Analysis
-
max time kernel
138s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 17:50
Static task
static1
Behavioral task
behavioral1
Sample
c14244f072a3a89d27a04b371e0fb5c6_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c14244f072a3a89d27a04b371e0fb5c6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c14244f072a3a89d27a04b371e0fb5c6_JaffaCakes118.html
-
Size
151KB
-
MD5
c14244f072a3a89d27a04b371e0fb5c6
-
SHA1
96bccc3ec57e8be43b2bc33ab5324f86b704ca99
-
SHA256
f7a3907cb2e96dddd654b004138f39e5eb60a81f6d089fc773b38ac8deb4092f
-
SHA512
7731d8071fdb5bfcd1d3411c95b8f2f02bda29ab4c6b40c6f3cc7d6847556004d87a2ccdb65ed7cf03d7bbf3c2abee24555750ae61d1c01056f10a9a05bcb8b4
-
SSDEEP
1536:ShsheBsZHlTOjh3KyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:ShsdZojsyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7436A601-630A-11EF-A850-F62146527E3B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430770072" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0e1774a17f7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf71000000000200000000001066000000010000200000000ea18edaf7db2071bf35793ce4cbb7ccde32d686434775aee29b6acc8814f6c7000000000e8000000002000020000000488f2ce794e36e877d5b04dafc10c0c08bf20f5b103d99bd1b0c83757a05f9ee200000007a2c135e73a2372b62b55a955f347b22c12410c7c38d84965c7d49cd4bdd5b84400000007963845849e4ab11793c4e27697dc07e29116db40fc7d8da41ae0f79855623fa42ca9a13f17622c3b36e734d6796ccb65a59703a88cdff946249d932c968e373 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2844 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 860 iexplore.exe 860 iexplore.exe 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 860 wrote to memory of 2844 860 iexplore.exe 29 PID 860 wrote to memory of 2844 860 iexplore.exe 29 PID 860 wrote to memory of 2844 860 iexplore.exe 29 PID 860 wrote to memory of 2844 860 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c14244f072a3a89d27a04b371e0fb5c6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:860 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b395650839b80f58713a2762d9f49fa
SHA1125010e8aa43ce29ecd7170f5f336dc8ea5e0fe4
SHA25604134928aeb2adfb8a9f2c2e8c3e590db5d465cc1456af218a2a66055dcb4bde
SHA512d506e2ee9315fc250bd7540f46c27865a1ce2e52daac5a8c74de6c3b095f7da6a2ced9d9d3188ece0fd3e50beda42f525e242d6942c482b443665d8d9735f428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512bc76efa0614ab4d6ae366fcdd3e042
SHA141de32b42fab66c8f4343376da48ce78c89d051b
SHA25688f4e5c739cb29e1a3843b92dc6e8938396199ffeeaafbcdc85a8734cad6cdce
SHA51202f1929c9d862d201a887294fe8f299a8ab8c8680a9ce3daa837b8a7dd3e47edf757af01fc6924c3537e7b8870a5d159755c9422a47b3381ff93ee1c946c1040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1a5d21d21f9705283a1c31194a18e35
SHA1310dad815a15234e88cb184e811b39fba3eafce1
SHA25655c5b88c0d0ad480bd73336c5423a9785db00ed1754f7e9f410dd6bf8a61df5e
SHA51240fd8e48d0040e16cba5a8b825672860a13a3fa5a10f4caf77d30fc0f31f49fbd758339348815f43ca0a45c9d3ebc955256f488e2edf5e1cfe638b4d90514cc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c592ff38d0acba21110a366a80282ad
SHA1ca65fa1bc82c93198a195b46e903439cd8fd82eb
SHA256588f001e28b816f0316fd4d01d9143327508d1a05b08ba9c96544c60692f0146
SHA512bdd813d5e705d004da1d2552af2f304d8acec1278f5a05b7244ea548c708727e5486bf4d5a637ca18d40d7ce0bc1548aa562e14a7cea4ecfb5c364c2a43319c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fd4c9449aae814ba783b70889b5fcbb
SHA1a4b72103079b79f2f1e45c402bf8d54b6d8f8aff
SHA2569cf54a0fc97728859352948bbdae6d14baeaa03bd19fe76736650a533d6db3dd
SHA512a19fa270b0518e8a0ed152ad859ae763193ba722089d46466dd66896e0649bf6fd3f83e6d1b085469c579f33ba7388e7d2d0fc9d450c610ac8fdf60fae70973e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa334acd3bd322597fa0e3e423ab26c3
SHA11af6f70fce79f4a147c33ccd734930ea754ec289
SHA256cf1a761618cce994006ac1e18dfdd9ac621a24f237881003029dcea1738b10ee
SHA5120f56390744816e0b9c41850d285dc6c4e0671915b850f0ad1e362b45e1c42a9dbbe6b08326cef46e6431189bf5f8daf389a8c4e92dbc82c629bbacf3e8ba1dff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beba5badc9bd618af14cd2c8bdf9005e
SHA19ebede60850ddc4adf18664f7a7f386d88afbc44
SHA256d2ea2b87955eddfffab62cdb7e241c631382b3b41f478824df78c79501bb6930
SHA5126e089603c48269baa38e3dddb7785e886f3729f0d866b473d6bc40937e5c3409eab69edb619bd14d0695d27eddcd120012703851530fca2d058f5e9d4ed7fe79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfa062c60dd950530bdadf1ad95218ef
SHA167176f51ddcda466b7a5e8fdda6a51f2600c75b4
SHA256bb6ae98fd9b2641579bfc4e5860ef7b0eba4e772d7ab295cedf5b8679bc200ce
SHA51265c8c31d1653e5e6496860b461eb00ef22093810570b549dbb04165edd7bb72d9f795472a55327402acab4fe05ffff606e881e87e4f92a19658ff07f116777d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503c9afa0433b5a0b4648e3cdb436ac2c
SHA1714ad1ac66b05408ae4c7b457e638afc96bc82ca
SHA256371d63eddd8ba96729c16a2840252951f70a648c93e5cc50a7f6a3bad5a07226
SHA512b020b0828d2a5f014131ca7ced0c8ef920fab4cd85d160ae9aad153b10161c1640f58f838683ba6346b34fafb44e55646b9d1783ccf5fb46a1a37fe7269d9517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b44cf9f52f607729801d4226fab1c9ab
SHA1e97655eefd9b7781b155d7f38b50c5fa50368b12
SHA2562aabd73fa9452e76e1114d2663c2d540806883830dd2b26080448333e218d5c3
SHA5128010332ad5096f4b222b6cddded4cae367327faeb55c5e1783cda2ed8f13be3a9ef82a57ed8907472498a19f8cc8a78ad4b641cfeebb657d550faac0d82e039c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c30247bfaa2e14340b4c8cbf55320b2d
SHA1a6fb7fed549c3a34e00d4875c1ce717ac70fdede
SHA256001104da7deddc0e35a5a9fa562a4351d7d3649fe99d66e87acc3679ca1026d4
SHA5126db412e41cf707cd8c0724ee6524e5e3880e03854ff22243f301045645dbf81f57e18d6f6eff21d069ab5adf8b3f747c2aadfae154febc82a7a2349a5be26fa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565d26bde48c438322fdc234a242e9a0a
SHA1a925a9d34311c17f3794607163599096c3a2dba0
SHA25621aa6413c868ace6a075cda5c1d8ad14b83d3a7e2a7cc72331388c901b1d8ad9
SHA512802eacb58942921d015df707c26fd25c5b1d1533ddb9ca1043ba2f3392cc31b15f0d7640255133f932595ccd42c76591dfd37ccb0a0ca239c3bd36fe8cb3ebc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f38b981228505ff33046414e8b5110f3
SHA1ba5adbf1966a3cf547a72bbbe78c1da7005de3f8
SHA256123c9551f9ea9948d8dfaeccc8948676d288e0494df8f781f6523d606a74752f
SHA512f7089242165460d5efa77b278aea11b298751d58c1ae91d0ea1a509f3629b69a4f190d3cf6885a4fc639c98dbdddd5dab81522f5292129dfa8e426c5f7dde13a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537a7920455b27fedf7a6eda4cfa56c8a
SHA1d359dd9bdcce7393ab6624f378580b02075bf9bb
SHA25672800c5e1d460a1cda1c664cc2fcd87c7e4188083e0397c38323a5d5405dac00
SHA51295b874caa19970dd4970723814db410099bb49445e57dd02a7d75d02a6114d911ed9459e7873885971c23e3b92af5d63957cee1cddfd920ce0880235e8801e33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2ee5a21b70f42def7c438583b0b1308
SHA1421faa6405a26e15a0e7ee4df02971e3d84d8af5
SHA256eb3783f281c74a53abb3785b739459fff85ec35239c60203371908439b67081b
SHA512f26c8ac68957456ea8c3204478b166bfecb49d463d175a7417d9f16cc6abd1c9543ec6abaf0fdf56f0efdf7adf61b111a3c0d8a9ab04d61dee0087c60a2725ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58614fd2063b0965758b64366b52ea38e
SHA1ceecdf46c846faff3196115fdba6ab7945d2e6db
SHA256421fb7c9df4f89e3cbc34942c20cd9b2616083b142d3598b088dac742954d35e
SHA512c58c6453ecdc54cfce93f9f8924d6a67dae9813c45933e4265ee46168af9a98ea46bcf0b9af6136019bb8a66bda94f4d8d90dbdf1bdd17e049ee874876d5c4c3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b