Analysis
-
max time kernel
134s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 17:55
Static task
static1
Behavioral task
behavioral1
Sample
c1443f950aa213157b9fecabb2408976_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c1443f950aa213157b9fecabb2408976_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c1443f950aa213157b9fecabb2408976_JaffaCakes118.html
-
Size
57KB
-
MD5
c1443f950aa213157b9fecabb2408976
-
SHA1
8e3065acd3242ee88546aada324dabcb236d84ab
-
SHA256
9841da94be0110dd424f93b1ba25624dbfea4c8ec9aa785ce87c073b915da8b5
-
SHA512
fd816fcfb22ed84c9d142876a7bfca3674262725ea671b149b04fd02bc9fe9d89d74f5646d974f2bb89738b6eaafaad1ce3c8c2bf1b5d292a180008e7f8dbb6a
-
SSDEEP
1536:ijEQvK8OPHdsAso2vgyHJv0owbd6zKD6CDK2RVrol1wpDK2RVy:ijnOPHdsY2vgyHJutDK2RVrol1wpDK2m
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 900cbb1b18f7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000b4ff5f1645407a8ed232183ed98b73652db93ad2495c7658606858a55cdceb58000000000e8000000002000020000000ea1e3e03168990f7e7f8dc22fd7f7b08a3a11b856f4a66c848ad38418c6f3021200000004382eb2282abf89df2917b2d96021d2b52a3284d6ee9fb5d6d72fd8789f3e0b540000000267269e76111e474c6c275800316197e513e771ec58f195e287e2b60861ba68ed3a83b624b06b80d60f7af4bb07f664998b95600261e111daa28f8ff0685a6ad iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4310FE81-630B-11EF-A446-DA486F9A72E4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430770418" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1596 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1596 iexplore.exe 1596 iexplore.exe 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1596 wrote to memory of 2444 1596 iexplore.exe 30 PID 1596 wrote to memory of 2444 1596 iexplore.exe 30 PID 1596 wrote to memory of 2444 1596 iexplore.exe 30 PID 1596 wrote to memory of 2444 1596 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c1443f950aa213157b9fecabb2408976_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1596 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5527ac5a25a36200cad17e813e3e22533
SHA193a42fe8c75b5b3994b02ed964aa4ac6c5d82367
SHA256f5547249c2bb85106dbee267f995a6d9d32afa525c25d325bc8eff7fac5498ae
SHA5129dd82ce99438d981e8f46ba8076aba7e610df27858bc01c9b462732381af61c5db48549610c52ec813d5cd09b1db626dace4c20f9a65b033d255138e72b6ce77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53118683d29f7c9c9749e5a400ff47218
SHA1af1427fc2a5016a68b7c7b10f26495f83034cf20
SHA2565808b7e1b1544beafc28a4f9bde9f94929c907eca159b94ec3eefdc1e26313fb
SHA512dacde1f2940dc15a66d506716fd898075fdc67c4b5fd0f654701e7b69bbb28b083686d798368fc9cd3cb1410dc359e29229f5cb01b4c1948eff3ca9872726ec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516f97bb8d0df93988822c75a954f45a9
SHA1f89941f42a3521943dba5f526d029156da26762a
SHA2569980851fb7a8261a6e4deeccac3dec1f97c85c8267f8879eb8e1c8c05f1a70a2
SHA512ec4decc3064686a34a41d47379c38c88817a0668dcb244d7371e1a5a59136da7c10614d906f4f00d2bd2bfd4e3842909d5a9f59a2f5c8efba71c841666e47e3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5499cf6b44fad2e1e05c9f96c7695a292
SHA13dd2d2b6889931aa3f8e93e299d3239f6553f8c4
SHA2563a75c870ba9985885a7e4c3c9f538751607129a836348329d20889d5fa61ba0e
SHA5120067ea43d62f1fbc39c55233f99c42e6c014fc38692bf077dcb25ee983f04a5a8b2bd664a3be939652aa70c636ac1e55770edbd6daf538433ccdfdf3773f99c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c65300d27336d707813b7273acb7f8d
SHA12b4eccf85d3ffc55af57d8f0f600094635f356ed
SHA256d13c574c4a9eac2ff71ea45d01948adf32126ea7455e9ff4b07f7fc1e14ecbf2
SHA5126f448aa041acf3cdb3262f0c43b9a59241c7a48cd1487f2177b5d2418d5b6832c0a1fc860be2cc32c3368f603e293c11e52ea0b5439ff2677b4ac06060e54dd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514a6898d5b11960579804979a88e674a
SHA1824a10c7996d2e33becc7e2a4f51c76396725d29
SHA256c301a4f1afed547e960cc8d5a250778cef6b079d1da22e785a329fb5d6ee9332
SHA512c670f2e5a407621b92bebfc7b16556cc34cc7e9a500744fd5429600c64151397eaa9e687baad7f38ea4e80fb5398354e73f3f8547533a48089307fe42633c6e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc0d8db72fdc3c95fcbb6a3439e1ec2a
SHA11da24ab35cd40e08041cb56044c2da2d74cf95e9
SHA256367c4b90aebf27f9af25862d34051be053b416dacf926e5b098779f517b1c281
SHA51239eb4f1100a9746a6f1d444ac797245978771e431cc9efc1aa2465449af6def93eb1e11e48403c62415c64b10bc4005a27b4c344eb8f44598566129bea3367f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541c5376837b88657c0f1b303cfd6ecd7
SHA1fd80f6ffebe35dbbad9ef646c4c02705db3a1d6b
SHA256cfd57033b4a8065a6dbf8256581f114105a47e8bfa57ed78f1a74179fd8ebf77
SHA512d1443686d4cd41f359f91d2ac9d2a721f64e4942d3d174d6f1e17b4bba7182bb8c374313484c2fe4a548f63ff4876961ef318ce86477674086cc65be4b8d21cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5764bf31d75b46b8a4e9d4d02d977be40
SHA1ab33ba648c55c2c53eb6164e83296f73069a159d
SHA256772916514cdfe9c69350d39d807f097fcb9a0764939c3a495bdffaa7170912c4
SHA5127b598ace7cc5ed0a3a3df1723435cb0535c78ea6077cc03b511f6297281649905014f5670d906c3c46d3be7291dc48053b7d2a179e3dddf030731ef99585fef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a507552861d962b81ca064f3cbffa950
SHA1f15bac18619a994c33c6364a5b55507a4d1be455
SHA256c52307405e9ed7a98a3af81d49a49b64b0774572718585ae18620344a49c286a
SHA5127f1a204e85b0b0038a834dbad25c19289d0a7ef574a852fcf09bf634d9393ee4e847c37b6106c4911706fb10f62237542ddf8c14ebfb16e89a073339969c11f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f1cfed31e7238f3fbaa2f0546a3cdc9
SHA10c661f3228aa4869d310771e73bea862b9b2b051
SHA256e50a7efaea53b9df584fb096e6b27326d4e414d3fb657f13b5ec0aa9fbb1ec98
SHA512ce782a658eddb8e61d5070b65d3c3ab02a37a516a076de8a2e3f04728cfca1b31681b539fe227c75a158f418a1b50221046f545815c638a33094c5d852ea2a7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1a736c42ea9d07d496cf01541cede94
SHA184ab755a731234bf5b066259ad497b7888ee45d9
SHA256b24b8f8dcfa67417f8b83bf12cf97c4e9fdbb99e4230d7d48af4702060588bc0
SHA5126e907e1be4216652942c6b3a05f2a6e0236ac91cfbc6d9d125f86d84a028a58fb5b6f085bb5b9660a533a4bd5fa953f3f40262854771601a2432f63bc7457a04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559539639a095e27d77b4363d723010f8
SHA143f4228ee521688e322a68ee35adfeeb266e75b0
SHA256ccecf3cd5c973312e5b77d151c19c66420fa2f7e7d7ae069507838d73b1252b1
SHA51249cdde296e254216362b4514fb2af264891349aa91303bd8a19f6acb3bd26f1f8a6fd65b02c090cd7c3b390721d775c205b0deb262a2240104d3f5a27dcd2455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a084ca835e0338e7e499ff314446c67
SHA11b3892542b4effbaddeb32c347e7c2c6ecc09348
SHA256ce019651c8effa7cdec790e6b1b4411549f0529707ac5a3b87442de3e2fb00d4
SHA51239ca69ea47cf08cbd48cbbd960391dfb45bc7dc6ec2454595a92efa7e5913edadcebf444fbb2376e91108fbb66f13e391bb60ef846f51084a4260aa86ddc8ad7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56673b3f8433f346793957a7e80a20854
SHA14ea44a7da7f00c77b73415b839d08206eaaa2379
SHA256955939419a627a27330e1db19eda4c0015d1824f79ff5c94d2bc6c752d52b28a
SHA5123e119994ea5ac2d376d41102814313b181e470a6a4aca7b7e5af071bff4c5cf52bb6df157560066ea70e8e6d7108b0a0394b8811accf4974a1d0e11c2823ac4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5696cec5393d7a131b5bd879093e11b77
SHA1d63f173f69e39d18263d4d6c40416d87396b65b9
SHA256c6cfc08bbd01a75d2423029019e8ca005ab27114926779c049ce62834a4d9237
SHA512ba4fb7d1d6faa584d908d984feddca6352fbad4e9402bf8c610d672aed00ceb983884db51025710be1ba2f8e853cc18629d644e7d6300117ec248b9aab408862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD52b3dcab259d7a22fd956e2cdd4d70e8b
SHA1d889e9168f2837d13e58c0fb075774834a5b34ef
SHA256e7fbfe36c819fa483f29f3d8cb686629ba95685ea8a8d2cc272d2508bd516470
SHA51228170204e1bc51a55e4f4db51349e283785686d2ba6bb69fa16ccfd64eabb16a4caec78fe7ebf96db0af43abfadc6ba97a3c8d54c3e40726ca9b3c51874a702e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M7GT0RRO\f[1].txt
Filesize39KB
MD5e4bf7412481d9f54b6819b519c46995a
SHA1cfae1bb7e881bda936701c00b8c429c4f51d112b
SHA25654d4a01f2955f252240d780cc061c06e71adcf0d7302526070286afdd6aa8dc5
SHA512425ffea7a1db31aa0b35690f1cf84563a8f4432e07c33aa5dc84b976689ed1ce8027f4e644a4650070e68212091cc6feef736e6bdfb240f38b9c89217983422d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b