Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 18:50
Static task
static1
Behavioral task
behavioral1
Sample
c15b9879c2bf4e92eb95c68f0bd034a1_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c15b9879c2bf4e92eb95c68f0bd034a1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c15b9879c2bf4e92eb95c68f0bd034a1_JaffaCakes118.html
-
Size
775B
-
MD5
c15b9879c2bf4e92eb95c68f0bd034a1
-
SHA1
0d2974b423969acd0c19a94aa20d07e471b3b09b
-
SHA256
5db8629d9f9cd18268e44bfe84ff2bfb0bf9d09a1e310dd4e21cf3979f5b92cb
-
SHA512
a5856b22afa004715497289baa3b34c7830efc8df13281f98d6432901e8d41bca090e27e4e6fd348fa40d25e0f43520f456bf1b53a1fe530861c04eb666299cb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000028f77b84cde8f26d832b1566b400846341fe0fbfab462ead1e1d590caba11740000000000e8000000002000020000000178565e256f9271d464fc66df425be370bfa8859647e63b5cd505c225ec2b35720000000f5a8e17d9639443e699e4268b3062249d06e206c6e5b115b59a24f0a5a9bc1784000000056f6505a01b3f7f5d85748d0954b00ec02d6a59c274d1f1b15ef37029d0f5e087659d1546f86828a7e535fd4b2b1f54b8925bcc486041485641f9e98fecb75cd iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EF045371-6312-11EF-BDC5-D61F2295B977} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430773712" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60b673b41ff7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1028 iexplore.exe 1028 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1028 wrote to memory of 2524 1028 iexplore.exe 30 PID 1028 wrote to memory of 2524 1028 iexplore.exe 30 PID 1028 wrote to memory of 2524 1028 iexplore.exe 30 PID 1028 wrote to memory of 2524 1028 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c15b9879c2bf4e92eb95c68f0bd034a1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1028 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a7cd226caae0c96aef6e84fdfa558a91
SHA14d5b2bd811b69b18ea465d8c9e4acdbb1f365924
SHA256c6388f96937ef55bf971e270f4689cd8a8cc94cbfb6d71e9104cbda5bfd4bb23
SHA5127fd7c1a8834db314f0e70262004a807bf0dc35c51d75453229504cb94e7fca56dcbb8eca807801c0237381a6805896f35d22c8141e31a96dcaf601e323a36cb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58ec6c1f8448fc7e3c21579b2d45db55e
SHA13d2d37a1fd7fe291316db48588ef70764a7743c5
SHA2562cec5c1003162a7b05505229902f121a050c9b969ee3b4294cc50d3d100a1d78
SHA51223cb48003fa540cb4a2e4a67657d1815462482ddee94a9db1620a62f23153f7ae633234a39ca776526aba5bb54ad6f5d354ff554dce7bebe9c1f90480ed445a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD593871085ac3ea33a2c56e964712e2e5d
SHA1e51127dada59b1070c0e7f6a2a717bb3441397d4
SHA256e23aa1045f42786109ac4f5c0b6ff3db740986932fdf9b547df3405838a6ab1b
SHA512e940b44b6430782bb81dc81435ec9bca4692838f1469837e7241b344cc33378abb9b5945e4bc43548a1fcf1e4dcd534cb9596e602ecb123800e319c0ade239ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e2299139cf7a9e7f3c36ac5d1d164960
SHA1f26118c5dbd31e9c5a690e7f37f888add1a6cab2
SHA2563558e25e51f2635c45441fe379b0d2c68883ad5cf1f4c496dd8cd37758b7fc34
SHA512a06d205969823d16fed3d57b0340aa7e159bffff1b0f70e0a87de962c9e1234a6bc64330aa74e0f861375ff50406334f8d362b2f5c5536feafaae0ce16b0e70a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51e5dc4d355254fb1b397273567061bb9
SHA17d4d8e5b3eb7357ceb4ace0ce5317d4ca4d88527
SHA2561d0bafeafe9336b976adc027b8e11ba767a9b0f86465046c5addc688244c90f7
SHA51209dc877ba2ea98f27fc6f6b8d6cf4da610a4ddb606e481e1f8f0241673071c62e7ed0c8a6dae9fc479f16339e63caa292228d7d9d58455ecab038b3c1c809e22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c6782a557eb1f6bbdbd7fdd93d0e8283
SHA196b53d3d483593d3adbcdf14afd6d4d869755644
SHA256e01d6561e4ce182940f16b3bcb300a74e34ed2ce050b19ad84d1b98cec641f3f
SHA512911f8bcb34d259ad262727385f12a59cb38a27d5dfb5ad78f46704c05c81c7da4f2dcf361fe49d4ce134bdcfacc2e22db419a4950878370ff0e5f59b84d98f9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5243db3db2348ff607b2de260924909c1
SHA145ad35115f98b598051a11704c10cc84bff01423
SHA2560e1935bbc180b0f6eb2971b162a01bd624f12501bc42812f5d224543e97b384f
SHA512273a5a9434612ea374b313eb473918cf330bc6eaa091f266a778ede577a1a6a38511df4a37ef4bcb99f6d08e0cfb44606b7d0c854083002df5d0bf1f7ce19d21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5de42f2a1bb2214a43cea7de39c2d143d
SHA1c7d48cd9c3afa20345d9a29c44e2c666c392aa7f
SHA2565fed25f73361d13f0ec1c7cce25e71b8496e5da90abf5ce7f34db15a65659983
SHA5125e8e49d8194909f59b3c245ad0cabb713ef45f85d4d5d80389c4af0159427438bab0bc5c1a6104caa9b8c2b8d6443e3452589d1b1ea47909e85633b31225d838
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dd5c374871f73a724bb4afc10a9a24e4
SHA1f3832a0f3a29e0b2e92159c390525e6e93f4df69
SHA256f7025cb6152937f04e8ac372128a22e05534dcf4c2cfc31ec84e77def94f98c0
SHA512db067f9048e772b6ca01a0be1d228e74565b283512c63a483d8aeec79bdfe70fba853e561097f3a7f937f65f67451f7431f8e8b95dc347af7f7b23ea969c3a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD584cce33982b18210a99b012f18fdace0
SHA15502d19655b6ce7496ac178fa6aa4f6672231b54
SHA25681acfa217e027486d94dac451313f6aa2959fb02e1f8ebe5238455c58fd68591
SHA5124dd55ffeec0760a32de19415a18dc5c6c470fae7c0fcdbf166d0f19d4cfd80140fb8eb14cfe722d121628c39d7061f8aaa9550d6bdc9c0e9208ec719c2179e0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ae9bc1f71a3d8b481527a960ea44fcfa
SHA11538d97b55f5aac67ae32895f0adce3174cebb3b
SHA256ae6fa4b47e8da3a0d7e63ec5de48609554beb3d85179a31e6f125803a2013852
SHA512f85d7ab0d1bb78b6047d311b442ca930749403ec339982fe6b526420dae56360c39469e4001a608c0829629a9f3a59238882a84e9c305748a0978b49c90b8809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56649c33020314dd467acec2689c77116
SHA1a5b6751c08018b0e7701f58434878562c89b043e
SHA256f578891131efa6a6c03ae528afb76a3d90fd154dd1014f9c6de9fce45b81ab52
SHA5123f1ac41f91ad0c8925c02b2ce53db49c444a46a613cdb294bf30188ae86bc8503fa8b2d53c375b7fb918a49eae666fb6e18085bcacd1ed3ec5bcb0f732cd2b90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e7e7a7fa3ec9b472284dcf74a3a82d32
SHA174c6dabba1d67265cae3a508f3fff37e8f42d47e
SHA25654ed9f5d5c426148e4e8c0a48cda217834a5350519f1aafa865e0ea3c1c8eff4
SHA5121602e94d2cad13ed7797d37fcb28350a2d8c503365b99f42d774f1360e38abf63fb5fad9bd852d37e79030533c1ef6fb648a49bb9bed11add34ed038b223d6ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5530c2629e050fbc2a9cea6250cdeb2b4
SHA1e05b091b279b03a1a1625e20f420485004755315
SHA256934e75f00afdeaf43ed4a6d7443042ba7387a73664327667caece62c7d1feae7
SHA5128d3553701f7591a626fb70482402148bdce9bd94e1fa3326e1d805c5953aa424600211db8c311cd7123e77b2f40b171350489ea684c5f1fa45bd96bc3001b5d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD545fbbbebfa73673fdf9f59ebf10bae8e
SHA1c99802362eff3050061234bac620dd760236fdee
SHA2569cf5c6502a21c9e48b02697e57bbf5fbc8ceeb84611d39aef5c6a0070ae67daf
SHA5126efcdb3a80a902a07f880f0bb143101dbe0bac8500e6a5875eb7ced90eeaef649db2ac02feca885448adc86f80f027351caae7f5ee13f30dae2c87f307918370
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58a5f3dc87ab8b5d8134ed801d39e3a53
SHA1345fc17deed17c32756403ec023e104e1f6e232a
SHA2563c2641655b1bcc7d151412474081d44c85a5186a6e172232cd632a9fd45c9fb5
SHA512674fcaae9895dfbc7ae187e457aeef16e4faacb590e8b3efc58d97c84adb418993f3a570321f54d857dd9f6b08eedfb71dc5b508da814b12dc5f3bfc201a6944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bc24f8f510a0bce96e9488dcb06df759
SHA1bae6c37ccedeb97b57054be6072df01f2f1736b9
SHA256163372bb3d6eb1040662bace4ff2302bbf37e1601296b00056048a1db3ca0a55
SHA512932d500ed9f2d3ab47dc7a6b37434f81a7c6244b1b294d71ce1f1cb37bdfd6f2eb8c4050824389b2579ffb4c1aab37bee0940e428d16f77826d07cdc5e907a8f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b