Analysis
-
max time kernel
122s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 00:11
Static task
static1
Behavioral task
behavioral1
Sample
c1e11f899d86fdf04009d5cbfde889e3_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c1e11f899d86fdf04009d5cbfde889e3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c1e11f899d86fdf04009d5cbfde889e3_JaffaCakes118.html
-
Size
127KB
-
MD5
c1e11f899d86fdf04009d5cbfde889e3
-
SHA1
3c8eeaf6a5e7cfcfa9e74e108dd74836c8d8d3a8
-
SHA256
80bd0742c46f8f7e1548518b496f4a946709d1f397204a00beec0b1001450e23
-
SHA512
688907084a4d7823b94872f7cc6a78f5d49de2eb83e00297a240aa99d5ed68e97c162b4b0bce38e1f4a01ea7071f4adca6849735a7421ba426ab758a8f407de6
-
SSDEEP
1536:Sf3yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsb:SPyfkMY+BES09JXAnyrZalI+YYr
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B57DAAC1-633F-11EF-8D34-5A77BF4D32F0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30cf8c8a4cf7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000005ac8fa7ade313521527f1f2361c32066c80506c1274c877aaa31b7b45249e37e000000000e80000000020000200000000d2a7b5713ce4bdd9b6e25b41f6bc39f674b5819469437bf067479eccb231995200000007f17576fb396f72f6a04b5a8cef01f99bebf6c972f452aded8b0188d60ef21b140000000900e17e6006b097d913fc8bfe249d32c3e3163590c09fe6b905e75ef2c754ecd2a61de81c57c7781b98f22683ea488fb2f0e3d27cf3583f892ff5dccbf248aaa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430792945" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2732 iexplore.exe 2732 iexplore.exe 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2968 2732 iexplore.exe 30 PID 2732 wrote to memory of 2968 2732 iexplore.exe 30 PID 2732 wrote to memory of 2968 2732 iexplore.exe 30 PID 2732 wrote to memory of 2968 2732 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c1e11f899d86fdf04009d5cbfde889e3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2732 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50014a55c677b8e13fac74657c6b8dbd2
SHA1a8a9b8f645c9dd2c00b635f30679d73f5958a48f
SHA256a79118e93997a659fa55d1d69aea8d4a48d08a6859e83bcdf61ad4c3b9a63d5f
SHA51250ea1411d6ad64f6d86ee08d3ac64d1cccd8e0f6974e48770767d46737b9907d5439186451137704c5213daaf93b12576c1781f6a4a79e930f61970a0b02678e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeb68bea6eda725d76cdaa344810a6b2
SHA1fddb2e1cd879a6b8aebebb22f1d793b8d051c758
SHA256e3a3febcde712c430ba6db7e72758f9149f26d2a53eb5e035dfb34845b71ab7c
SHA512545cd67723fe1fd063ae4e28518e01af7409ccb9ade1afa75dd21156376fff1171bab7493e07c9e2f0523a48465a24b7e21216dfa47398fa90bec0ee39886d35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b1811e294346c0d56c791deff226734
SHA15abca24abf3b0378f8c0e9c8f1fabb9ddd99d194
SHA256209734110dd3e29c6e1791f7ed314c34d944193802b2b907b4c95ea369fdfdb9
SHA512a434eb55df849f363945249f1ea315a6d87f35268e02a9b33c8ea57de287b503bad1a7b079b8edbd08e0116ba9a7a2ad1328aede5ef3176a32d836840010943d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540915acef3e672880b4f00d121df780a
SHA1941aca361ca63ab379ff1f7eab48e65e42cc9856
SHA256d09dcc359641eeaa70734aeb2216774377309886a6fd9ba19c1f62d864d85fdf
SHA51298dbf0588e5e70cea55de8ba92e6ae080affab93b15c80c1c439d36f122ea2291843b959a2a4810974c851e8b141dafc48015139b71d74b57eee175bad54ac0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52294707f0585a84b7b1cea85b0405b14
SHA1cd4ad63881a26fbf2fe235781c9c9b8f567b45fc
SHA256d1083b4c67a6d31108be4ea680929c6a5877521c1243f0dc23655c17caf0c132
SHA51273cd1aacb74c904e5e6966e94c768e5940f832c77da0599604e559b9529e1cdc6a942f67f33246cd2ee816f5a90cff39c60b1ae3757a7c0b8726ef73a4d2aa11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5432033d6799b3bf76fcf1bba6e8d398e
SHA10b62fd7a201a816c6aa8db795fb272400e66c66d
SHA2569d582029012d09a931795c6fab5ec729532c1e4f198722c45978431157be9c0c
SHA512988d9dac0edd321f4f97d9a8143dc74d6d1faca4550847f8d7f793856ebb9447b366022189a2b39417347b88f6d1cd99edb9ed16b79cd1e7dd04e231f6bc7816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1b1d26fa96a3ce3b42fbed5fa9294f4
SHA1dc3bda336671e0ea3439f41fa493f083c3078d55
SHA256b08d5240d31a43b86ce4eb728b1e75ffb851c20bf4ab89355b78a5e75a9ae61d
SHA512955fe950ecc2840a24f6008152f75142ef470e1b8a287eefc355cd510439528a7863c84ff2a2af57b3917a1c89fe8ed084f97515b806a67f7f20f06f2ff37805
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57999978b53cfff356b8bd9d4d15ee23a
SHA1f40008df1cd8910459fde205e80d1a081adebe57
SHA256cf847906530f9aab33dfc56d81bb53623e92ba7451ac772609a98aad3dc9ed38
SHA5122545a0c423c8176a35bcf20d1a15705711ac6a04ecc3e7fa733ce0111fda346547fb6bd6aedbd1a73655cb7d1d71e44c1bc6e7609c36e4a54860528f38825ed8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538ec16d7e973d167bfbbbadb023a23cd
SHA17ae2b7187c640092a33a3537065bf7405074b388
SHA25621e0ea4607fe9c44103ab265c68446205e91e56936c880e89db6e37325faa4b8
SHA512fd3baece8b77649dd54277238c46129fd8c6a11d0f98027d7064fde7ee1fa115614decbd9c0f326d3ab8380fac86f24b074cf4a5e33e654e8cc00c60a4cbd8ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6667dfc153cebff1b8e19b442479b3d
SHA1adc3ee66424dc55737a7243677a44b8eabce48da
SHA2569056b61e0ef1c4da80dab91399e4f3be3bd297b16c1956070681d8584a70e84a
SHA5125ce5cd8c1d221aec6ed1048f0a451e80fa117ae881783469f11b9712f1f5db1df235b672079db72de645182e73f349854a30d16b997000c1d4018159c8ab7316
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a57d84097eca0d8e406f0f45f3911cd7
SHA1a51e2d351a07f5c31ba8cd1af1806f6cdf1b609d
SHA2569ea0af833a5dd8396972f70558ce848635b81515f6a7840ea753825e1f0155f0
SHA512e92dec7da4acefeee96ab981ced3cbf95aedaa1df18ed63da3fd4017fe65a9ab68c4ad6878cc8db8ae9e8a7eed1a7229a0b85d571f47a56172e20f687ae35723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fd04886310972412b6d669a0010a772
SHA183bf8d45473b1b11d0ac69e2e435e7af2c7db3f7
SHA256f291de20a67876a13bc548dba2b3531a5b2143b8f861654fbd56853bfd9ce737
SHA512246cb7038838a1f52f642a5fde02de187d508ad5686692ab2f96f4ad229e81834604cd3e7891b89961350ac10f461a385a1dc7ce3e253445144808ffd9eddb9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb3f139db69c0800a72f3047af6aeb33
SHA10452e321f4d427b2c6ed2a897b62015b4698fe2a
SHA256aa02ab81f8388d867edb9f81fbbcfdfba80844212ccfd5b0aaee2818fd60437e
SHA5127051e4e51a736d61863f6d92b761dedb8dc2939a01c18f17c9a0b35595bb9ae7ad00e46705f855b8369adb893b05adb0f003d9f28cc8b7f48b60968a66bd2244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c8bb5ac3813741997d4fc90385bb7b3
SHA11cf25457a77d0b771b181e6a6c7bdae722822088
SHA256c7b2de0ac8e69f18ae6e4d542fa23bcd861a9c01736fbbcd409c56bd097bdfa2
SHA512380acd9b392b83b29e2fbdc75715c8c4f317cca99ebf8195a7e35fa0a5b395c8806d67b0059c0200567d6ad7e84b679d8188a274a70c4cc225f26c58c134f906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574b38cc23009b2323ca0f18cd253d4be
SHA14fd39aa2d2fedbc88dd9ae06ca0c1ffdaa323fd7
SHA25602143c6b1a960e37f35fed149e26dee69490fa9dea9f64b77b5dea51b5705eb1
SHA5129d37e208ffe757aa65c97e8aabd67f3237b1e7ff927d56cd14c0e6a26e57f478503ecfc288221da3078d7d665fbb6c1b501c223093c54b59522eb0bf356b3b4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc404d00b0eda2e158f7d730598fadd6
SHA12c6b4b2165014c1c81e53100e5f9dbaaa9087d3b
SHA256c25d04d9959b95ddea1b2aac51f7c4d92589678d32e45fec98f476ed6cc443f9
SHA512394617787b9a0bde82ff547fb6d660908b6dc28d93868a5f6f725d31047c3238362ce1e7c9fd124fcd904c3b33e89f3d1e0685ea7ab4c65673bdb7affb8ca3fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5224de6784f1abc3f819c71bcfe962366
SHA1839fa83d8b9a4b0367ba53d52cfaa627e796b7cc
SHA25611628ece0ca09c55a3a9be20781a9ee6fd34f055ec113ce0a2d56992af42cd4c
SHA5127a197a29537748b63f4e972a191b09a7d39ec3b04dc5ad356d72c04bbaa9b4a9bab059b30b01146e754ca4ba92d4d2e6284835aa89fd190e7dbc87203fe6b69b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e114cefd04c62f2ca6d7756b951a174a
SHA115d9c0d0d8802970a390981ac4eb00754d38c1c2
SHA256c1cd132b932194b3ae66758874dd40eb9b0c12c4913181f7d2919bd4a52d73df
SHA512d1718e84aaa2189478e618e50b4e76941976b8c393f48d998389336edb1e801f3b76d413a088c52b7a7ffda10dd2c9ad2ded4eb11cf6473cba03587209beffe3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b