Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 01:36
Static task
static1
Behavioral task
behavioral1
Sample
c2064253123285b34c3d3d05ebc6cce1_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c2064253123285b34c3d3d05ebc6cce1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c2064253123285b34c3d3d05ebc6cce1_JaffaCakes118.html
-
Size
57KB
-
MD5
c2064253123285b34c3d3d05ebc6cce1
-
SHA1
2e4e73c59dd9647d5b509449588a779998a44a6b
-
SHA256
0db585862a8a9c69ddfb3e7f1b4c24a3b6315f2a4dea85f8f72d6c31df8e9c8e
-
SHA512
186b46a8f73bee03878a24aaabecbaf0600310670fe1c2c643ec3c7a7358b4e6359ad97b2b821ce944fa80b759d1d5827699c5d8650c5ecb843b0e0d514f6aef
-
SSDEEP
1536:1DgoKw2iy7hSeJ0hkKgLgGwow3wTDrw+wpvNYJQ7w5wEm21D:hB2iy7hSeJ0hkKgLG21D
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d04cb98458f7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AFACC071-634B-11EF-B254-46D787DB8171} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430798087" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000006bef6f6eae2e320a5145cf9255eafbe1eb157bc7e54d92d8153f04afb0f15b5e000000000e80000000020000200000001aa7403e7b8b6160d0b559279c2d211be300ce03e2aed5139202138f8228ea20200000008c57840e6ca3f868c67e3fcf950b9d7a28a4f15434d622be74b77d06bab838e040000000dce77ff7e91f0214ff06cbd6e8d27e076977e4824981c0eed575dde0c199db3f16be9cdc22aece7a98631a75941782aaef1ffafdc8c3d799f707014685f74786 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2652 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2652 iexplore.exe 2652 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2852 2652 iexplore.exe 30 PID 2652 wrote to memory of 2852 2652 iexplore.exe 30 PID 2652 wrote to memory of 2852 2652 iexplore.exe 30 PID 2652 wrote to memory of 2852 2652 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c2064253123285b34c3d3d05ebc6cce1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503b6a630ebaa195f84fd252a6ba977c5
SHA100b19462a15736f3e9c0bb5227f4d739a5022ec4
SHA2564ebd26e682f7458410ef2a94e237030fac11c252a184903a87e532eebec16957
SHA5129795181971e26f0a30ae2d08d94c77c494e8e4d93caebabe0f4c0b433fd983e4305a221cf7acf6be27881717933e0d63a5284db4deff7575054bf1965fec9248
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ec4798254645ff1ea8287baf8d4c2ac
SHA1934aae24dada3fd31081f9b8f0bd645f491cb905
SHA256f0fc886f5ab7458e8e37bf5fddf00d0f7b66970917a7fd790c650c0395487241
SHA512b632f0afe2ac95e963934cacb1529880468fd9f331f5af50fcaff61a4edf24fdee733d7d9adbf91f9f58c7ec78ca64dcba0e26d02aff34d6b814c8d76be9ae8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553341f13a4e749afd9d367c66c92ae1b
SHA15400289ef87e630ac4dca507d5a1d4656df46d0e
SHA25640fea6e570ead0c83adf3cd06aad3bf4489224601cb116ff2f8b3fc506312ec6
SHA51224baf2cb95cb7407dc3aab494e4fa53a5fa5a9a0b93063b83b5967b4f302b1759ee4442d92c24d3c768abc0cd284c1117fe558b95541f76118028493805ff0f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591268385842d963526e13a829799dd1f
SHA16846d34c03919436d9f6170a9c3ad26985e7dd79
SHA25645b14345337d7dc9f87a34c9f0f1cf93c085a15a87e31349f023fd762776107c
SHA51214c7e27bd4d8d69e817a36329b1e552be9311b439eaf45f180c15b029a6a0f01f6edf281594f2446f5f8079c9605ddbe808356b2acb1157a9370a3358aa1f50d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5692b92704114690769d9eb7a2113f233
SHA1202452ffbce392c2699ac26a2d4beed3ff08d504
SHA256360113a6dfa044d5cd92491082631610b855b7afe5fca68b9dbd4bb2d656cfc0
SHA512bdc743cafb8b078e25d3acdfb5bdadb548c430eba90752abb10dcf3b3d4cf5164a1e89d5de29a12bfb23a58a2d1adc7e677ca36549ec638f6f7ce4f46fcbd5d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56272eb8b87817b9dd97bdaf863a0fabb
SHA16d6e66f09e31958b320657aeb41e3fa6ff398baa
SHA256172ee59f1b9f0369f27153ff5c49280a205843401091ac095fb40b91caf04ef4
SHA512c2e6b9c359d7da8cb576cd461a95afef539b2a712a56456ee740539538ea377a096caab3a95ac693c53d45538f6d24e0bea9634ad8fd63e599369dbb3ed8fba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55aeb76147b7a8f046ce2297b0f389623
SHA17dc2f04c0ccbbd92a9ebf28578c5c88e51ce1b66
SHA25699db3486ca94e0838ad60e944051564b865467eb762d3f3a527b545970f7ff6c
SHA512faf7d6ea3ffd92d7035d1f88683a9009fe7a60a70b102a614474802ece8d10d508c76ce89cc963261df87aa32e1678a8b4bb178fe09a6aa20d759c8c384902fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc3edf40e09226680a2746ae71ff79e9
SHA1c388dc59615b868ec16202504c3af35461f47252
SHA256313e9fb3dcb6daba65f54c470b855cb7ba0ea0de3ed2a57a620852f901a2a22a
SHA51288b08d1b17b5e8045ed4b327f816b0d934fb46f4d757fd876b1a70cd59c6ec7f0c4939f1cf20e00854bd2edf25339fdefe7fea57f73148d7de50817c3abb26c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c225418bf34b9d264f7c621b8e46e2b
SHA1946f0795fd2806e65dd2bc13361d23ca9538a000
SHA2566d200640a62f9eb0a0a2c5278baf4562e8d51529171a229502a6c1f695692ca2
SHA5125a1e5880ea01e7d7912e4825d71d1fd01f9d5de003951c9f6dee55376c89ad824577debef69af6d8de1c0c5b01ca4702da9eab8bd20739fe6b1b8d7dfff6d1c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf52ec25855155140b7c3cfddd0650ce
SHA1ea9c6f72c8932a250c80ac2486d037aa6b22f449
SHA2565710418b5f89aa10fe15815a26fca4bea46852157115aeaf881add37c40db7d6
SHA512c5b0342fd92a7d6419e26ec64f97cf01f4f22bf42a079ca6243e47b848333d0e2593ea4da7a339a1f513b595702aac48f6d42bdee3d44957d9b4fd496db88f91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50467995750f643580c0d1c55a60aa768
SHA1250febcd5f353445564fb6ed6627313136971ff9
SHA256dec5cf8d6bf68bd994aae2448d9018ff79a16e1098bd4d1e2f51d9cf3702e012
SHA512996a6902baf09a9df62baa292283733cd284c1c1d55f8c5b09c37ca162aeadbdee96c7621bdf6549fac4add61a753cdec42794a7c45596ba3ed76f8b38a2f5c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bec830d9014426b7ef73657ca9b8624
SHA1506d003826d0f78de574a229d8665028870bac32
SHA256c1662a5edd3caf726345077ee8ad76cd1b2664395bf15f1710a0c6c5e62030b3
SHA512f6ec2d4563e5807a337cb017d5f1760504f575ce7d02fed72dfdd5028a13825ae6fc99e741b481ac67b9c2f98498a1813ea9017c30a7f4afea7633287410543b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6977a86cb46ee6b423f8488f81faf71
SHA1afa4f27667d6f49d26adf6804fcb715aa3ceb374
SHA256ec4bd3df27374b5ac80024ec846baf05e66986f2282450c8f327cc496cc2de84
SHA512243eed2a8036f95563319fd87f54c769c68fee2a83fd864c40a03768cbc3d7bef5f336c2576e15dc4aa7176e2909ed3b3b1759878a8b569555e6d85bedb56a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5746cc233b4623d608a4980f94d27da0f
SHA152ed2471164489808e0bad6cf1231b912273ca67
SHA2568976b057138535132c34c67a281c90cbc186f78f1fd2cafcae9a20b742c8d076
SHA512e12db9ce57605e9bb9911d7f8e9306ae632f9fa8124cbec10932db26385ec17ce640fd7fe95cb526df929ee217c8efe9afbb4b79dc9a27e098c34307e5709f4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509ed3607aec7c6a858f24b309771babb
SHA1f0941bc11465ce4d8554848ec8c0ae247a72aa0e
SHA25633068ce4fa670c614fe3887f45a9879957bffc2530460c3640f2e8fe85420c69
SHA512cb7c79163ccfa633f6755789579c476a3f230ce0d499aeea71876443328e71737a79fda087238d578a2d55d4121d346b5a2dc391d3ac894822be7ce84542e68d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bc65a358d239bae85dd97d389eb9ea2
SHA1860c7703d34acba0e12e64fdd1fa72cf6ddf262e
SHA2562bd6c10f0894c33c3a3e5ed7b0beb931c4817aa87d1f0856b000acc32b49e11c
SHA512fb792a55527981879a965b2e19dfb2e5abb9c945fbd8098133c43ff8ff02a9d040abedd51fe9cf3985edfa3f6630a2305ed109cdb55f773838209d4b956c9864
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c86556b79ffcc6857fbe777308f2966f
SHA12951991b548f6f0bb2c9921f8e8ecdbfd2e60333
SHA2562ade5e53238cd4fc215d6e7c422ac9cdc5e3cb92dae03458578e367e80178d68
SHA51218fa5c7e865f9b5e20ce2e8539dbaae28aadf4ce4269292eebda93bed0f0124c9ad3ad181524112ef302f79b8c34a8e81e351b5ef0a4bdd80b199f3d4e0af6b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acb0a1bad6a6be6f408beec56f11746c
SHA1c0d3924056b00fd9a2648d0487b2f78dd7b938ee
SHA256f0657f2e5d00d4ef100576cebcb21b9cfbe4b709b663c653b3edd7f73273bda8
SHA512fd16db1f5f9f5a1cc05305d2e1a737df0effab0cfc88d9f89815258288541b209343202e165b3938c3360390ce366f49d4500f713edc4f81a60f3ef08ae3a978
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e0288939442a0a2a1c23916188a5a67
SHA14111ba4e77e3d5bdd32cedb4fefa1f07b43c2a89
SHA256b68fcbd6fdb2b5242037d2615b799a95eafd0124dc3f7f3e3c38c9550d96be21
SHA51262ba5003bd42d2003d43616dc3876510033c56e638908389dd478c0003246197c3c9e5d386430a233c4e86b39b3c6514d5cade74e783eb7ced5611bf9dab0f2e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b