Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 20:10
Static task
static1
Behavioral task
behavioral1
Sample
c17b070beb7ded3afa2e64b7b6bee89b_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c17b070beb7ded3afa2e64b7b6bee89b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c17b070beb7ded3afa2e64b7b6bee89b_JaffaCakes118.html
-
Size
29KB
-
MD5
c17b070beb7ded3afa2e64b7b6bee89b
-
SHA1
15d267625d6adfdc1fd0fa6ae90f7dc2619a897c
-
SHA256
733b8d64e1f1dc0bc3a581f59b5712f90f1e4075b0a7111d7e3c845207b0f3d4
-
SHA512
43022eb143179a01eab948ffbdb67af3b928b13b39c95abd2b0aefc7b70c905c1ca600083eb56426729ccb1c3aa103dfea986e2a061e69e12f336f9dcb054db4
-
SSDEEP
384:GSN/3xNNsyAWfRiGCfBL10tUcfa7Uxceuewe2G9vuqvv6:GSN/3xNNsyAWfRTq1IauwA9v5vv6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430778509" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1ADF3861-631E-11EF-A17A-428A07572FD0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0bfc5092bf7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c92000000000200000000001066000000010000200000001013fee0e953ec27a361705368194caced5124e6fe4b8d980e7f70df6dee4f0e000000000e80000000020000200000007921eed1e35d425fa996ec95bfe41b462ea2233860212038a94f432e72335ff8200000007d624c9e1941784ac4c7f0ae2524da5f5737e0fd4e85732f6d333287a380425340000000ee025e88d8e32670286c30998220224f2cf6e5a063ba9290d7cc2e80d3d8d0a01577624f4962ea608c8c0ddac19bd7e99dcc1937d93d19a3893f1a7b90520e47 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2916 iexplore.exe 2916 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2732 2916 iexplore.exe 30 PID 2916 wrote to memory of 2732 2916 iexplore.exe 30 PID 2916 wrote to memory of 2732 2916 iexplore.exe 30 PID 2916 wrote to memory of 2732 2916 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c17b070beb7ded3afa2e64b7b6bee89b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5362359204963d0a72d4f197a36f10eeb
SHA1c26b0139bad7e6c3a3d4d3cd9800677d654dc070
SHA256f5a4965ef8b9f2e9453450eb871980bd76052ccbc791140ea3864ac9d84368a9
SHA51291fc2cfd99e85986cd936646e211dae2688d6f6dd5f1ab9433826b027cd55505cc21b88919feddfaa839e86ec90cf98a73b6856fd73fb0f6e229c3c9a24c391a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5659be869fb4d7ae145df796cf6e63464
SHA1c15b75a63dd0180e767c2282641ddb884d50649d
SHA256062fd7ca29f1e129d743449a69dcca65a6a3ce654d3534060c5641bda94b3eed
SHA512b8f027739bd7189143107531c70afd1bc2af16627ffe9521d3561de5612d7262b277a4c5ba7d22b08566be5c8a13c86f6176e559c12c16a1d97eb3fed962cd8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f199b56e5055582ebb19c86e4c233b36
SHA170c5965453baebf4a5998c6b166fb72a7f65ca74
SHA256fc340097680e94c19f87fe25ad7c49a13dd516cfb1630e91c93b24ed30a48af3
SHA512c4caa527c9752c84b48db0488e72d70ef7b38ce6d89212d40c2f0d94319771a177e6c938d77aa8883c9a1bb3bf8654d9546d5b3f5ed6ada5b500b4f73e75e68d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ead2a6bf9882d95f55e915f4626381e
SHA1a26c7b7d764a99fcb966ab2964a93e645fc3f62f
SHA2569d09fe5c52d0b852f6aaeb4b6a82e9085e9a66e5e3c558b6b3a5962ed12b1b6a
SHA512c42df8d9f2697a9caec7de6a0a524d7e32b21516b91ccf28f62d5cf3a301ad4cd3fe393f0784e25b90b87fa745b377c44b0778092d2a48c8293e1c73d321a3bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8ef95f0b15389ad46bcb611b0c60bfc
SHA17eeee045203e1e5796d67b10af800d2b40188d53
SHA256c4b83911153b7c3370abc910223095f389f6d5ad7740f377bbff1371bb5cd958
SHA51213ffa3608f49aa1c0f8ebb1cb87773851decbda1651dca0cce425021224e5284918e96a42f707ed42a0fb78c0f4b462ffae3c7e3c58d0a4d49594fa69e89691b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5781491bb3efb141241dcc6272f073a68
SHA1d4ffc0714585d91d7dd09a9b1a64d4e398a1428c
SHA2568ec1ed03f334bd3b32ff79f2139bbb6994285584244a5b980840c9d265ccf784
SHA5125df67aee71e43d96fc4aab3b3f7ba1920717833251277041d8e314c3209408f0dcf0accf0f53b242f509f804593a684e704882262d94443a7d6828158e72de2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f78850ddf13594d12e83c7caadbbdbbc
SHA1a039d0203d4e76d9ce122e92ca545de9790b89b2
SHA25615946f41086a8e2cf71512fb3c5cc3684c726b6f1584d43fc782ad3afdb30253
SHA512a6fa67c1bf24d60264f5f179e3a69984405e0a80dbfe2749d5c8e87b8a0390b6aa5db5b84badac53540ee39a2a94243eb0aa01d70bc94edab9ba31240faf482e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5112a66225ef769f99cb0e68dea2b06ad
SHA16c1eb399e6a26ac3f742bd615ad595d1fa659787
SHA25619b1c7bea74568ba34e5941bcfcae6c44c03b1f61ba87ba096cff1863339a8cd
SHA512bd1be1d83b9332cec189b0c6dfd6c733bd5432dcb6346bb02bbf4ffc0ecc32bc22fc6561dc7f4959085e16cbba125fa4f4bbc0339c2769971d10f3cb4c039dbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551365113bfdaa1a5ee419ac276f9b491
SHA187fffd6285b8ef53ce11bcae8e3d39f15d94b41f
SHA256d1c3e2689019204a0dfc7098330a035780b871fdb3cc6b295e024bf7198f4508
SHA5125190567eb42255cdce77b17ff5bc79190bbbfd6981b148e38b176ab7b75c5694df1333188eda6d53149ad404ca7ac73d150c5528866b170be86370161cc89a67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5442338be11dad6230b849a6b1ed30f88
SHA156355b4bec45679c4e76a86e2f94149ac2b33964
SHA2567ce465371655ac1c72beb0a82f74176fbfc9e32be492d1969bbcfb1d3811932c
SHA512be8ea3f87ed885e3e591385e49ead45e6bd732da07c6fa872add3b7215df0b415883539ba17d347703f66eeeadc1a5e54059fc0cbcefecfa0e97b61f49891555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a93a68fa3ed74b6b3dae1e7647bf6aba
SHA113a12bf05329c00f0cd7120d4360d65b42bb4b1c
SHA2564f27f56a9130ed0e336949b934f4cef81161681c909508fb46b54e1c33973781
SHA512a6c20786ab906df6f595f351f58a8128df49e76dc171dc1385ca249e95e88cdcb5a3fa9ba828bcb969b6a073668348440b0ea03644245c445ea9fb2a6d8390c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5263ed948ab924ae404135253338cc4db
SHA1b69ae5f3d01bd39b6c5fb7991a01a8d3e4865c63
SHA2569b20abd43272f839622fa5ca249e5fec2421cbdfa2619d522446c4f30c1bb4ec
SHA512f35389325a393e66719ba7a195cb112c50eeadece45236d05175e6d90da133a4e3655631464c1b398f1348818ab865c015161d4b204405d1dc365fd7ef663efc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b333e06d967fba4bc8ee376c7dc5119f
SHA1473c0456fbb79c761f7a98a75f628bea0eae472c
SHA25697f4affc26edb0ce0b81b3b24ddd11b13952f0cc441e7fa80a2d31b6a4d8f1e0
SHA51255efd3147e4094973028f33e828fe4b153f5cf4b6d98467f05b378b67cc79cc828ebeb3f6d9102a74bc8838dabea14b4a227e9decec783b7236cfdc5ed37443f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546d06ca25708a205a3aeac7184c2cefb
SHA1356acbe1a0cfc9e89846ff6669379e893b051a22
SHA256e027335c3ad4eaf74dc46a47163fb2d4f8b6b3fe816c4c4b9f75a1f9884e6d35
SHA512f255e46dd9f5ac9bce7b7646110af5eaf4f523e763c68ddb4f9da0dca4dcb083be54db218f9fc9c3aca2fe2c0efec97ff4a5749a5dbfe1d289ed3a0897f3d7ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5851e87f00b37cbb2b5eb371d91f57d6a
SHA1e6f4e3429ff4702459ae31dd71d336386f7bee93
SHA2563de46e227812ef52db6c12a41cd5e7c8462a546755a63419e80a3a9d0bc5c41c
SHA51253b7315dcddfb8455aeaf6e05db4dc10e5c89ec490b0ab28d5ad7833e409e976fcdc8c9153153b9007e4c70de28547011a76dad177082b2ea88ddf1cb10c880c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f05ba75719e4bb4eaf0e0f9bf65b2ec3
SHA151615017f9cb5c5842d32ec14e655d6f6cba4b5c
SHA256dab1e7320dead95ac3f8d1282ba503abee569a7cb0d813668ec3905a7cdd0a61
SHA5122a00827fb796cfbd914885063061dc0deddcf78fd31765a4d0be06641480189c79d5c5a1ddb59da5caa91195439f7684801120bcdfe7d6c911a6ee7dd30860a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58196fa1904c83d0177efd1bf2a9d18fb
SHA186a07e73f18f5d3c6c38b61a013a86586b37b555
SHA256a2a589f3d40833e1396e8cac33c3a27d43d725b5377af1c582c154d2a768ec70
SHA512bb483499bf124e962e893455c956b657bcadd1b9265b45e42626cfc9129e5e1d25cc059f8f4bbe44d720f5aa98e1da356717c3a461d975657eabe0b37e9b72d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa6cc5a27dfe0c71cb64c3f4aeb4fda5
SHA17dc56337a886be42c74bdd1c6448bd2dcc9f770a
SHA25694835636f868bfebe3733f1e45cf390f458ea11946851d8ada8333e0e975ae7d
SHA5129ee3afb7ac29dd099f72cc3507840cd86305cdb75e4e4cb9379a9bd47673c82188de70f2a31f34320e0d44490b44e00fef0ec32d99b3234948189c9ced4dac1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d8f112e67ebc8fb1033c15c55f465bf
SHA15b2ed117a3e4f407fafb086b8b520761aec720a1
SHA2563b34706027b9eea7646abaeb1246682d294a7ee52a2bb37f9709390391dcfe94
SHA512a75cc10ad523951d06a90587401b41df16ad0355fb9dfca4a83f1aeb6ca6dd98aac2590e8718e8509485384cf10466b018b5bfc87313b8c2dce364cb215b8dae
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b