Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 00:20
Static task
static1
Behavioral task
behavioral1
Sample
c1e5e8721fff0d0538af407e9c56e811_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c1e5e8721fff0d0538af407e9c56e811_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c1e5e8721fff0d0538af407e9c56e811_JaffaCakes118.html
-
Size
24KB
-
MD5
c1e5e8721fff0d0538af407e9c56e811
-
SHA1
c0b35f3f98280e6bac2c1240f224eecc13d2f701
-
SHA256
147f3dd7914058b4bd98d9d8dd42ad50c836f9606a6fa2df4e62e024e255f750
-
SHA512
0bceed1fb70835fa02ffeac7e75c09a66a2aa74b83bab18822d7d60f98d9f8bdd2919acc86920296cfc7a5e67558f9b809af60b5ff712c1adf6cc20e6f77bac7
-
SSDEEP
768:wfPcWbN0YONFquYHrbAK92tp6HdRohOVQSGw:MPHuYONEuYHT2jmdR7VQSGw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6038c1cf4df7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0836CD41-6341-11EF-9BC7-EEF6AC92610E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000008e8f631dec653f2a0a805a4e7c94526c2edbe3ac0a6e581979ae20600e98b07d000000000e8000000002000020000000072ad774c3982732a98dff40d5b259a9b1c04902424b1dcff861f17a250cf0b2200000004d82a4c3f13b951f47b9a49430eacba89947f2ddfe9633a9da54bb07b843414540000000b0e451b0f43200825c4ed1a8d379f52d33c08d1eee8b19fd5c357907593ce57719f862ed74e6c049776be291da6a2e94c9d3b005889e3727eacda5229a62f00d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430793511" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2572 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2572 iexplore.exe 2572 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2572 wrote to memory of 2176 2572 iexplore.exe 30 PID 2572 wrote to memory of 2176 2572 iexplore.exe 30 PID 2572 wrote to memory of 2176 2572 iexplore.exe 30 PID 2572 wrote to memory of 2176 2572 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c1e5e8721fff0d0538af407e9c56e811_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2572 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547629d71f5507aa95886b02b74f10d49
SHA14f945bf32b6fb299eaea0ce04ef8a67e23a5d2e2
SHA2564394e8c7b860ec8b6ac8e3545b37c0e1f27e4398b598a7c91c56e75c3a574d79
SHA512f41046f7d3ab3019b6823299acaddc6c23f7c21484b45f05aea1b8b84a6dd7f388823659d425bb9ea79a845d72ec7265f686ff428936e6a2807c3bcd389fc312
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5140e06e465c34fd730cbf01e2cc34857
SHA117c126aff733eede910733649caf3547c7e5bfb8
SHA2565e3b4af0bbadab4986064e4af2ce173b01d9e1e28c6656a504d3de2caf6f3d9d
SHA51224974ddef7358b7dc8be0bab3ec3ea15c227181717fd73c6455a64e3cac515a3a8dbd6aa61cc05a7dd1a90653bc13927d815041972ac300c35f77b6943d922d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51063ac1605076c8147e5561d134d375a
SHA1d9bec6d2cfca3ae39fff674373949f306157acdc
SHA256417695bd9e3705e9c98ff344f08b9c4767692dfb9c6b8169f4b97d624600f308
SHA51266e271163d7894fe7363db87f21f76e7acf5091774c0054b074d5f75c0820f39e3556fc4f9633c496f53f545de0030708c68e5e41e8a467d03d921e7079878fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5429564bf94f7ae45c11831a8b06ebb
SHA1ef4877ff4df71b336731fc7aa48baf1463a4973e
SHA256613267c93a8754ea474ebe60f5177f745aa82f65f819c2899bad0fe7fa96f8fa
SHA5127441eeae76a5da0319bedd598540b91eb2aab1cf0ba99c0ad903896a633cea3b28b0f410fe4541936ffb3038561df41001e72675032a21a91a206f9bc9872787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505edfeff86f247a6dae24d0bf9ec020c
SHA12027613da18aeec854717c42fa6c99c40a814676
SHA256290927095ed9c7f566288534423968d24dae790467e9e3206b5c51d80e9569e7
SHA512caaf218126a2fbd1d9dea8293ec332713b4b2e3a946eafd04a3b8a6e66bc3b02676a6d5c2eeaffb8ca4bcd4ebb7deec90abf8d4a8d24b1d7c10a28c1049ab21e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a033a8d47e53d0db2e4e58073477ee0
SHA179fbe2b18b4107f23484458784a81f12fe99eae1
SHA2566b1c3407adaada6352b1701218b15479942b6ae2062c531ba58e10e1a4c77a82
SHA512c670f9adf1ef0c35ea9a1edd191c3d1ee70d6702e5e387cbd2ddcf56ee1ae6bdc031b4ec25ed3cf7c7f532e41388995c0c363b8a04dbfe8f95fcf6f2c517619f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b02376e4b0d6eb5104106f818d3b0f86
SHA192044c329c33c9c1bef38842a11d9a5fb8c56368
SHA25627ac9150c9806b55f21e25900f2648bffeaf541598d911d76ba2a4158f0f08a7
SHA512c2d07487edb38c6de2edbe8825c65ac94328d26b3e577a5b063e250fed83795876add545670a8c59fed463c9ebd53a59479a9b81ffd7f69768d7494c8d8df297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be86f395aaa83d31b71eb74dfaaa4d33
SHA1e210b4caaa3c60056a157b0d64919dbc7668ed3e
SHA256525ed1d0ad0788babbce4cdc4ef072dfe072e57291bdbc9254bc427d11a951c1
SHA5128b7e8d539c17b809c3f5f8f87390fce8f2bccded55f4fdcac2b0b2e84d5edfecaf490d30998d8fd9978f377c0692d21016c20a6350752ed4345cf1cc1384b7c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1cba9b1c319cd12464aae88ba056e10
SHA1ff9b554a48d9b83ab6ba4c488f8a1ee4313a6ebd
SHA2560dc9bf0b3952e139eb35219caf5cd477b92d6a536c042ad90c2d85af9000303b
SHA512215b9cccaaf5b0144d4dd1e6be55a21bdf3124233db2a9335115663095907d362120ac7f9e9c9bd9e46db1e239749a90b696228a38b21070f868891c03442399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528e8ddd319f08688baefc4f4325c56e1
SHA158a8245f800af50b1e8fa1f524c4a1a4becac117
SHA25622c6c92657e2ba0b43512564c0c60c01064c24d1d2dea0c456ad5440ba6e21df
SHA51230a0f8ec2dc71d56f175123809b201060c970a9244b7ef923e4501f9852e3ce883257df5f5012cb720ed87e2d550f4fb6c7501a28f7ddbfb5fe0bea3ad28cb86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e44000568ebdb0553d83529d303512df
SHA112da1a2ea886fc2e4b0cdbe2c4ca665dd7059839
SHA256eb0e97e7ab129eea4cfe42a696bb28ee0b561f0235eb7c5cf4e48b9427dda744
SHA51277506f3d1f7781e4252ce779818cbea341d6fd20477baa96d8996b841d6fc3feaa511b25b3bb08c40ff1a449f5a9a3737e761854a4dde16030ad868e6a6aaafe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5458a79fec92846d0e4d80b39519c96b1
SHA15bc4718c248aecf858071f687ec3f3536621dff0
SHA2562cf01b3c6179c6bd3e3fe7dc10f91b1fcc48e7b5fb6ffde652caabf2ead56e78
SHA5128908ee3982cf3543ebfcfb5ca361cc76223ad5854585383c64425423dfad7b50008ae56bf55a6dc4c3f285a4625e031b7c2976ddb18dc17d851d2e737b60791b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be204489b4bd6c66d8747562d1900439
SHA16349c963cfd7641a1213b6bcf554a598ae8b4803
SHA2564bfe389b4d71610e01847f229d5b536f1b3e65199602d964819a159bcc8c0563
SHA512352e44f3b63a45e265a1b71b1870966a66cc99d5c5da8093f164ac3eacbbb7271c1c31486f293a3af05c0941b4da5425ffb03ce6bf1e682c65fce6366ad48e62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa09b18dd557eb25fe399871b3f3385f
SHA15557e85514e8ef5f86e639663c708877c17b5139
SHA256550d45746c3e1f712a625121bdb366d007e8002a555e0b04a663ac66b6562d23
SHA51223793f564d4610ddc5292cd53c61915008f3ebd36edc3156562d504d6ed2d747f4f10635b83feb98a084765c6088e43d7059316910cd75c2b5f8fd93574e3abb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544e5c464d1c95d0783097766d15bef0e
SHA1c05179436d917c9cc0b73dcd357173dbff1939a5
SHA256fde25fd1d38c2523cf84b8b9a5bd1470049edeb1c1467985ae4f7240bad47da2
SHA5124e08f4e24dfd26912cbd688605130a923f019b1cf31362a865ce281d8241b8dc7863edbcc847c70a89dc0f5d1673039b9b721b0b61c34da21959fc69d3c733a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7d55492f968ad4a1a8d19a8e782e3cc
SHA1ed5dc0fbb563d7643e27d6c3bf24072bc2bce7c1
SHA2563c0ba0eaeb0fb2986373aab962fe09fe7fae3c4e26092c6c44acc0fd9feee95e
SHA5124c1f5bada68811bef1204ef93973fad0c6c5ba7113cfd39fd5de7f229a10f5b8794a50eb61d6f7df5982bad228d30bc4dd84162d52be8206e55dc6eb4f749032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dc6ea8c0fd44059f31a378ad9a6b94f
SHA1aa480d312361a22152b149b9de3678f3fbc52a28
SHA256fc58eac4295f03094b0f2c5ac079260403a5ccecc893403a6431503b336ca597
SHA512cd31a365e969d1614837222c0a71745e1497e3acfab6a61717a4336b1b81a77a6ca1911d50ae40eb4f89b937041cdd4b15afc137e953239427621bfe564c9306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f960cdebe3b79a19f589573cad0fd462
SHA1768ccd14aa329822dd4c966b18bf9e89f20cc79d
SHA25636adcf7dff8039ad2060c84769368b5329e28477188efd2ce352e5f8cae4a7ac
SHA51268874c215df8c51f63cdf0277b9070a515bc85155ca6cd8e1d755a098b2577326ef2c8a6a80db58ff0a2df546ec70bbc7a124a4080afb5c6c464f60faf9d055c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514a77ec0f05451c4d4ec34819f5882b0
SHA1461571a7874c3e1da708c1e3343181a6bcb89396
SHA25686e7738bacde429fe806af58a9983646e6f61f0836bd2a730af8002e57a1b583
SHA512d3afec42c0893becf6e062e2fc2701b82a3fd98b08da44cd0431593f44d8aeb5e66cfcc2647d9aacfc1798e76f9bb367607cb34f249b72f81d661a7f78ec0797
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b