Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26-08-2024 02:22
Static task
static1
Behavioral task
behavioral1
Sample
c217cc6e745535bbdcd76d3c00c0664b_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c217cc6e745535bbdcd76d3c00c0664b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c217cc6e745535bbdcd76d3c00c0664b_JaffaCakes118.html
-
Size
460KB
-
MD5
c217cc6e745535bbdcd76d3c00c0664b
-
SHA1
1ef3f07dd7b0923166994a7fca5d41af1b17c310
-
SHA256
05befe5231f4331ac2184c6e788c50e2a414ae75c280106990a2ca0f779f7950
-
SHA512
66c708bda3f1b6b030edba8f3e4295d3e457bceefcd1b5757d6a310e84d990081d53b912bbde43aad5df1997aeeeb953a25d908397dd46b400419bd4bef00c08
-
SSDEEP
6144:SfsMYod+X3oI+Ys4sMYod+X3oI+YGsMYod+X3oI+YLsMYod+X3oI+YQ:45d+X3uG5d+X3q5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f0000000002000000000010660000000100002000000032220d79dd1a1c4713c51fe904b7d6c6395c7ecf85bb8dade65509fcfebeecba000000000e80000000020000200000008b56b320ec20bb9bdf182b0e215a48180e61cda46f3573a2ee3dd6e4160114862000000021f5ca9a7a545084237e883ed8f3ca883bd72c12a1416d9a9e6dde80e07e220c4000000036c74f651910fc694e13490de519ea9edcdc77687121cf3d141af491f94828a563dbf2c0e6756af7cc3add9b5590d5fcca19772e4a2fc44484ccea67b4d78846 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50573fd75ef7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430800794" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FD2CEF41-6351-11EF-BB5D-724B7A5D7CD6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2480 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2480 iexplore.exe 2480 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2340 2480 iexplore.exe 30 PID 2480 wrote to memory of 2340 2480 iexplore.exe 30 PID 2480 wrote to memory of 2340 2480 iexplore.exe 30 PID 2480 wrote to memory of 2340 2480 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c217cc6e745535bbdcd76d3c00c0664b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2480 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aae6d7e737f1b4db0f15a30908d1e47a
SHA1e5d10f146ea1de33430f8e59dc0d34161f1832c2
SHA256038c0240ddaa850188eab72ed4a7b7e509319a5ce048a8fb76fb4728519dc2e8
SHA51214429486c304fd72ed720696e1e3d16e59e17e9e6dc490f7ebe340f69c93ebb009b06df6aaedca9cd0c757903a159924ea70bd5efa240e36772adcb31ba981a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575a69bd1387c17259c338b5e238fbbdf
SHA17fb91841c1ad8db8b1f0cdc652114d5fca4acd6d
SHA2563bcf62e1f2b9a01870bd3d64765476bea4d21a3191f3ef425c9130ac86b9d9f5
SHA51252736d7773ed814c4a091002dffcfd289a4ab9bfe93faabdbb1e610f70f2be730cfbaf24eac06cb4d4f66f25c604295d41c214d34001a935517f36d318537c3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553e97536ba23e0f2433c8e7207947eb2
SHA1aad37164232dc246e230595c84b41dcb641feb13
SHA2567ec0a7fcf08c62b10bcfdc07f9b25ce8b680bff0c5152792f9ef4ac0ac79ddac
SHA5127edf40d4c3e50468c59ab19eeeee84212e51d6133d033fd5b9b959a19db4e1a80590aef1494fb3d30bfc4f042943339bfa411503b62c432cd6e02c35eb08f5f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f52c76a078e89d18f501ee515e6c7c77
SHA162e2968fbbd443256ebb8bb0e5a7dadec7808367
SHA25698e09dbaba4ae6217cf499a375f826ae894194a463d62c35c7e1ef498e2c5927
SHA5126140a26c35373de35eeb2a845dbe9d6b1d333d74fd535bbc29f59c5cf4063fbd38ab7a74e726b2ff7ff86fa74453c854e15a073d944bb0de15738157eacfa196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52adb2df298004785014c45b6f213b713
SHA113686b391fd2cb67452dee74b2152853e062ea11
SHA256ac0489cd391b8dbe585dadd69aedddd655fa54275029d526babe82699f92e538
SHA5123178f2ed2e76a5fa0f589e812c99d3446470cf2b4bd13f4251dc096ac16188caaa72782cc946d54549a4957de75460f51e24f38635b6bdb92d20f7e531cab8ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5975744498041b726ed6f59b3b171cd11
SHA165d28149056eaf035dc6a0e927ea1d111265b91e
SHA2569722a91aef54cfeee5da75293de5d816410c38fa2cd454feddfc0dc1e778abc5
SHA512ba4beb91db99b21ad20786bb395e46db56e3154e6a2d1c1005e8469c12052adb89a0b36f970c1a682e5c08f88598947322e175702d60bed45b9d4ab9c56cf7a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b55ccff567a8f2922fe597c8ec9a490
SHA1c60d59be19afbe19e16de8567d8219c6a7fed965
SHA256c9844facceb3aacd7bdfd7e4a3110d57f6ef25e9193532fd52578f8920c376dc
SHA5126b0423dd685af7e56f3435fdcd6e57a9ce729062c6e3ce334679aa7313c26e4f6ff588e28907cb7c5be954219d4dcfceccbd51827be18877768738693c022228
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e28fc586419eeb98ce1d82bf79997b57
SHA1291591f4aef4db6e94ee2971f477a6a6e2a71d1e
SHA2564315a06400d6a1b285728a5244c2ee36019665e401b213d3453ddb59cb3afebd
SHA51246e47cdceed5905082905dfec3a39be8cb6b63eb44161f4546d2fdf8718ad8e4c222039c0623a1372ccbe748d5ea1d05e81e02b2a692b01691cafd568c273a51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50501a2d26282e11e4cce49a78fc05d32
SHA11290b1d0fe99f3ece723816c9f1dded7918fcda6
SHA2568a7da916bed85190dfc3aae79fd629cab0d1f101b11d9d0951f97a2f401c4ea1
SHA512650ce89dfd4247e96713491bb54dcbd4500296c241aa6cdb30862da3873879d090f47ca8a0aded98e83a684ee79d675b1a1d9c24a6d098f1be86f46bea332a9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee3b6aa25c721436293fac77d807c478
SHA1bdb0505dbc89d12175e4e44293dc3e3a7de35579
SHA25696eb6d8ecf68a3b7f199992d9be3d81c8e5303ec89007055151eb2fc5b39ca40
SHA5128fa5d5cff2742b61d33a72382af4d78ad33126e8868ca2591d2a2d650518afc38172d689fa36d33bc7d87d0a49b4fb514b8d8a3dfa95360d0c8f06905ee7c900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5653ae622848c1c715df0a6d6238215f9
SHA1c353c29b2a8f4f6b4174ecad87a5464a9622d60e
SHA256f447109fe4d3850abe8b2c266bb720edbdc009483ce979d865984d322267d429
SHA512b8c0ca7be63a40895b30112edc68f901c37101ab1c441cbe4845135f38d1e59e03ae0d51ad422ccbf7e1483f6b0efb6cbd6035accef751a1b7015566184fcb86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53aac24047f2c0ea161ce58dac5b634e8
SHA195b3e55342a92a32e531925a0f779dac3868598d
SHA256ce9828bea7234d93bf6863abb25354fc25cd9928e609c682ce70cb6adf585a18
SHA5128da824110e432ef869a09c8dc27ec24d112811239e86fa7244c5b3da8e2306c27b5ee0629b6f748ae7eb05ebf71916624132aadfece78fedff6b53db49ed0235
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e1120cd131cd1e7e743414091f25b65
SHA1dd486253545a52e72479e446c2bee94fa365bf7f
SHA256ea672cbbc10775639eb5f16da5b01f0646b9680eaa9aa54c4da859dde6d0fb67
SHA5126cc8ca10d0c6bafc29dbfb50533ec7af9fdc4718579888c451f6fe48e8eb200874a0acef31c69e5fbdad12784237b7107f536f58aa49459c7a8b4068cf550609
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5774e73af781a88a4d7a0347dd739cda3
SHA138d005a622263632c994990c2d01e8540e0efb20
SHA25632536dd97bfe2520ad4aaedbbb46479dcf86f4787a883fb8f01431998960c48e
SHA51219d1296f21d14884d61795854966e0bec6f4f377d5555790eb855647b39776d0dad2d61778d47a0cd1b1da1bd5faac6c508f7fb5609ba1b35041a0304f7c7a74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e4892646b8ba3185b51f4980fb021c0
SHA1e478717f547f3c1dc2e467addeb080542ce1b44d
SHA256ae2d5ea60ddbe4a759a16681c8bbacc8fd11002f0d6ea8e32e9e26b21c10871a
SHA51272c84de37497394f42ced980b4eedbc42475ddaddd57beec9275def8d7cd152efa93f85266a066b132b08816d6bd4d6938eddebce45cc378d54298328b7785cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e30889abb43e73d5018f1239a7fea86
SHA1b74ad75246f054e2b6bd5f27828deaacb4163f45
SHA2565203ff9a6c26590a80406507b7db9fa1ea5d9ae5530228b76bb9e6547f1283ce
SHA512b0f914d847e8a9fd791a689196543a16af21f4f79776881d7c5a6b205be51e10d93b8de3da1c66292d2acc804a00540f531d32f683a5110c17583a0ab6b0c536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556ecd8824c755d503a59ded87455bbf7
SHA175a0d9d8730b320976110cdfaad3bfcb7a017801
SHA256b13faff7ab39662bcd51e3d77e796d8d0b3cc5ad4dff23d127a3812cf12d001c
SHA5125e4056da1eeb0e89c97d4746dfb8c93e15791f734dcffed4a333916133ce1723802cd4d0152048729c1505eb04f6672f8ac2f38c51f6fd60d789995ffc90a10b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545002ee099b6576515f9582770f098ff
SHA1f60ed454cadf4c6591195118b2cabc4eb128b542
SHA256ddf8d1e1d9bc1d06c2fd68911fbe8ff3c8580234cdb159d53219efb01a47ceba
SHA512766d77b6d55b819536398afcbbc366a0d1318c045eda0f037d3021bb276da2b1a6037bb9570e3c571e6e252e4aa9ed708540df85ccefe96d550f07bca0e57308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc47fdfd4cc3774018698671a6c993a1
SHA152c9623b9101f61f65494866e56cf0dcd81d63d9
SHA25647626216c2551da9009572027dff542d630ff63db68fc12ad1c315576a160ef7
SHA5124357af158200ae72cd6219407a2fc67be4db3889d488d85ae4577dd04440d455a632b9727e81ec43e04c587c8b5dd031618a39a54bfd5c04f17cc11f3e12f6d3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b