Analysis
-
max time kernel
74s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 18:14
Static task
static1
Behavioral task
behavioral1
Sample
c14b7fb794acb7730e7f10c1231a592c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c14b7fb794acb7730e7f10c1231a592c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c14b7fb794acb7730e7f10c1231a592c_JaffaCakes118.html
-
Size
16KB
-
MD5
c14b7fb794acb7730e7f10c1231a592c
-
SHA1
e21f67497b5332420abcfcaab415647dc90b8bd4
-
SHA256
8c7de33f92821e7955b29a5d8d02dbe70e244b95e725fd235bdba7940b9adc3e
-
SHA512
44c10a2bb4f545d6f4cfd39a502f1e645e9627e6e0886df55e897a559361316a1b276e2721368f34a8a4f606b4f719afea97bcafe079455bec375b9ac6d87bce
-
SSDEEP
384:/6oxIsrizri/TiIigiY6QoLtVnICfqxJO8YEW/5Qf:5Iaizri/TiIigiY6QoLtVnI1xZI/af
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000e2c0769096b7eff90a0fd07087cbd607b1b5e486bd6435c383236e26e439f3b0000000000e80000000020000200000006365fd1817f08a423f6f5517fe16154ebf48111ef25cd1d94e31e52e6955043420000000c771bd18099213c8ca8b4aabae5b4412a50195f786fb842b53ae2bc277ea00db400000004fb706c5ecea80d351ba9c1d19c31294c1070bee904180739a96ae6751da0a0c4e02af93c78604f14a5e12dc1fd4639afec821598243361dac1f86472ce5040c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10b75ed71af7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E92B1471-630D-11EF-B39C-C278C12D1CB0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430771556" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2948 iexplore.exe 2948 iexplore.exe 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2948 wrote to memory of 2312 2948 iexplore.exe 29 PID 2948 wrote to memory of 2312 2948 iexplore.exe 29 PID 2948 wrote to memory of 2312 2948 iexplore.exe 29 PID 2948 wrote to memory of 2312 2948 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c14b7fb794acb7730e7f10c1231a592c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2948 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aec305c8d976367201c7182416cafe1c
SHA12c8df6bb77580cc379efe23d0f8a24137508a22b
SHA2566dd343d17c43a9712063c8c31f3f10a83e13eb0e55f98c27cd2559c2cc1b5ac3
SHA512de4b95589dbe33c86f39a07b9adb305b6b2439db9c2cf3bcee81fb1dfae09a743f805b3050c0dbb06e80a59f64299f2ba1046d1f0b293b3c905e0ec9eec019f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58455e3e6f953581eb1daaa82a19e3b1e
SHA187548b7758c0a44a3c6235dd66301eab1305a254
SHA256da476544d390bc64fc9a504da24b78f0ffbc4d4dd178a68f339fa88d534b28ec
SHA512ab7072006d27087e9defbf27067f5836cdf24aba568a39cf78a3b03034627cb245153e2ab032d74c5b894ad75038d8a36d86a4a2b0cc33237c78691794cc19ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0075b2109df98e6d06c1a0a28a70bf6
SHA1b53df856660b61801d0cfa8c69ad28a8d4aa0ed4
SHA2565c3afc8e5e5f89fcb2253dfda666203511335081a5fd93a3dbd695b254814538
SHA512ff271fd188518fd52fcdc85cd59da166450a4e527521420391fc15bdb1a7cae3ced16a2d2b21fed80b5d764732ad7b596dfb4e3991d3a3c326dead4138121326
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dcc44a13cc981e8ecd47b2920b019b7
SHA1ffd1320d2fbb6a36b173771bb0036a52774322de
SHA256a38bb2d00e5c9fd85b319686f9e1916a50cb5185cc9409825f3074ad7d473ae2
SHA512a2cad914de31b7cd2f9d7ee73e03aa334b59053a8ee3862ea7d0091631a69717770cd6d30778c19b28af8abfa66f5adafad31b64be3acbee2933640e112b4d78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e7b1ba7c9399a824a1c197e6f3a4acc
SHA1b0d4251919ce71b516c63bd9f6e75c607d44c97f
SHA256f48d21a29a75e12d30a8551c8739179d532a94a3b4d5d1f336fe63309cdf43d7
SHA512ed3bf9e1e58f9706597ac4ba366c0ff47b56b70122bdfd308881927c635756c2c5a0e7422df8cf3b176a4477df42d526f17b606a20a8f8c69fdeb9b35f9ba824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ed9ae88c074f519bc6bb25ca2bed46b
SHA168f74ea1f09b26f32d530bdb3d1743adc68dcc9c
SHA2563055fa8c8d91a2029b6c0c0a45e258ff98dcc7103b630c60e4c8f9ea34100128
SHA512d4133aff8c8706f42a9ca8cd0ddf3f3709d2e7905595c46b14c28e98bc66d5fb4b3713aaf490bbd85dc2b64a93042b875e4857adc553f24a8f0d70a6766052f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575a6c48b3c2a6de7b8b0499b3b144306
SHA15bced0307dec5b13026286dec31d9a5bc68e5075
SHA256c9bbc426adea880873f7725fc29ff0d0dd60a723c9581f454fd652fc6d84ee12
SHA512662aed9d835af9714b5e8c3424838f55ffe3df5a1b6490f8bec49b1a5e61aec20eeb84bfbb10c4c250d66497d0bce2aea20ce687e9d3177f941919140f62bfc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aee797a4c23662ababc49a9a285c2cab
SHA1581e363cb26b6e6ccfb6b777af7fa6de77b8c3fc
SHA2568078ddb3c2cc67f879d5f712c1be248d06b9406dd702ebc7e35b8585c71a120a
SHA51233e11b616be7764f7e030abe1c7053593fd594f81b05e5c3588a4370a143315380561e2a4e219aa90595192ed026b733c55d1139b050c8c420210d239e690643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea8b4cc9fcab3cb95908ab5fa4f1d8ad
SHA19c98e2a15d68ae46a3a823517169ad609a11a069
SHA25673406c386ac7eaab4c3e9455f40d89ecd6970078181457aef14e82fe50bff5ad
SHA512ec55eb085f2f294cfeb54ed84e53a69484cc3e856ddc3fef8087af90e687bb53ff86b9d269a8d8aa38f17eb8a6e7abcd301336c04ee3e8af88c4b26928ca577b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518554954165f6c8e68b59859820c8287
SHA14e65b0358359275910c28596c74a47c397d5f9e9
SHA2569fccfb9f929e2e7432a3bbc841217e4e8a6804df6040ee6f53ae27a16a05459c
SHA51228e900579b0a6ac2a1edb5ca3829cf611688879a3c047cbfdee3616e65d008534d02ad7cfd26841229396749eabe1e2060ed5638e5e4a033b814cbebac188b3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587984ff02718253dcc1b8d66a2f14663
SHA1a8a3d0eceac24461e573fb1eb85f103093808007
SHA25669b194261e1b41e38eebc0b8252dd23a73d564f8a00a4d268ce7a5e927856da1
SHA512b2913dceaa706d359cabf448e83830ff7ad1ced2ae5cb6b42e9e1b38be321bfd9f637d8df883e59430431b70619b8f08337fd25dd3227fb9b91dce934dc656d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5124838665c8e8368c989eba18f1ce4eb
SHA1c3ce362ed7708dc67f88efa129cebb4b47559cea
SHA2566e0a57ff288147f3c1bb3db96a414d66c216fc0aa36bad9122144ef5d4aff7e2
SHA5123208e6f60283504a688c18a0d0e98e04f8cec5695ead1cd5c75af75262ea3e44e03a47555866ef2fc242cec78ed340720c2aa408a3e7c7cf4f42abe390b9418e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c70f2816361340a73d9fbb3eeaa79a5a
SHA113c394e24bf0b91825cb6aab7807d634fb0fcd25
SHA2561a8dbfa97f47b1e383988ee5242d1bd18e9c1bd1146f5c1bf41da2f30db6a91d
SHA5123529baaaf785681c41bc8deb6044af0114154938e35a71a839d25272d061369b3d32a3060737c3a646843664bb138a98981695df3d54091275598555d8bf02e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcd15a43df4de86321e25e6d798ea994
SHA18da83ba3cb7eedb620c29dd0c4c9225616fe56c3
SHA256682753e00db724d6c22220962ef413db9a572c470705ec15cd20df0b72df3155
SHA51209be9119d79d374cdf5ace2801da3e523dc1a56319efcffd2478699c51ea4e885555dea89763c478bc2cd2b3c24d389b258824f8178f3ecc49706c81e33a4513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f5fa8e71f4fefe0e93353cf6e122376
SHA17cbc8d8baf974df1291924f87b74969c1c3045b2
SHA2566e8b87068814c355bc0e8b413844729075be84d027ae3de1f0911689c76ea60f
SHA5122d29a71432054699c6cfdd76c0de80439b610467581745998b8556a4550f60bb49529b1411626a835cd66971ce9615764e521838c2ec4b81e5426f9aac6cb87f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539cc6594204dc03fced1b37c21684a7a
SHA1ce78c20d5e1a0979bdf1be4662dcee0b3a5d86b6
SHA256f91ca91e447c94d3e2593b03b20e8a21155e2be65e2d7556bc19b2d6e1d4f235
SHA512d116c213648ef73870179f19bf3bd8943d5fe4824c89a172e055e000777d704a209f3603beca3d522dbd825b5bcd9e8f59d28979a04223cb50b86328785f21cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1075f73cea5481401a4b87f45d332cb
SHA1062ec557a2f4eef05d9ee46e1e18014d4f83ff25
SHA256fb1d14c4b9cd757b56b7a5022fc344a40372bd590c956a2e935fa4ec6d16d3e3
SHA512b191e32199736c4763d1c41ffda34e9fcf0eb070036c59280d62df8f93ea9f6c5a335953163f23b28be83f94d2786ef8ec40907c3df7cf6b6e8206670965d7ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589016606ca2cee57cdb973d4871347b7
SHA1ac634d931d7cd496fdb6abcf33f46fd9004a4c8f
SHA2563b6f384118c5629d516e0b570294038660c990e0b595eaaddafa9df9749c8a3c
SHA512e97aa5c37964f05a5e194bc79d3d9fb5cce370d16d52dbde8f5bf0ff5254397ef63ee0e11b33950f86eb9a9ecdc7e857c59a1bf97b77bfaca9a00c973813cd84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590928814c1ad083b47c46d2f45779347
SHA1e13df2fea7e440fa3a39ad52b6fbdcc996a022ae
SHA256c9b748350ccfca5ebcc92d9a4b182f97c585a1e4cf310b63477e72380908fd4c
SHA51242d6f724c1b9d73087c23cf78f6ce06fe646e2e392029b1e668df314e52bb833cecd50def3042c807dd5af104de5374bf3479e125cf18c9241b7c03c7c0e8748
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52abb558498739cc0d65defc332499dfc
SHA17e603b6b1b45c44f594a9d7301cb80d4cd9d4dd9
SHA2564964b9d85ac2e06273a86faae29f9640bad912825f98948d9fec81e83d33e30d
SHA51263bc480302cd55099dc9355f135c61d7c62527db1ccb0384162ac3e6b045c64091bb019158cba2667403911938139b058494742b031cecb1c07f515888df7329
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b