Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-08-2024 00:59
Static task
static1
Behavioral task
behavioral1
Sample
c1f6b6a9883f2aa387169364395b4451_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c1f6b6a9883f2aa387169364395b4451_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c1f6b6a9883f2aa387169364395b4451_JaffaCakes118.html
-
Size
76KB
-
MD5
c1f6b6a9883f2aa387169364395b4451
-
SHA1
25f9b4b2e4105d795a38dbefae29d2174aab1d41
-
SHA256
627559123f5ef5a8370c87dcd10cb137d7b178cbfecaeb5a712f4f416419693a
-
SHA512
7d450cf3cf455e54fbe874b8fdb8c265fecd9f7ffd9528a08def829adafd0169d14fe9eec3856d7a50320bff560ab323df1a441a158109a73581d6b94ab106ca
-
SSDEEP
768:cGb/EVES1Wb/0/905gc0e3ht/hV4tWOVjHsYgqmmFPiW9zizUeSbevpppppppppA:cGb/w3Wb/aDe3YY4jM0jPiw+Sbee
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70f62c5453f7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7D58C971-6346-11EF-9269-5A77BF4D32F0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000c8c3b12adf631cd0cd3a5732e71d369a322419dfe58bd542a80f45659d772163000000000e800000000200002000000025d3d0a8d8b4b521df72574e2224378de00e5f1cad5cd2be2c0c353adc8a869b2000000014880c5835e60fd3d5fd8a731440fbbf7a0b702424dbadb99c89040362698bc240000000d5b72c0cf065b060f556b9efaed6c98ab2906d20e4db7427dafd8ad2aa4aba936189b89bb84bb08cc3c61916ad80375288b67f4814ee13975844be2d9cbd138c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430795891" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2700 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2700 iexplore.exe 2700 iexplore.exe 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2728 2700 iexplore.exe 30 PID 2700 wrote to memory of 2728 2700 iexplore.exe 30 PID 2700 wrote to memory of 2728 2700 iexplore.exe 30 PID 2700 wrote to memory of 2728 2700 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c1f6b6a9883f2aa387169364395b4451_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2700 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD576f13e6c8dd21f2ffe2958fc799a6db5
SHA111c98daba41fb006441b7dd4ef9404b6ce3e4f0f
SHA256f745542bed131bbc023b2e3543ff1acb3894e901fa9e0baf4b584d5fc5e8b0e0
SHA5127c48a125c5d9cae85e225f659e96272b590b703a10302ace6536b771a36d6473ebb36e47a41c1ee081edf1c60cfa2e229f3dc01d7358e9876a298e31ff0eba92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593d820b91b03ad92d12aaefe5f1f1d42
SHA109539090b402e1e9315d2b90377dfb5b23d63471
SHA2564387a9234f3387509672f9cb64f1b17829afaba355652a256cf485fb48d6af2b
SHA512fe7bac4ff5444b75862ffe094c8e854f0d75e69e92b7165269edeb67c59c36c40c43c7339ce17c91064be16838940079b462aa9d3eeb9ee815aa7e99b873875f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c82f64bc81d45c91bc597879c04702d6
SHA14e318d92146e0f41118a4f504dd08a35a28b1afd
SHA256e00bb1a0693a4dd33e244a25e6bb5d9ac6a359ddb82e8e2c24d61ccca82d9332
SHA51278d8920cd276398f13be86a19bb44bb9136ec59c0fbd2537630a55072d399d09aa4a51dcb8698c23db3cc4c2b314b651702cfbd64eef171232fca2c5876d681b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55110deb8563f0890d5377e84e3078ea2
SHA183d2f49ef201acd967f0de96f50ddd7139c88d8d
SHA25653746984a17bc73d5a47cbc5f95646601f32cfaae154e21677856c425c65dfdd
SHA512a8beedc7c8b516ba2605edc76ca839065fd7458e2df9944ddfbf83184ab7156a8cc2ac3b392adf5d7004a94d7ec83c7f5925e0e728b584e504c200e50be3b87e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2ab9eced49a163425e47fb506c1b79b
SHA1ff47bdf3aff60bfe19f2a1fa5f0218515c3f49d4
SHA256b11aeb87f4bbde35fef254ea06d9fb1d87a9bc6979373bbf0ed1727e851e4c05
SHA5126d311bfbe329030d722cd7d1833722e1f9addaf6cbbfc7859c626831394d9e92aca99c5b606abf95cfbd7100a09c7f9e159ef24164a4b64d011c3f2835b0907c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568dfa156c4c8a46e2c3fc86e7a6897bb
SHA139c04aa73b65b4daf9f3801e68ac6ce67ae88061
SHA256872ff8370004dee23f427839afe18494d5e603db0adc21fa87bf2ae1dd996fa0
SHA512e6837e3330f5d795da2b1988d65373491e7ff72e86d58a7e50de663f7adbe63d6845a432cc372679ebd49797644dd5632f13dc96cb9bef709dad6934b69d8eff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b7090735fa25dac9ddd61c25ee6eeda
SHA12a7bd8c0e998406f2d35c4337cfc4451c5356a88
SHA256abbb0be3ff130e5161f8384e934ebbecfa9eabe423a142dddd34185bd60fd195
SHA512104ee89388267d0a8a39666965770c9fcec94efafb7a156c01892316bf4744f3e6ff263d9e1e773225ca7beddde63c9859463ac8b1f21fc8dc50405f705ba0b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f1dd19091c09e33c915b25c3aa0dd08
SHA16a5e7102859e8df79b6aa15dce92693dfd501877
SHA256d76bae57957f8b7940345c5cf8662a99dbb5613cf86553bfeb9e2ef2ba7cccc6
SHA51262147437eae9fe703da86d9c5e69a82345021edf3c37871ae885f71607a88a39fda02028c5faaf0a594ca46271b2ed678052b7e76ac9bbe476c793c9b7886765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548dfce37885c2e111257160fba12f4c6
SHA1c529776c9e66fb2f56f687abb52074076ba1ea04
SHA2562436670fd03eef82742a10472de311b0e15d5fda229307a46738409e8e49f174
SHA512c8e21faa1aaae9465fbf896114a090cb1c9fb28a0eb364995db6a5ce913d478cb92a0bd58300e945da4f9891fd9eed33b3169713ad27bbc6e8cc3f33b55a2b6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc34ebffe8a1a1340aaaa2d7958e2600
SHA166deaa15f1290031d4bd846a363579d30839b53c
SHA2566646c2861a6d700cd72174198455a033545aaabc0cec7167e283db83a36b0abf
SHA51257cba688fabaa0114a132c94aaab0dc78bcc168df3c83faea528632645c263aae99f19ae8a8145364fdbd53e567c822603718e0c123c70ffcf3bdb72f6c065a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD53637c4e46fa0e6f7a93f9545be706ef5
SHA18c80b7b9c5f1fdb753ea626fdfafa3df8d53fa21
SHA25690e9c4abdc055053354b7383174ad8369379114ddb0d6e4c533b8c8877470717
SHA5129972a59a6023214956a6ee6db4c6e91fe18b957a94ce31247f7533be54edd6392b35c1c1050758e1f9687f43a90de951c63eb5edc3fff77d5f94961e698e33ea
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b