50d58572c14dd4b1
SHA5127439754a46f640edb25fa4bab008bcf1bba93fcd2e1951a0a9d72d605574c48b187fffd6c2e30cfcb1b39456faa7d6787e9ee8d8b9bc77151be6742f502389ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50b374b8f3a681818bc0681311cd5b6c7
SHA1dc6318a0bf826458e35acb86450e436425ffce6f
SHA2561a7a485396d1094146614c26d276dbb8c62bee679f9ecb0123b3e3f9d9397731
SHA5122be78437a78792a457d466ba4e0dfc0cfcfc7fa2c316fb9aefd23f8ad7a369d1b885ec2c95525475b3adb634bc87861ed7d0f27c3a0b616670a05c4f212c2e43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD543ef6ac204899d750dd6501ec7f0fce1
SHA1a1306cdd51dbc76bd6630e3d1b21a190e8f067a7
SHA256b83ab16625b8abf6bb691bf7813f269d3e1d7b58cec7f79313e935301d245ffe
SHA512c45847dcdf324e963497eb069e2b8e292a5a45db546d2b26ce2ce89c1b562d56986ca3ab676aaf3a7405c71bc63e56dbd9969eed062ebaa771559417766daecf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57543b42b670219535ce2741683f82595
SHA1f3f9f7eff122dc98dcb716e4a9046f2e9f2e04eb
SHA2560b937c3fc5a484d6acf07fbb04ba1fc66a127be3223aa0c2fb3f9c7af49b85a4
SHA5121e9f435a7189ac578d37fe42ed609efce75746ae84c8632833dcaecfd179a8c2b71c53b44300b86a1ef91748f048a5bf7d09badc0b79713f0a8371846bf50629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5991b63db8472d1129efa9e7cea217773
SHA19ed07c473a3b1800b183dfa856b97c95ff95f709
SHA256b59c91ed2de374a37ee175f1c0786530bee74aa5b9793ff045fc7a2977c352b2
SHA5128442527dac9e9fca56174133e698b7494d2b609f71125c9ff964e14d9817fe4d832d17b91bd8f882f00af0e744d5f7304e7ebf5e8173864fdb881a9b71b34571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58f152b8b5d649fc47d1569254534ee8f
SHA1e27f03b592848af8dc5e5e2c113bce56e279e85d
SHA256eb1496f0ad1d1f419be376b0b387f9ddbdc10e78009734a571ec48c17ac065aa
SHA5121d93d27b2f4c22624bb456183764a7324964f040ea5d5a1e3be1b233e2ab6f35f1eca1e1cf02142323d33e657cd9375d302bb412fa19a00b15173d878682c270
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59c4ad11c3cceebeb4a5ea692084c6ed3
SHA12d9954edd6e0132c8d330dfe0516f488a485bbfa
SHA256addad4b27b382d494118881b49bcbbed481a9919be1dc21c3a540a65750c883c
SHA512df6f2aeeaf06a2d6adc2e3012310279d114fe376ed39e66f18dd5f9e96705f550cb7382d971a46c946d1296b6f39f0122473db59d70817951fddd533385c976b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5695cebfe810b1f44d178dbfd3a359cfb
SHA116dfc9d833d3c9c6c4f28c54228159a358e0275b
SHA2568f3ecc03edb4c3004df731d72d4174b59d9b6ec2164d8a912f634aced70d3891
SHA5122a613a1051c16bbeeef1dcf7740eebb57afdbb9251a83c51aa393fb1ef45fce8326f7410a850303f22237a000cd2c2262d15e0317a083c889e3b8bb110a24373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55769c73c8631c9c3bad6afb0d2380f5a
SHA159652ab8815abec59462f6e5c11bc89b7b08c857
SHA256b41628585bd9cb87a8b24c322999d6c2d885e3a2f7a029ab21c210160f700625
SHA512a34d5267021cb94aa471aab14a713ac45333d60c6db4bfdbcfca95337112f4d5427b51ee1c8bb456a0496df06b54ab2a56e12d614c370f3e7369ad08b1740b4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD577de744630f432c362471c089f95afdd
SHA17ed714fe4835f0e723060faf56e7167e83a3bebf
SHA25652c96126f2d3aaf3acf8db27298c60e32e35a9c4eb9ac8696945532557fb26cf
SHA5120dc845033d3724d5d18631cd4215fe132c2c6f0c94097d0067691312b74c4bfe5759a733feac716904582f7beaa46e1de387b75fa757965f522b5c1604d5b85e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5704e121b06d7aa8bf42dc4b67b0ffbde
SHA10f34d68bc21f142c223624eade5e53de600d4782
SHA256676e5ad8bbea258e9fa742771a90e0899519defdb4e22f158e06583c9ff42000
SHA512402e4903c95572be7f586c1d162bfb8768e76af68a2b59dae715085c1a940ea636d2e7dab7f250cdb4ade18e32175bcd9797bca76a0150f3625e0c7fc2e77413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f6cd326cd7d51ad87146d620b88cf566
SHA16bc0ef19630a6701257aeaf472a9e59f3702a6b3
SHA2566f1b1d6038af9e0c16b6f7f9619addef1f9a3292dcfc41b5ee6f06347905658d
SHA5120f34831bc26f4824fbe253fb78aa67e2f597b0711c3a5d723c7b0aa65441e6da2f002752b465393b892ea0b7ec48043c5c4327695cdbfb945123f6974be7845a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f3b1f2273cecdbb001ec59480e3b63af
SHA1f016b14e6ff3f35c7e894ada56f919e4ba9499db
SHA25661e9ce7a39062b96fbd35343c8688d69bd22d20830be49923c87423e3af5ab87
SHA512a41bcf93a73d9853429b354710378cda0f4e7ddf415460c45361c463c4fc2d5e78eae7a50e8c94f6b88b3bb6808f74e194fd525ae7271f3eda5cd69a7d8cc3e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fd6ea2ba44b00f368af6b5b6b7683b47
SHA1c97eb4b3deb0f5ddd27d5d04f574e2302fd9afb7
SHA256d58a677bb5b25340c7312963c8586c278aa94c0839cefc5ad9af51540f21cf07
SHA512c27a65b73e90e276b6dc66e59821d45932e54bef026273e7560b8f1c69880eff9e80c8632e63de89546c3d0e03a8dfd2404436c24d48640f664e070382989478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52af4b9599f9dafdd41c15856851e70df
SHA1105999ade1a47077f70eb44af95467539b9e3b35
SHA256060f3fee12b5f27fe8a99c795964fbbcc3010cff5cf92c4b090a203650aa9492
SHA512619356544d2a92170eb1f7af1833749c867b45afff5521e9eecb1b385929ae32ab724b8a10f6ccd3a66736576060819b65b3d5799dfaef7db9b152786ae29758
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52305af5bd33829d54caf1051474781cb
SHA1a972fe2161127cde952627461b6c2e8eafa24b23
SHA256fb21854544d642ac7b0286c12779b3b4b8aa63ae2d2c518ca9c610ec9ec37710
SHA5128aab0f35231b2a1a92611867ba0ad414266a5d0dfd7a091a5ba45d62faeeab4d2df01e18bba3b362dea0f5da4193833c69ab72458f12be979f60b5d6ec1e9243
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e47874a7fe6bc9523d6dba4e4709455f
SHA146f61c3d1aa21fced39674082fd5dc908cee3773
SHA25628a7f6dd98083a0e87f2ec2076a1922f57617fc9e01f419eff3da1fcec57d6aa
SHA51278b6eadf37b8502c495b79c6266431392c07682a5e10ed33872334efd596a8cde48adbf7ee05a01ce68eff6c4d9a6aebae2075c4fb2c9a69ec5b03f4c80660a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dd6a12b71c39f18f69dd7be2fa3bd860
SHA19eb64f4769576a830f2a2f7adcf3a16bf7ffac49
SHA256c02c93baf47e150ab094099e278da1f304f5682fb864f77ce34c9674882ff66a
SHA512da7ef15b4e8a592d170daa6eb5b73ae87b81a76e5da8f4a644697053228259411b7cf97c3a9d1a5ad574e105cd19de1521d7066ab24ade60ffd227f671c2e145
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b