Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 18:34
Static task
static1
Behavioral task
behavioral1
Sample
c153fc782cfb35fa3ad51be3f70d93f8_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c153fc782cfb35fa3ad51be3f70d93f8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c153fc782cfb35fa3ad51be3f70d93f8_JaffaCakes118.html
-
Size
4KB
-
MD5
c153fc782cfb35fa3ad51be3f70d93f8
-
SHA1
65f16d2fb962749272306ae9baecc422f059d08a
-
SHA256
69335bc8fdfedf190818a6e470ac1d0560268d50a43e2bbd1cbda6a870271a67
-
SHA512
6e99cc76153af6f1e4289b281ff4f95e7d641627079496bb73e6f09d0eb1c701a8ac43a69893d73c16678daa6c6fe84d49cf2fb6540685bee1ab9d8cab79965d
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o7McFaXd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430772758" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000000bc4c222db5bd31b7001dd8e6badf9ce8844d10584db510bca1481537fc73168000000000e80000000020000200000004a8dd9896ebb5c8998eeca77930a102d19215426df476418dcae6d474538fc2f20000000136ba52032fbb65b155e07b0e49e23c30cdd4d12f9eed21f881302908c065f3040000000b755961803d9e88c5c7d0cacbd1f1a3bb9703f1e7155b9b9023289cfce479373dc2a09b5d3f7ec33ac7d97912c7945555c48a2642f45d9c94dbf3187a039db56 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6049e48a1df7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B668D971-6310-11EF-BF23-EE33E2B06AA8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2580 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2580 iexplore.exe 2580 iexplore.exe 696 IEXPLORE.EXE 696 IEXPLORE.EXE 696 IEXPLORE.EXE 696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2580 wrote to memory of 696 2580 iexplore.exe 30 PID 2580 wrote to memory of 696 2580 iexplore.exe 30 PID 2580 wrote to memory of 696 2580 iexplore.exe 30 PID 2580 wrote to memory of 696 2580 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c153fc782cfb35fa3ad51be3f70d93f8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2580 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574994b6c708f7a6990e4ed8ea670fb10
SHA162952641c324feaf211ce48626c89e4a0acef292
SHA2561c33f4d63ff3be715b745945fc4ea70e89d4fbdb9d7644bceba53b5f75c06a5f
SHA5127fe44786d2ef251a61d8f3da4d594c99d166221226325d01c559313bf53b7f0bbe2cff712a2fd66a6199882e36b10be954a56e00b67a1e936487d1b6d6787f6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55949d476e305c43c56475ae6ff57c74a
SHA1c80134d28f8fc8df949106cd3f62e07edf446042
SHA256fb75c734d6306fbd5dec736908b7fe68e1b0b0dc26e5d4e182f6eaff6a69bcad
SHA512a505b676f01dfb66e7b008c5af3e157066ee114892fcde965094ccf93345ce857580356b041d17dd80283ced4519d341a3d9d78c1216312c359d1bcb28d70e62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1e959ff4c2f9a66e51f8c176585660f
SHA149cc4264af232ce00364a1ca4c60404836d28710
SHA2568b66d7b90633d05ab2a62d25fa8c73f60426b10b1f335c2f8bc2b1f74cd3eb47
SHA512562c3cf32254f84fbd4c4a42d5c4a1c3717d1e5a285b75034b81bcab25bb25d7f00f2884b9c8e9d02f7b95c7dd24fc365ffcad2cebb203687dcda8f421becf26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569264517ec43be2bd8c06c2ed2d6a9b8
SHA1701f02d4cbf72eb7e5e3517d0f1a1671c307e7b8
SHA2569dbc28af5cb45624b132daed083ce5e0a6990f0591976c167f6bc1767feccb86
SHA512c64d0d8d95e667cf42d31e4d6224d5dd7ca6e992270c56a22d66152d2928fa80915d32d5e29ef6071f2438f97ede5eb6ab2a9ba221672e315109a9fc2c7fbef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580ecaa18deec8217225d0e5e05b993ec
SHA1908c3efadc4d7d07e9f1e8e41a96fef63cbeae50
SHA2567dbf44fb2d7e615adba1c404f96ad1781e6d904ec818131ab2532cc9c5f25e31
SHA51248f5d1ec4c3f8253001eb93127984c277bd3bf3b6483b6935ebb4038a3c035bf014396bcfd447949f6391b4986d76a72fc7ded59c5024e4423bbda5522a02f11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5054223c98be0bf2712cec37d2c428edc
SHA166f19d20d5881f257173b329d4357741de881b7d
SHA25657b54583a4f7ed5b471e2d1135de41ba2763200332547ea162524c25f8a96b02
SHA51282c14c13f846f5454c24d2aea85a2234fadf011961094a53f20d6652bea3de6caaed8df5c67c8e7338b8479af34689efebce025da03d312cd18d25ba7264b8df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557259d885abfd51b31d8e21cade382cc
SHA1402f76669952829885e8ef39494365b2a71f3ecd
SHA2563b12ea8c1946c35315d56553f5a7ebeecdf6767c768ce92a308c7b16dc8e7996
SHA512fe768066a4134bbae856a344308c0ae1cfaf0661226495e9cc68e2b617245aad843c838293cc0a1569f4d423d0a4fda9b2bf1e97cfc4984cb28d311fd9479666
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b4869cfac771e64cec00993f5499968
SHA15a937321f06b1637e44f430e215f2d393c8c7f2a
SHA256ac175641f715b492ab9d5252634d073d4bda72c98999bcffc0300cf5f8034529
SHA51253230023ebc35d11ed488aed8a2ebb5c09bfaa8943d1d40789f73cd51cf88dabfd3b6750fca8d2acc5fbf2e45407480b6fc1b99fe3979a16c0ffd894442b6954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d35de435890f2d9d2fe88e574a5ad7d9
SHA1c9ff274b62b968c8b052430e6aed5f7644aca61b
SHA256794bf7626398b6ab82b29e068d74efbc4e334f4dbbcaa072e11ddec44f5739c6
SHA51278d7da2fced8522fc008d66d9a448277ad5921921f9dd7cf7431c6a3dc9efcde2f1e12b864269fc8ad80766a4d1b2327d5df6721077698dac392e18ebc3c6940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57165fc0a4814e57f860704ba61a26cd4
SHA1a39396e8f75914c634650444610ad8ce33eda815
SHA256890d19174963341813409fc0a0445ded6b8300a7b2bd995c9ae499ef8923d4d3
SHA51213bb7a37127e41cd89ece06a110f8f70a9accdc8aa9dd0c2aca73a0ec66d85431a606115c5b14f97f32b984f7e3eb63b31df3f70b1f0ec620e88364c0e5c05c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525c3a852e6ecf02a09fa13949022fcf9
SHA192a192e323af431fdae53a402261c54edc447d47
SHA2567b40afd50890a119ed2209a3d0ff1dc2662b014efa27563c3b9488bf1657454a
SHA51245032af7b54f78811f22644914bfba7291cf8a587392a4c7a727f89b1d466b4f7998df0af1242de7a51544a4931f20dd8ec7223d3d6a42deeaf4117d6007c447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569dfa3f4baeaab84e42a2c6bc534c459
SHA1daab2d568ef9e10dc79acaa191c38b68a4247ab0
SHA256479273e238810773c8bab1f6902717a87908358b78f0905b3f95f79cb0c22345
SHA5127b458874d70917cf66baabb4041170aebfa1bbe7d3b80d541ab526560d813d1a6b23da156e4c3ed75722d539f7fd7d674997be00f02558cd57c4cb395138665d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5131a6c19cf2a3a1bc385313e59272703
SHA10334cfb779065dbff1a7e284891f987098d099af
SHA256251febe4b946f4dc42a0d504f4379819cd88b174ca4d22a254ed8534650e0967
SHA5128fa68e8a421f0c5fc2af7357e3a9f27b7640f7bfe5c548110a13f1271f7e7943dfbf8e445e56f5ee3eefb526d3435a7b9032dadcf181e7f2bfaddad71e05fcd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501fb1ef38d695b170857e60d56d63ac6
SHA19d48d8015a93f5d84ec86d8d7674a227a219e401
SHA2561200cb62edd58bf1df73f3d404ebd72073fd631e17db084679866c84c71dd728
SHA512242335e71c9686deaf128a45942185f05a99c497266197d2953b6f21362d0269e9a9162f0c23afc3fb86bd51c2e9bc9580da942202e3128da367623667ae0d14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557c5eff1c615837fd0d22003b8f8c084
SHA1eae81afb91b9589b35893649677dd0a129960fc3
SHA2560f402fc43d50bf24e7ef0684280bacf5127d278d02150478685efc118fda43f4
SHA512ab2e8cb404c93b90688bc3f2c0768e257869b2eae41cfcfbe479bda8d5872a12627d51796b2869e285cd8a64ace85c9ae3b6c181d403147e34b55f9fd4bbb96e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fa945ba6d4e5f821cbe19ec89e440f1
SHA1bccccad5c8acb488e98f59ebcee4a641cc9a623d
SHA256a22c250978b4477c4ec178c8e317377d1e3d9cba202567780a601c815225cefd
SHA512270b7d06cc6205182e0c8eaf06bfe0535633659a2f44f8468ffc78cb0bacfbcfbd9281a75d3a6d0b2d9b2140f9821a84fbafb4db68eb91fc904313e8ffb3a523
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5498cc3a2301fa7ba50a5c428d26966de
SHA17fbb15a873ccf853c8ed7857ff6ef79a9e6c80a7
SHA25614da8591a77b0bb02e5ca6a4c7a3a9a3cb2f4aeaadd2238274f8673612eaafa9
SHA5128676aaa7fcf0dd0402ca8dfbb7f940d342873458e60dcc4adb128ba431b2b84a0ac17d1c4c6fcaaab4f64931f8d98a4646846a5df76ebf337aa40761a759cdf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ea815814cdc6d861421312a31b165e4
SHA1c848b43b223c854a8f289644eef77762b6e67650
SHA2561dce0cca9cdf7142e0ded73a6948edac8123f85e703caf8e7702709b814c0c3d
SHA5129c2f5dbe8e654bb190aac3c6c3f40f3a2cf1314f90f90926d113a4a2b29bcfb23d34839a178ae46754fe65e31503e7a7613599d567d7f5bb4cc32676575bd95f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5211907d3979b4662979219e1052a29e0
SHA188650d943375ea6657c10e62d305c1bfc7d40dc0
SHA2561c6808fae94d22868b0564f3d2bab75aeedaf28b0c61b6bc1e407ca76219f4f1
SHA5129bd5788ec04cbc9ab3f38e754aaa8ce3eb040e36f6020d84a452674e4f863a534b214caa92b54dfaaa69d33bb1610b2b9c8df4933abc44ff8bfd8d0c912784b8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b