Analysis
-
max time kernel
137s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 01:12
Static task
static1
Behavioral task
behavioral1
Sample
c1fbe6924b8d1a355a853e411c995e10_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c1fbe6924b8d1a355a853e411c995e10_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c1fbe6924b8d1a355a853e411c995e10_JaffaCakes118.html
-
Size
6KB
-
MD5
c1fbe6924b8d1a355a853e411c995e10
-
SHA1
98832e354ece91f2eac3e876f5a4602dca64ae8a
-
SHA256
4425ae2a358c13eacc4485ab74bbb2da2eb27ab7d10e491bd9a174de779acb67
-
SHA512
d6cd29e95b71e2246032d2a5100617b551f45910aae1c0f67c6a383aa0e68aadeaa0714003734a1f4b04f4ac9513db4a8aa60e5926e000d4efc1b842001b0658
-
SSDEEP
96:uzVs+ux7KpLLY1k9o84d12ef7CSTUkZcEZ7ru7f:csz7KpAYS/rb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000660e9780c14e4053388fde1b1edce40a4afc3c11db354a7b5dc2409fa7aa7911000000000e8000000002000020000000f305438184b290d5a584585d6a7c2b76220f98a6ae7a7b80823fcde636ef3404200000000752fc61c9c4dd98ff85873c9ab2719f3f3c71d1ba2fe580ded3bdc3764962b440000000c0839a712a0e9eade19e74188238b874681e344957f861da06293f40a40b0260f03c4759ceb42d6480ae9c680aedc2917b860346607dfe9236c3301a451758b0 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{381729E1-6348-11EF-960D-6A8D92A4B8D0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430796601" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40cd9f1055f7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE 2716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2716 2240 iexplore.exe 29 PID 2240 wrote to memory of 2716 2240 iexplore.exe 29 PID 2240 wrote to memory of 2716 2240 iexplore.exe 29 PID 2240 wrote to memory of 2716 2240 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c1fbe6924b8d1a355a853e411c995e10_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5755636b505a9cb26f3cdc3cf0a2c2e6e
SHA19f6252cd0c3fe65ab186c7cdadf9b9958b7158f7
SHA25694a6e4556300e151b0319631a61645d2a19f329724ef289410d957d489711251
SHA5124003bd050897f030506b96942e39771aa737ff765e6a837ae666ec7cd80b90a32a8d5cf952e4f2938f134a678643af02e55592cbe49dda1512ad991be46b53d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514bad5bc1dfb48c2e8040dab8f11e4b1
SHA185b50c7958cefbe9fcf321681c35a9a1a962fb7c
SHA256245ce5114984ac51a10c58244f7ad53a377a94bc92ceb9dfea45cf741570bf3e
SHA5123b237641e74ae198b3611a7ccd95af61db32aa2f4570723019c58e4321682eff9613adbd975f1ecbd34bbf5f3dac6628cb52c8021dabed5fca902d55ec88f87a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d408c3f5eb5d677cd6303b0b93d047ee
SHA1ea706ce378c7b5bc268f84184bc0444ad24857e4
SHA256d8ae8fb9362027d9e45046773aef84a0cf6989f699e232301e3f4e076a5dff10
SHA51276f7a9c09b66d22c21eba8979697c6205e66d357120c3b4459b1a6912fa0a59686b2ce56dc2ca60530c036c9a0c2099b87c2c3357b568ad63485796fe2439e1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555a2396df20f50d8dbefed349cef7bf3
SHA150946b09f9527c368c054467c50bea2bd488df9b
SHA256e0f842b7f4dcc5e9f87b777671387eca80b5c911a331f4b1f1376cde43e9fb25
SHA5123445991a26fe5e55162196e368ec47dac19241a746c70998c8a3a28e468d5a11928f362a759bc6978503a73d8407fea5465c56727627dda43843ea6c835c7928
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4c32558276ced95fdfa047997d8dca4
SHA1b326a0c618d183c30a1e3e8becb00486e650caaa
SHA256ee69c73ea266a2ab495b81d364b83446da7229f3eaa622358c3a40d6faa14f81
SHA512abf115da1f987d9eb6810d94117613f67df9722ebd5e267ef224985dc9f37ab2eacf3ab0604527e5fae9be8ede27004d850b77dc86142a9dde79809b605da7c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5109d1ac8107a1ac1357c0fe5d235efa7
SHA15f71b298fb2de9a6033ddcf547d6670784d5ddf0
SHA256b84ae46523bf3a29e45f7e5485a13801e263f715effedba848fa0d63f36713a8
SHA512dbb2acf583bea1918849287184988fdf66c628bd956ff960213c5176d118eaeda69c9a149c2bb3dc9a31106214d7554a95dd204c67f336b4756a2ff9baf002ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502817b4f0079df04a25d6af7cf91e70d
SHA16acd11456070f66bf3e8f34b1f1a6b4f29811db8
SHA256344bf323e89a6dd81ade9037b352f6bd2915346d9fa46962187c94ddb89a74e5
SHA5123d9932a9f7d9bf60fe25491858482bdddff629283b5d32885756703e70d60925c2307e230a8ca2a407254c703a82973cddefa575ecdb6fabcf91569753b020d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5472e9fc90dcfb986a6eba1d984e4965f
SHA1488154dbfcd97d74110acb4fb51074ff970ec7b5
SHA256373a57941c166c3a05918116f4dc99f97ce197e238f6da4fe527047efa587c08
SHA5127c3064c5281ffda7910908455e91a377bc34e5fa94fba662fd5b5832f89d61490fba23d5a9cb7e0eb506a8ac817940446af47029722d5a1d620399c26aef21ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574d24a04f347020c83d77a2c1526cff6
SHA120780979b16cf2c02c7204626346d75a2d288840
SHA256879fcf8476f0cbd55443f8891d8accd56696c71a2ff2a83e72e1f51f67294a2a
SHA5121b56b518c616f3767f14876d8272806914642d7d61c7d31efd14dc3817395a479626310bbc567a14d8e68c9a5ee6a8078ae48590f11451c0e0b28903ecc360e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579d54d65489b532385632eb4a6e4a155
SHA179db4ce746b7d51539b4a5a61d054222b50b5011
SHA256b9e7b1ae967eb65668c00a9d7d606cb5dde0603c9393d1490a33bd99e7911fbf
SHA5121fd1b1f50f13856adb40fdaad5400288b649c75de9dcb5b245707fb450cf4876a67b81f4696cc268945e839f06e6a095c37145b3004f857668f631d130328a2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53614ea7f5c465a2ee31fc33c320c3841
SHA132c20b7772546d1e41938bb072119a49dd125e82
SHA25681ed109a1e1dbb5228252225b7b56317270a86b19e829354bcd63f316f274c0f
SHA512038b9574eb5d0ed46b89d9825a4c117c706d8367848e3e99bd00d4cccc4629f12a8989caebe6807e9b610a449fc3e45c0480a0598fbc35305e03068f48e5c4a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a12bb1e3de58d81d02065b9f2ef2d109
SHA12b5ff79a2ca26b51842fcd1d650398e207bc9e07
SHA25633e9abc440e9ebe72a2f6f4f439f6c0edb30481742a8ad9a5cdb3f2512ef44d8
SHA5129185f12130442f0d154ef0b4f9b7b611592d8ef38e3821447d5e2496a1d8b8224739b37a87b522e6ba2d0ddfe454937b59d47d6555f074d421931c56cecefa74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ab1411a2f79ed1896c2151768b9dc0a
SHA163b5615ce245ebf6199836f7abb58c226aefd563
SHA2562e5939bf0d4541a85aa93468dd21350aadc6ccc75a8c16496c4fea2cfa0ea852
SHA5123aa091c9b9748380856c9543e86ce0907dac8eec38ea2a286b0085a65b7d4ace3bc0dd2bf23236eed080dbf2510149f415a9ba43b9521ff80a8fa31461e585d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f18271aae76cbf76eb9763c7d5d3bc3
SHA16c55f31a6abd1123d3be04993a68e1388dece98d
SHA256b63685f9bd0a81c38fcf5e25a2955e1a67890bc959b9241decdf24008425210c
SHA51220791b2ed4bcf1c27e796186ba64493299d0ae94e307ae2a7ebcee63dcb0a638cc019eefdd286693825af1bde96d42f4eb3bc343de6c7ec0e6949fada43c8fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5003f8bbb0673a8aaeaefa9d5792e06a2
SHA1c1d054d756c181fbbee70f577214a279d6c30a9f
SHA256738b64afa38925ffd7748a786ba873fcf4443a7e7d3ae826b91a0fa3d0c7f951
SHA512bdc3e58368209d4ede3e32189c84b31969b28ce967c5da9a54b9bdd79a446afe0387912bae3e911b90af00911e9d800241e636fe383c20872b6935f914e768c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507955cf194de775786fe0c271fa34c3a
SHA147f016efe0df91281b1dc2a59865ccefef1d1b2e
SHA2564d2d0e3ab2daccc6b936354ae5f733380e976866794dc74a2ef9aedbcbf2d3d9
SHA512bb7408282dd823db7664b7398611dce417622da78f5828bd1f26353dce64216fc840981e6e0d57175e3ed4b07b61726bab2978cafd2cd48c73f233bf46e36d27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee5769b556c63dc62f0ea64fc7c3b5df
SHA12627c3f167c612abc1c4468f3a5ecffdfa8431f5
SHA25684ae63026142c8f9773935d9280901f662bebfb289ff369b621cb049c05f22aa
SHA512ce7e5c037c577768c1deaaaba0e0ad9664cce8a3fdfa11d28be04081352b9e2d4578d106954dc41905dc3a7062b55631be92d48a77748129867f35fee072344f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ff3c0589dfd012a90b8dbf2d5ae17f7
SHA100be5b018f892d49d4927a68a5990737c931d2fa
SHA256201e10e15e347a3fa4d044e89b0da8ced393c4b221c2d939c01050051fd39aee
SHA5125864d6285d9765889e8c7fb4c8de8ce6ed66280a6b3e5dc444e185776681183138b7e49fab5029c0a35c2e1dfbba06662f0fa634b13c7069a98da716c5b552b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a67a69a89811227c15e10b50a37a279
SHA10e9380c9da5e644a2354cbab89f44a8fe881807f
SHA2561690d7cc97266a8e4edb42c2bee0f1c654c9ebf68810c6ad7354c43a55345f00
SHA5127e10157f9e2016a8dccbb95dee712dfca075ae4e39841c0723e2de02de77ce07c732f18bc0befb5562202049c5a9a0de9fff3699f764144f7b79717b71161815
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b