Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26-08-2024 02:09
Static task
static1
Behavioral task
behavioral1
Sample
c21331ecfbcf8640a9364b9cb034cd56_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c21331ecfbcf8640a9364b9cb034cd56_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c21331ecfbcf8640a9364b9cb034cd56_JaffaCakes118.html
-
Size
94KB
-
MD5
c21331ecfbcf8640a9364b9cb034cd56
-
SHA1
7fd845d8870b7521757a760eec0fa144e9aa8b74
-
SHA256
959c4c0908253107e6ad5608d8803b8fbe345f9476725573380872a588043d72
-
SHA512
1b60b6492e34d52cb6c1afd905fb837c5210bd3c2a77d54a3e9c7312edcf5966c354c8b6d70866bb686f4c6bb054e083b46600a84168f1d8eb1558fe7316b4f8
-
SSDEEP
1536:WMLiNVc8+GLTEMXFLU7LT61rDeez4tPKRjyLZfZBdkrY8mgHC+qpEyW:WAigysBdkrY8mgHC+qpEyW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2C4687C1-6350-11EF-B6C3-72D3501DAA0F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430800013" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000fcd5f4b7a08f21c0ca83be158e9cb5857e620b437eb408cb1630d3d617ca5db7000000000e80000000020000200000004595df1c83432dc4963cfe19ea07e9b34fb95432225ed30b3407764ec2780ff4200000000f7ded64261062d96ec817c360b9ffd26e81cdcbd414bc02dac1fe469660498b40000000face7b46447122685aba0a6576fe11a1501d4e9e35ae4e434d2d53933e470dcd5d7819a99753c8a7cc2bba9dbd12fe048faa997fa11db58ca4b493e94e40d11a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e04a86045df7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3048 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3048 iexplore.exe 3048 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2352 3048 iexplore.exe 31 PID 3048 wrote to memory of 2352 3048 iexplore.exe 31 PID 3048 wrote to memory of 2352 3048 iexplore.exe 31 PID 3048 wrote to memory of 2352 3048 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c21331ecfbcf8640a9364b9cb034cd56_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3048 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dfd7da078157301fb4ff3fbfb370985
SHA1d8a8391acda5c093ff47813f7b5863aecfbd4f21
SHA2569abac35a5dabe382bdc8f3b60ef962c22df7fe78f6d26aefdb35e1c69bb671fe
SHA512b469ba570c10ac110c7ae7cdfb8d1264322da11207d25a41552c1d99b1ad3394dac0b39619214b33ff641b4718ab2d6ad9b9c481973e0aa3dae78f36d7619bcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570aadf0954bf8df8b60324e968d80bcb
SHA19a0227c0bb1130794da19637f0c1fb3708fe2634
SHA256f8a51f66ebaf19f9e33d2b2957b40e7c852c0f198ffb83a0bd42ea7c2d2e0b54
SHA512f028cc86ebed9df2964e4ed889996e75f54adafe92989adfca3566bd4d3b8716399ff8445c784391758d88b5296149de5db47b44ce0b59a1adf960e48358be43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526e946d3578f870ea21bfd43735d83cb
SHA1965d40e944e986bf9b51569a43dc1486e3aaeb60
SHA256db48c63ff568bfbf8267a115c4d6053ba57968a9156b4808cc03c25dd0c67c85
SHA5123645a9c8a420365b9a1166e4d5e4c4f6df97fe68e23d3b733838fb508d60098ed9681e08d4030b128805bdb1cb0ab40bda1626f18b66decb8fe96c257722b4b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560a707f22588c156319b5e77eefdbe6e
SHA174de748b333c215f70e95faa84a5d6bc99a2ecbb
SHA2562d99774c78715aa46d36170c81056098fcc9d2db90c47f78d946f9bab42ab41d
SHA512786ba025d49ddbc494a8810f60df8166426a6120e72a516028e4be21684eaa1f8a59839a894ffa3ff4dad8570a28a2f123466447a0f1bc6436c4e6c8cf6e7d18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52483319e865e6240bb32966148457f04
SHA198aa52ade27a716c12b98edb16475b0af34c03ac
SHA2567b5a25689987a3600add7985fae6b660ef93674706955fbdaafbb08cf2ba2f9d
SHA5129451752e62546b075b3375860c49cb5c9b53e2c2eeafec48879f22a321d22d882153a3beffb4a0a2b20f21eca6b859d3b51780198d713498442005ac846f12f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59192ba2f5b7fa3e4bcb6bcca757ce69d
SHA11d455ae6126e856ccf08d4ff887e543a9b6a201b
SHA256bd53ecf9acb8311f3ba851524252d6c26618b2a4308183159d483388212470c1
SHA5125408042e33351782171c58f2b0a072731be5116f2b6de759b0e568c8c0b11b6809eef8798bf2d63eec5ed753dddd96215666c38189468a92c31a2ad0db77fd7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ee2cac08414ce76ee10a2db212fe215
SHA1564a3cef502df7de7e4603d47cf0cf809c379b71
SHA2560439eaceb34d92ab7ceba3e1c45431a3faa1e81a333bac8a3c8ec390969bccfd
SHA512f84759a5bf5d1f7aa00aef9914c979ec16f8a9871db2ac69506c3bd7f0e0ef397ffb09398de95cc49077e64933b3da70f0b62a94d94d06c24b828143da2b4aa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a780e6c4a183f4c787c7c947eaac6849
SHA13dfc08955adb7e9833825191c48ef1e16fa550b9
SHA256117e24122fe52195b0ff2e31243a9e9561cbb0dc05e8a60dfcc40718d44b9e59
SHA5125fa36c688bc844e32ccca7a7a0aabd03c3880a33046e974a188092dfdcace07b495f69e2533ed631e8cb49c9a55e4a370614d881760618a28eef6986b0e1eaca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d2adad949b496b0ee37de0a6cfc60fe
SHA15b2d2ee05c1cfc8a34e4a2d1ad70b34710fab9ee
SHA2561c3a21f9f3aeff4014db2ebefeefe768fb8809aff0e42dd41f6c5dac82f60463
SHA512827858eee910f36aeb309aaffb8d9406abdb53d60e6a1ebba754d53bebb883bee0a535825059b0b855ca041ab354fbfbc33c2c34e0f2f441ae0fcc0a927befa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5255c0aade20f19766cc2fc810d282f63
SHA19878538dd3bba591077debf31a099f6784a08a7e
SHA256242a2e8026f655300e2069335c6df1620e8b3ea15e86bc64a7007411852cecf4
SHA512a46cd658756157faa4b2bb8965e83b2c3dc5fa279510253c36d2f8f5516015707823ec4abaa5cdbb33f0981f9cd63696d18511f490a44413695310ef1f23264a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519c1c8e6f6309031f74e4120012d13fe
SHA12c5188289f2fdfa329db33af7720107e28b20764
SHA256b3d34de2faec9b6db09e4769c1d17fd5c17f6c55d9cf3e17b4501948a44eed07
SHA51226a96c44e14363329a42b3bba52be7c09f159c808559941f9abe1b1b7ea246d451b91ad5fd470bc2e303a077f58e8a9dcbb279b680fd95201475d9f5988ddfb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b1c4c1fd53a7fe36a5d67d13ed9001c
SHA13597bab39170e73b1918f4c57af3d0144c84a7ef
SHA256be059390a43de75991dc62469bf2de75e51dd715516c1f253cdc419d23ce9111
SHA512046ff5a1443e36192c9e7335f0315d0eaf14078e409e606cba77c12e03cfd8329b83a41012d47c7527e59de747a0a1ddc9157d7a43f0d4469b7ec0c66934f7ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b08f4ed1dd5abd2cb5a0c403fe0bc1da
SHA1d6d3992edf4e0a509a5a3cba508f215f2bbe5bfe
SHA256810940f57518b0997ca3caeedc3ca2fcb5010e054383f98bd949df7001fb425a
SHA51276521b3cac00f31d64121c973f1d37e36e5308e2fb985ddd6b3f55f5474159d2c5b1f756635b8a02e7ee16a3c10d6f8f63aa4e32ee4b7e60d800483c2f893d52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d74bd240795b741c63318b783235075
SHA1b57abb8796270dc3c5e1ccea3664d713faf729f3
SHA2560f11f3eef5a30c1c5599f6b7404e74aa43550cb18a34259aadfc42fcf814f38e
SHA512c9e9eae5c53f1ac1226d41dd7612d0a6179af4ab220a15ad373b39b5317d0f9bc9e671443871cc7942c05a7a2b14bf66c396f3dc1c8278725d8868f859fabc66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e6da339a7bb990c2685abe92ca511e2
SHA11f46fc62a403f85a13cb4f5ce98ab119fdd8c7f2
SHA2564f49449d93d668312ad19f59097735168efd09b5715b20c2ef1cb145fb8bb282
SHA512167cea39076802a5376aa506cbd475a0c7fe35321b58e6aec07947b7e610f473df0ef3dca29986d0c18b5d2e520e34b2a6078c464a55ec1b9046b134efca4021
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583f8ff8abf501043ab68ee1eb797b50a
SHA1b2bcd10d3ccb5b431dc4d783faf9d76a4c9ee17c
SHA256d3d31dcd419e547bad1dd136d44d5497e76c4384cdb83d5b4cfc1aaac71e21be
SHA5129b0691203d4184ee07d6177b1a342e364f22e1ea0de2795b64128813a220f339cf8ebe8611a3cad818d2622ba42c9957a5235f411284421c29e5f946a5e59ce0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b175a91d04c0c35fcd0d380565c2c3c
SHA1acc88b2bc233352d9ab3439206e47dd50e5aec29
SHA25676c285b8d237d460e20eaa23d16c8312079f657b7bd05cf1bb73f45ebfc03b82
SHA512f7cfab40556acbb060cdca46fbfc4bd1709d09313066211fed822632d1a9472397dcde1704d1eef5aea7a0e8eece625569ee628108b6ffa77e55133f50bab406
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532dbd199a4206565c7a53274c2c19827
SHA1c84be65280b5c58f82b9cba931074b8d555913db
SHA256c3a06f05bc4c95dccc8f180da416911df7a4560278cacecad598ad475c5ff343
SHA512fc40a38990003f2880fa18dd4c08cc8212f73c31713d6b930bb45c5aba55c87eb41035dc29c7d7ad4ef40ec7a55127310b916dad4d6f52f2d70132b8ca00331f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z2D3H3V6\content-slider[1].htm
Filesize162B
MD54f8e702cc244ec5d4de32740c0ecbd97
SHA13adb1f02d5b6054de0046e367c1d687b6cdf7aff
SHA2569e17cb15dd75bbbd5dbb984eda674863c3b10ab72613cf8a39a00c3e11a8492a
SHA51221047fea5269fee75a2a187aa09316519e35068cb2f2f76cfaf371e5224445e9d5c98497bd76fb9608d2b73e9dac1a3f5bfadfdc4623c479d53ecf93d81d3c9f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b