Analysis
-
max time kernel
137s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-08-2024 00:30
Static task
static1
Behavioral task
behavioral1
Sample
c1e9f0d7e4b264ead4617fb77cf42c54_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c1e9f0d7e4b264ead4617fb77cf42c54_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c1e9f0d7e4b264ead4617fb77cf42c54_JaffaCakes118.html
-
Size
5KB
-
MD5
c1e9f0d7e4b264ead4617fb77cf42c54
-
SHA1
b038b6e57b6fa6320756e461a7344b781da1b60f
-
SHA256
c33764d3462e558a6c0c6bcd6d0eda8f1d9aa79ba3c0bb7f87972304423b29c0
-
SHA512
92c31b59e74fa9f8c1593349ec706ec9c6519043a4781ffb8e7a58792ec6637f2fe8820416f44aba89817e3715c1adf1b5819b49e3dfaebf9dfce0a14b1fc3b7
-
SSDEEP
96:0rU7I4pYDDDmj1gT49grAZDctyCtW2uDnJw2Cox8fJ:kyCtbtJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6E6B5531-6342-11EF-B6EF-E6BAD4272658} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd000000000200000000001066000000010000200000008ff518ef0e73cff6bc282a775f1ada4002b0d0a7daaa9772a8fb991f16899589000000000e8000000002000020000000062eb135ad805cf42371b474dcab8eae8bcdfaf75c61ab44a9538fc7129d0d6820000000fa40c4e1be866d795808b0b19744b2f610e1f913be53433c5256b538caf6fc68400000001400479bbddb82dc39abb5965abb4d36c5afa805a4cf9ac27fea2a9c0ed1b20d704bd776e1bc7dc633d01cea8d00be4579299302119863ca906b3cc5b2ea2dd1 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 203140464ff7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2348 iexplore.exe 2348 iexplore.exe 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2784 2348 iexplore.exe 31 PID 2348 wrote to memory of 2784 2348 iexplore.exe 31 PID 2348 wrote to memory of 2784 2348 iexplore.exe 31 PID 2348 wrote to memory of 2784 2348 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c1e9f0d7e4b264ead4617fb77cf42c54_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5943ee3303d4b5275ddfb8dd9320de134
SHA15edb4a977f72c8704497abbefe380cb0b4a12ed7
SHA2566ad3a32c026d4154c9b4a2ae649f1f1943a71e3766ddcb92757cd6d09d0565a4
SHA5129f53ef499d6c0586fb1e10d73beb0f3a0f8327360902ec53547f12618f78a2463ceeae04c19e4fc92e2e4ba5cb8c741979238722dc8f1b3b0bdbca7261701746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503f0522bfcf8194389cd589612d0f9ee
SHA147e9ad87c3989fbdb45879b0933034acf3edaea7
SHA256355e9325f3dd45d8624f495491f9e7a1bca8c271ec5597bbd7d1d61ded1cccab
SHA512c2e6d7e26bbd381243aecfee2bb8cbdfd2b74722c80f9e50d9c5a5616044cb9bd37d4781326ec67a99269771d2db214127a8ab6f7e1593ba766b238b2ea145a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb2f31a970c7cd310f55babcffa7f50a
SHA1cd0fe2ce95f73d71b5232c400e817931bcbace2f
SHA256e601b5b2b871a82735d223fbc07f68519e30f7e604dd8d0f584800ba86717166
SHA5127237ba130e573cbb0e4bfd6f6f040bb03d636b7c6ed6ba67d1c64345505abddbda471717d403863a245b42987f245c8013730499354a8851b75d6740d15553a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f5f5e6a6a308f34ab7720fbfb22a6fb
SHA13c63298f6b162e1c5cac6fdb4b33b6a7a1cf603f
SHA25646834fe350b90093d4939cb2248bf5ffcaa7ce2898040634d7fc73c4c35097fc
SHA51239961a47665335a586d901fdb3254c2a4c6df530827bf0a63a2cc23155a5273a04ae35465e051b2553b95a4e9c6dccf1d7457d37efe4cb91371fd2c688fa7546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570f12426bebed461cee69809bae72b3e
SHA1bf471cee9b1b1b2f539bb56c25fb0862738a0961
SHA256ea9608103be3971e004a582c74ae2232b64958e0a4b03ee7e28b96a47d8a967c
SHA512cac6a98a46809c543de6368b198795af6e6d7ae4559a2a6d56b2c5539a9c9a78feec6fc92638a6256e339d25151b353d4aef24151889ed1cc2e5e30d0f84d85b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e5df29af0243b340e8d4cb5fb13b3ab
SHA13583e9a9cd6e73cbdd67a661930946d1f0d45468
SHA25653fa4219c93f2aced33393cf79536515cb1a483324fad34f5a637c91a695cba6
SHA512660b55bf68894e72bf2b2976f43da4dc8ea82e7976c6387c9f582615e46a8f33e3f3f3343cda21c8457260eeac8c3eef7bad8af2d95583778b78a700b850e8fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528311800ebdb488c8ae3f7e6a33f4dd0
SHA1daf32a81012727ba7fb331f59ec09fb2e83bb656
SHA256feb7d43900bf50d53b9127c70c1bc5f2e0ee075ef16def979136983af62768fa
SHA512ac21f6d4638560a0239a8222dbace797047738ac90640329182b8e4ae1b3a48c45956fd0bb1b03728594323fb80f232eaa72efc293b3726c594188109a256ba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5430fc1473bb825d55d5c0c56dcecbd0c
SHA1482108e0e2a4555362f6a6787d33a023dc939c52
SHA25691769dd02fc0af58d64148d7fe08749aef8c13e1fb087ab653ee2e856e313128
SHA5121f3130fa126b72aace5354893d6d8e355a68126af7c28abdc96360e0da9617933b1b1d7e62b685a30d48010d5b14418370fd3deb148c215eae9f85afeb80c74b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD583bb5a1c3d93a9942ff0694b9507348c
SHA1ea41fd1296b62c393bd2cfa7dbc8e2c62a262b5d
SHA256cc4b5be41798c29e7ff7208bfbc985ca3c7fcb10a9f1e4b50f5a6e7863901548
SHA5122bf5ae0bc8046e1babc79284a7602a06bec418c928bd350a0c6c270a74e171b3646861e716bcd101dbf5a6263313299d54e2e8e90479ed9322cc59586f8ae80e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b