Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-08-2024 02:11
Static task
static1
Behavioral task
behavioral1
Sample
c2142b728030ca83507215bd8ee373d0_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c2142b728030ca83507215bd8ee373d0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c2142b728030ca83507215bd8ee373d0_JaffaCakes118.html
-
Size
4KB
-
MD5
c2142b728030ca83507215bd8ee373d0
-
SHA1
b62089335e6456833c877291caaa13fc1401d1e5
-
SHA256
0f2898364c2aa1168c818b56c194e6cfdb3df79e09beff020b7d3005c0c64116
-
SHA512
6d2c3ac7a6cc5b2dfc4e520f08c2f5a0f5df444e660b6b65502ad432b742e3b2eb83aea065f182864010c997a9a92610cea84dd7ee75ddded0dd1a46356e0ef1
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oESBd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{877768D1-6350-11EF-8B50-EA829B7A1C2A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430800167" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000173b6e5dd48f9a98f336ddf5f5d3ea41e9a0284952b233c4c309a36c9f669aef000000000e8000000002000020000000ab90ddb009c971d3c1d88cf381fa7c0da50b3f34aff4fd89f3dafcd8c6d77acf20000000e1f24847f15d88b5714cd38b294426d0d3a27f031f3d9b74a956be64bd3676e7400000004aabbd1e3c2c708871bfb857582f7d7819dd2766640964372d7ca11889531136d53b8d95fbab83a63ac45c86a139bc8dfa4501fc2d028a6c2454d8ef89398f79 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2046f35b5df7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2548 iexplore.exe 2548 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2540 2548 iexplore.exe 30 PID 2548 wrote to memory of 2540 2548 iexplore.exe 30 PID 2548 wrote to memory of 2540 2548 iexplore.exe 30 PID 2548 wrote to memory of 2540 2548 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c2142b728030ca83507215bd8ee373d0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575722fa60c584db0a57f428af5b45718
SHA1930fdb356c2b1e6dc0951bc6caeb0e3905257a7a
SHA2569313a904fed8273a418f03322a22dc8256503c74da827f121ca417a17bec8768
SHA512e647e56cca03a3b2e6b226fedbb91023a7ee99b3ec26f82acb20865c5f4b2fbfacc66fd2ea9a5f0ca6f9bc8978d26ad380d482dfb71f56cc196f58b2577ed82b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eb228737bf98b276d4061349551af3e
SHA1ed978e14b12bda7f2842252c481b22ee6eb1f1c8
SHA256370fb4a780a26229806880128f2874366d310c6af137912f8d8127b1086e7e3b
SHA51220eea4874dfb3df320cfaa0dfaf0836319a41675037ae8fa5f1aa6c57f691f9f53590689792590c7d3a4f0463ebc0afbde6f2d9862636052a9db973d455b0c9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54485789775771757c112d21bb021c06e
SHA175eba7313484ad6b5da5c6e2e16c0ec06ed16901
SHA25681119fbd6c94abfada3d31d2900f9dec23943ea5518d5d60e8047a1447ea65c8
SHA512b59927c784376ae47494476a2b672a0f6b2c8be936a82acd63eb4a0f80bae54bc1651ad7fe315ec34e02ec3dd0700df31a4473e1e7a2bf7ae301f2cb47668198
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdbc3fedc295dd1f5d2d128b58b2da6c
SHA1304c2d5c1bf3eade4d3aff6b1032b4128fde0091
SHA256f959e75555a134bb86bda63221266b5306be48e2b7376b4022f096d4925f2911
SHA512cecdb8d27d7cd693f21216afdfffded8d4e8e0ecc9ceb48d161c44481b4938ab6a95522b30ecf2f584620a965b4a251414b11a25d5a7d08b557049534ba51adc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b08c0aa69eedbbd241b2b6882e089b88
SHA119a3602edfd48213922030d2c5e311241e5c7dee
SHA256bda3e981ee1cc02fed0f0d07168e124dd74a88fcc20ce8b76fd652710f35466b
SHA51259135e5b1867ea39bd58fded616a80785635a24bdf4f6bb83bb743ff14515e5902bd17f0a00e5423e6aebe507ee28ae4bdad771cfcdd880d8fec0fdfdeaf7880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5505ed74f249644da3f0cfc5a45fd9cb8
SHA150887d5874b99b8310a94306de95e56ebbaa2f54
SHA2562ad5c3c6c2ff452f93c2d1d36e8f1d70a43ce35b941aac579af07d3960f95be3
SHA512da7acb37cb343b8d4f1714900d13833b32050f85443f265bf5bfde207e7dbd7597eef387509fa5480a248f54375a66f7ecf1fad2fe5f54eb5569185823162c80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7d30074bad7022fb70d64a6b9035584
SHA143a11e70f82d71cb25629f40e852bbf4bc0436d0
SHA2564560e0d583ed562257fb5ad220c1cbdcd3b323b97ae7f9fa4794e0fc17632c68
SHA512600daf8f3ff53e95f2c74cb07607c7acd4994dd94e1b206cb5a4032f81fb380af2f9274874cfe921d8eaa0a6471fed1ad73a23521f1614e3507f505e0f4d8d2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55298b3e4b13707c3cfddf1814d9b67d4
SHA124908694298e6fdbde0700a0d6622170b583e5f2
SHA256a9687a91cd96e39d10dd7cd293eb268282dfa749a47b1593b0815a7866a4860a
SHA512a836f45ce6860221e8b3151fc8434ea5890751af9ec9896b61bec6f05cf8d9211eac7fcf20edf43bf58d897719fe3358569c3f06998d128d02e91e4315c86bea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5ac6a9a037d9de773ba2cee9db6543e
SHA1a4234f0545aedc98864db67778286e73998b5713
SHA256a853ff2eb3afdc2f3712c204d27bc06d0cf225fce6842c52188b453d8e23a746
SHA5121dcb1189bdd90b5a08cc7b8d459c4933e08279b70614f6766a8b66672856b7763610d076ddc8d949141d8c754d990b40e1ff35cfcf8af190c022b724bcb92c4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50daec8157a46802f94d117532487ebcd
SHA16cd38def38ff241f4b13d66bf7269d929669e9d3
SHA2567db4811c752e9504b85d3988c9cbef79b198eb537a7447cafd0070da932ad8e9
SHA5120d18cd38fc926efc087dbd239a1df99c20827fe8830cd37dc1e714d10d8c951552f36a241326423a3b227c1505e10b1e979226cc810fa3a00fa6f9a7073a28a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8a4c9b988809f00945935e7f8bb2311
SHA1fa9b9af122608de164d478f34be772cbbf287eaf
SHA25697380a463cb06e826946408bbf2fb548e468af835da79b14c8eab1f679ac86d2
SHA5122bd95c20ad437c85149fdb53c662c221c3d5e4d501c812f913ea8a9afd5753a1b771522c7eee7fde7e31078fd936d9ce17b7d41bb66d6b19ecd933fafd24fa20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6920c729294c1e9ff58ada2a65315cb
SHA104332fe80d6a0d9a45fe4248c87887fd2755470d
SHA256df198fe8652bf55e783e7d1a0828de64d972ec14e3718aadc4ee5b2801cf353e
SHA512ad29bb9676630d31048e2af7f26680fcc804f0c7898449ef9445b560d4a8ee5acae51440872a79d934a897eb34a45d2fd66c8a30d1c9fb6a94d659313f5e1d3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c828a81d45770ea970cfa43062ebedf0
SHA152df0bb9fa0d34be7c7d9b3844964bbc9389e3a6
SHA2560703f40fa0c922fcf0b16bc0a64f230c43979b660e3a114fa5f6820f42bc1909
SHA512079aa9fba5c61855b8228428ab6991c3b6eb203137137b6d8a8612ae8fdd23702798f2c8dd5c8dfc69f9641b0d0023773297f181fc912d440fc5dc60811c4559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565ea0ef624f254327abbfc30bee66f3c
SHA18485b07d586b052dad23e6a95871dac9647b36d5
SHA25667f854ed60e800d7407e3410fd3015568fe31d6419eaffc11ed575b3a80b72b8
SHA512e60b9ec35873e562adcaa98cf16bba4b3798bb06ea1b8efbb495c951c8ad8be9f597dad1f6ed82bd1e435ffa22b4f2520b10c57bfcf710905ccd08417324ad25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1d84611e259303436bcacd42b2c3720
SHA15a22bd8983c79824359248c44752fe9c3db848ed
SHA256866c0e50bd7d6808a885528670786e14e332aee5cc81f427cc80ad1a4e2c2e30
SHA512a032bf0444616916ced7adabe866a27b4d003f2189d0b1a7adeb0a869e34274ceca15b594e9ded6f4ec7fe5d596a64ab39816e10391ada681a6e6377b05b6dbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9f400415c26716e0089b8c888aa052a
SHA1a3e8a2db07391a7a5f9926d39d488ea54781e3cf
SHA2567a2aec822cf4ed71cc9ef7513917dd5766d016cdd6ba5212d4d0ecaedbf8c61e
SHA5127f4d47200c1dfbc2f141927ab61e4f9aa757880bedf7d718f927a5b0c3c3ebabe5cc9cd215492d6ce260fb455510b3238fe63755607c465437d0ccfe3859f07f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521d1b4cede50afe20264527dfa67202b
SHA1bb8157e4194a8f5aada2b82d06b736cf787d23f5
SHA2566e5d5e8a6ab54f8d385b2ed442f21989e3aa95dd7c00e8b9a5c05269ce4086fe
SHA51257db9c6039d38d7f6f71fec6d4bd17914557c825c360f5e6bb718f9dd2a1a470c2d45c692cabadf9c609d088428f95f0f67e89af6b2d896ce958313e3bbf49fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e616532d7d9d2359219a16d5a1dadb27
SHA18215d3c1201e83860a1e13023d83c59930425f2b
SHA2567aef96e35ffee18dd78a1a1dc618e8471d30eb47892a7cdeb43f6a055c9b7ac1
SHA5124148da38b88b2e0355854b7a3855704d2cbce27f2b6696e2fbadf2f03959159ab1edd9b827bb006a64e92a41dd6093f465cf9cbb4c12371436ddaa6faa5552ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c77a9041c4ddfbd10e4c73446831755e
SHA15de4e3b9ee61e1f556761060474f17828d9e07c6
SHA25606a5202a211ca8c05601bbe06b326cb77ad9b2c11d220d941b632299e99c6a16
SHA5121f283bb92dea9c5565401c73874e160885091ab830a58d60a89c04ed21519455012cfc466a8fcd3fad2eb8a3c19e912abed17ca9fb340ebabc022e4b7c914fb6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b