Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 01:03
Static task
static1
Behavioral task
behavioral1
Sample
c1f873d9ff0b24f7706ece3c9b0f8ae6_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c1f873d9ff0b24f7706ece3c9b0f8ae6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c1f873d9ff0b24f7706ece3c9b0f8ae6_JaffaCakes118.html
-
Size
139KB
-
MD5
c1f873d9ff0b24f7706ece3c9b0f8ae6
-
SHA1
4f28b383ab1792e33a0b6ebbe4fc59564666d58b
-
SHA256
83adb3e50d995ade272c2b584b3aafd3debf1900a10b4e17c40334fe50dcc5ed
-
SHA512
2d5553d9227667648a64cd343264ebdd0a2cdbb8986249387c693a20587076a306f92704243648c3646a8a88da05661fa5a6d0fe5fcda9b9367d011f9aec84e1
-
SSDEEP
1536:S79qfs18lj1LyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:S7us1yLyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000008b56c7c8ef8c8ef8d685547cbeced7e86f99625b9e9434a96b306ff05e1b3465000000000e8000000002000020000000d7436f4eb86f6644662f03329a6e06b34ae09ca2ece2965c1dd6391416c0c3d720000000f6da536ea4d0294db29db1d893449310e8b1a59a435b66a2d9aff2d614e5681040000000875ea0aa6d101ed68be2a9f7915505c46fbccffa4f329c7b199b1e5c2ae408fd1bf33eb799dbe460e502ad5bcbcc2aa719bca9df31a5f3d6adfd57447d5f3bff iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430796128" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1D5EBAB1-6347-11EF-AD9E-EE33E2B06AA8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c05c130c54f7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2804 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1152 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1152 iexplore.exe 1152 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2804 1152 iexplore.exe 30 PID 1152 wrote to memory of 2804 1152 iexplore.exe 30 PID 1152 wrote to memory of 2804 1152 iexplore.exe 30 PID 1152 wrote to memory of 2804 1152 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c1f873d9ff0b24f7706ece3c9b0f8ae6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1152 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cec1f98b4f7aa95f5e17e2236e60217
SHA1a5cdf9881892e9004d157c390d53622c0f08cb66
SHA25653dba3b8c2dbdcd0efb36e90e1a6050cd90afd7e3c78bcf1c2c487651913875d
SHA512389cef43c1db4d61d0e1c6734a3c743ccf72c073498603999a833b38483f851028072b78f697003d890eb8112d6150c7ce57bd2a99d34853a9544ea094e99610
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5584cb2d1f735b8d104dd9d32b7bce6f9
SHA19ad11f64ec172c657d118b38e507b48681497d01
SHA25670fc1332b40ab0ab8818990d035f7e95ed89b97ff8421a419dbc9d9d1b852e69
SHA512a5d7e777cbe6fac768f362d525fff9aa9f9c2d717fc1a1e2fa6ea8d28beb892465ca390fe43405212238589050f084bb3de7dc6567779fe6fa23a159cc517bbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58036d7e6353b4828c30afa0b094ba96c
SHA16f8d58360b8cb211bd3e716de2261cab5e331544
SHA256051b9f2d28337f3464d4f23d1b52115f35aea1dcbd981fdbf925a83ecca64332
SHA512630b242d47537fe73fbd7147d1c4737de97b5679fcb9d2e39b4dfae6b90bb8d7b521a0c5e321febb9aaa680b4efd29ee00a6ece66af39103359f565daabcdac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ded432d4fb6d82b5016da4f62d957f0
SHA134c7f64dcdc7365df1802a509e1d2d93e4a5aaf0
SHA25676fc80e7b888f2e2440f9f4cac01971f030db7119170956a8f3f6d3ff8782f5a
SHA512d26a3c0124dedc568083b501b0fad36e598909d76d6ea6ee73d28806880845cb933986b06fb8ec89d83066aa09dcaeda35766a434d7dd07e88a9e493d32baa6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54672c317a69ddf62922a20f73355305c
SHA191049c8b09751fcac02705b44a71ea057df11125
SHA2563794eb3518bc32bc19a389fe2d3fe21df48c1b08aaf4330647f18c848a7effb0
SHA5125b72c970c6a38858b64e6eb588008b3a0edc2782e9d79e79d03fd173f24429cfd8c44536f9918507a4aaff2898c97702dce3aa1eee68169dd8896540ccf62b68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a09f7f2875ac89f8ad57b4fd6d40c6c
SHA183d284c7254472c637635ecd42dcade802bf4a51
SHA256f89b43ed73fb10a36c8ba55f941d1e3534e1b2c3ba2989f802ad626844918a1e
SHA512045aa7d40ea1e7498b3537ea1ae9ae530ad7a6a2ecbc075de9b4d87b597a1ec9394d381b9c2f32f0ae83ace735836a982f6e32363703bbbc0a1a2c70a5b33b38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5307392454758559c62854c4ce7c2f38b
SHA13ca998b6566b26ef83dea51c130fad284d1b883d
SHA256ddb9def1d57b4a43d282bd10fd27f05d345cce78e80ccafd5afe9321df3f4562
SHA5126fbe7049781fe2237732b31aef6362585edbc9aa4b5d6491624db7c2be6616654976f7209ce5efef5c42928290098b53a5526271ca55e095318d5434ed98500f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591d75a3cec03f4fcf0c719216e5037fd
SHA1e496ce8e7e37cadcb268097331a7f4ca2e07dcef
SHA2560aa7d4ea400d588a7ba6d6fd7155b95429ccd52429e5074b4c3a15619ca2fccc
SHA51269405a3107d1966e6897d36aa036a43c26c361ef006b896528c77933e16cb4fa4193c1f9cc14f580a5f6def6da3b516be5fed8f8b6281108dfc54c9bd18138f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a6df6334fa483cdc128484c8e787e7b
SHA1edba55f9756612b118bc7c44656567f4752076e8
SHA25650920e92ed630243d6fb8290b85082aff7ee2f0ab424065da5092841ecf533b8
SHA5122d8864e6521f8e3538711c843d9ab607c010c23b116f17d27e0acd9eb8aa43155cc7f7e20651fa2fe09ea6b59c8064bb2dc7ecdb113fc4fcba311d1a99912c47
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b