Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 17:50
Static task
static1
Behavioral task
behavioral1
Sample
c142a84ef905285f7d829257abf95e9a_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c142a84ef905285f7d829257abf95e9a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c142a84ef905285f7d829257abf95e9a_JaffaCakes118.html
-
Size
139KB
-
MD5
c142a84ef905285f7d829257abf95e9a
-
SHA1
dde1c84c1838ffe0e5569bdc3611b3f2730829f8
-
SHA256
c730d870bf3e983b9dd33e14a3e62f5e715c71c303121938c6e1a91d55cf33ff
-
SHA512
5e182d6d5694519f66c5cd4c9b8a070e966fbf0ef964a1267641e7c88e8e0e64f08037906b44bdf77608a19692a0fe4f5389165453008708fca3a66012b499df
-
SSDEEP
1536:SqkvNI6d1lQrFyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:SqkkyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430770127" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f0000000002000000000010660000000100002000000098ac2f82d7648b4563ca284f69e5b9a8c08586af79e72eb29eb615395b83e9d5000000000e8000000002000020000000d8ab9fb6a3a80144945b8adb260d8e92f3fd7f15b17bdc208ad543a4d4b7195d20000000f5aeaf4f821ab1568fcfd3c882ce57ae510df723214f8b64d75ab824c7bba3b140000000fa6c74e6080201abd83d1253fed1cf8722f8c2d860da2cb3501c72a84b8de8a9620a00d43160537725e56196a8f688e036b1d33e09fc9fbf10bb14f866d213b8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{963940A1-630A-11EF-9403-6ED7993C8D5B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0d5787617f7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 264 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1460 iexplore.exe 1460 iexplore.exe 264 IEXPLORE.EXE 264 IEXPLORE.EXE 264 IEXPLORE.EXE 264 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1460 wrote to memory of 264 1460 iexplore.exe 30 PID 1460 wrote to memory of 264 1460 iexplore.exe 30 PID 1460 wrote to memory of 264 1460 iexplore.exe 30 PID 1460 wrote to memory of 264 1460 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c142a84ef905285f7d829257abf95e9a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1460 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5ae4efdf27c1a54254370a771b86c8747
SHA1091ff573adb365cf8839b5ad3de505c65b648cc8
SHA2566964df12a6c9c55d60a91d20890c39c0b4ae6696ab1cdba5b9edf387fd8bb771
SHA5129c99c94bdc67f6b26a07fef6fba55903576483f079f8a7c373803001ddf072766c9ccb2884c13fc45639db42b4197a3b82c27a41423e8177c5fba1163c3335e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8550d962537299a0b416d74b1132549
SHA1fa1708071ffe3175b24959ac5141b12ff60bff04
SHA25651cef74585ab73c060d168e3b6f61faab47d9c00f59ca849efdf0edef1f1f9b9
SHA512fc5b0b537277441ec6bc61468b4406dca0e9d3860add28e99eee81e8f015b7f8586868ad96a8af0953967df6bac462844502c770b818686a4f0c472925e525fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fbeb9e785a7c6109d16ed8303cf966d
SHA111c4120ae2e7626483730ba8657d223970e7db9f
SHA256174d45181525286eda750a58671dc95159f37fe0b86b0c1d7abbdf88fa78a8b3
SHA512cdf610c800360c9c216dc2b350ab29220911049756bb5b83dbe30fd41a450a810ffd1f806f01187041e80bb97dc1276e0d9ad9fe554d154fbba5303377a3b53a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac925a6d3b2ba5725f00ea7416fb140a
SHA1f2ea375435c1774a5d88157d08eac7166ed676e0
SHA256e2d7ece498775a0502ccb9d2b7c5246c37c7276491fcf49946e6aa252ff25ad3
SHA512942fa44403c6ab72b07c1b4522955feb578ecdbd709c63ea593ff8f7258404c39996ad0df66be1b1bb24aef85ddfbe53009c166a5d1ec8185491a4b57668edc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587a7bcb05b119fa144d08f9fe3a8355f
SHA1aa8856786fd6432311956f4407c6c2a92a4763bc
SHA256b32c6018dc8b1d09c75f7faea824d28a9e1f1978c39aeb0c683024ba42fcb9d9
SHA512c30b7db89de58dc102a980c91895a8d761d965e5ef7218c6a9bc17bc981c197018f52ecee0944301651e58c3885c89a29710160fd341c59189cbb0c078edaec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e2af516ca6029c4727931c53a69806e
SHA1ddab3ad55b9bbe1cae14ed4441106fc158584540
SHA256da1d586a44ea2481dd4ce2f0853b8c9d973f0a36a7c0cbcedf5c5e30a00132d5
SHA5125bb7c959600a0958b3d8d04cc823c1e7f6ec5a06a8952dd2d6b8b51d1ae32b69a1950766b646aa44db304416b31385d11c3c1e5d6235b6adad5724d3fe667cae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edac02655e6da0afa599eb5a421480f5
SHA1a8a409ff931a21cc18a7044796e77097e4805320
SHA256bf2b4f725ff366f8be3d62bf342c2196c4fb36129b00743f1774dc87043df206
SHA512e98c3b9a11ab1e6156744465e6f1680fed1e17729e92c293d8714979b7ef71aa173c389cc8b7da06a245fbd3a54b06e7486859e1e84bf1d1c02ce03e4c1e5136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fa748f1cb0713c47a6d900422fbbf3e
SHA1221c7e8ef7c76bd6ef29f4db9c46e2ec2a546dbc
SHA2561d2d85eb250b7273983bc3d68f85a845ca7740777cd4a50fcf6f6ba3a574074c
SHA512ff918f59509a34264320f184c26e100d8c96d157a3e5faa238c4b1477103d0a1d20c7a95e63ea26ce093105417246c528390eee065be86d6b5c2343e616aecc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a47821dcd26f62f44ef041f9766c34f4
SHA1bd4219683b8a01b6180882a4df9a5f0b683b7459
SHA256baa8f602573b664f48068d2fa730c707dd2831689ad3ad2e0368fdd0355a1678
SHA5121049bd5a676f8d2330d06da46a4abf56f3ce507df247a18f4a4a5cbf0b0b662ee21f25b8cc156e3ad03dcd622f31ee361ae938de4270484149f85bca77291f67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593c678c45081d7edcd2a26ad9a4f27e9
SHA13fa007daca53fc4b6056dcae2c4f4f28087a5daf
SHA256157cf061a5cd3e707f814d77e3ec7c1516d5df2ef64c1d46a60964bc6d14d6fb
SHA512bd862a0b3eb70f27310a39811cc555f1b59ef394b3a3fcba573fde5893f7d20550fec483a4e8beb2e9075310c3e074da0d2ec1685f80798c83a39cdf5059dfdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b26c0a56e524dc7bc136666dd834d22
SHA1727099001138573bad6833f1f38fc7797e5e71cd
SHA2560cd312fcd0b8d4368b7c5a00f3c65b6e8a43c0f30f4fda09bb2043f51c7b07cf
SHA5120369d3c41377da8a332d88209f2d864c16079c61246cac6593c3d749ac89c748c8f0b4f2d41ca0a30ef4e7052f162cbb949f556de5efe81abd02a3d91fa09ea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5170ab083524b6f3da61ec21b9f7999e6
SHA1419c0ffd8c427d433b8d9a0afcd4f90159e2857f
SHA256c3a90bfe07df3f2ba821bc6be2be9d4d69be1a3be3cd1330dab4a6f2a0c3c4d2
SHA512f564b88c3d58855e49cc5888a95d89e0e8bc0977ba3b5109d738f0ca1135c55898a4b90423b51c3a8be8df4dcd14ae15507e25e466df89153da163fbd8867752
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54df3a37b558552f1661140b9d0960c95
SHA134bdc30ef97e7e0dfe504b362d3416b47618f04e
SHA2568ee5a66721b129c4076804a16752096196b07fd931b7c0c6b4ce191bb8169b84
SHA51250b2b1a222253b1e12090c46533862f195bdc2f6fbcc0e54d6d2e77928177a6e375ebece5f5c65d9325ac3bd94028c434260369e7c7837c41294892b820c443f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5375474efad653314f3c013323b60b211
SHA1f0bfa4888352b1961e7f53ee79dc0d1a1aee92de
SHA25634f1432b52e8fabbe6bba08352b0feb56c6b3ae0e70bb118ea3f4bcc1c603575
SHA5128645f6346ceb02e141e317d557c4e23b1cfe7ff0b561e414e85fa7e61e75d5065a7a04fb731c75f10e71ccc252054b601604d897da169ad1ddc7d29af6f96bb2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M7GT0RRO\domain_profile[1].htm
Filesize6KB
MD506487354b536ca70d945284c4a46a520
SHA118b1c556dff90fc4d99bd888c0985ba9f1a3e1c4
SHA2563a3aa19c7aec6fc5d0a7b20527a8b026c0e77604a779d2c67c3aa7a247e8f3dc
SHA512f5a83bd184c865a70836b8c338e8656a817f204679fc477e8800468f0cd9c40275710c33816ebf04bc096762dce92f88a2f819f599d1b9c0dae0f4137609e637
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b