Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 02:57
Static task
static1
Behavioral task
behavioral1
Sample
c225cf4ecb8dd63114b8416a7d70cd91_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c225cf4ecb8dd63114b8416a7d70cd91_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c225cf4ecb8dd63114b8416a7d70cd91_JaffaCakes118.html
-
Size
3KB
-
MD5
c225cf4ecb8dd63114b8416a7d70cd91
-
SHA1
ea6aa30d33554237f1b7c2f8e785a493367f18b2
-
SHA256
55189059a262c1beacc10940d8a9d3c1b6ddf15986a43a4bba608bb80f4b1514
-
SHA512
8dcaf515c7e012e306e6b46cce9479efd3acf00a471f24e2ac7acdc4395e21e6b35f35c18fceaee2238729df526a7fbdc33dc0b6f4a273b527842edce368fb38
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ED697F11-6356-11EF-B552-FA51B03C324C} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430802917" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000d3c25b5ce5ba97bd96e1393ffc64fd644c6ca2b0862ca1cd9546dec2578749d7000000000e8000000002000020000000a9dcf79750297643a6dcbf3149fe72051f961504dcbd6b94d585c2ec7b710ec620000000dfb78a346e5b06dbfc998f98162042854632eff52cd8f63b8d18d97ac4236cb740000000de0c6236c2905a96052f673fde1f536706a6e5a23fb34e5acecc83f5f8cb671dde0e89820c94fcb84d7c20a7d0bcedf0f924deb66bbe3f0f58cea777b6a0fa1c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60cb11c263f7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2652 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2652 iexplore.exe 2652 iexplore.exe 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE 2780 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2780 2652 iexplore.exe 30 PID 2652 wrote to memory of 2780 2652 iexplore.exe 30 PID 2652 wrote to memory of 2780 2652 iexplore.exe 30 PID 2652 wrote to memory of 2780 2652 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c225cf4ecb8dd63114b8416a7d70cd91_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5552d42953bfc9f06ebca5f132aea1a35
SHA1f872eece43dd05b78a72ff7c53cbd15fea749a29
SHA256de174bc1bfaf59b53f13910747247aa398c1f15b7834e5c52c045cce3d8b1045
SHA51231d9596bb3af4743c7d1fa2593f3242b901ab50ef93905a1ab77d957be4341b4a771dfb3007cab0c88036c809e1d8763074a97284fd5fdc7a899493f7d49779b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51045c668845331c18c71c94aa857151b
SHA15c0d6cce668966bfe08f69d227688763d5e5bb81
SHA25696999691971969f8468c64efc18bff110d9c7b768c981529f4d17b33752f370c
SHA512b8e8f53a9bc3e659f39ac2f3808ab7d75effcfe984e22d1ed5e72fc20db90d5d0cfdb1bc81b5b6b232fa0d20e2ac217b7567e3b812e76089ad93318f495826ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8108f4bf3dfa69328c07ec891074567
SHA11a12bc2311962d663bd3240183a6225e85bc680d
SHA256c6b46fa1a8fde0bcd99bf2eb232f5c0712a10832109c96639ccc4a4aea01aa0c
SHA512babe4a17e908ead4d89741f51e00f0dde21f409a3e459e69095f01760cc6a2620da0b1ed4e5e6af802f49181d3d908a5c3d8d9101c3fb360a31537e7c6b8550e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2d859cc981980ddb8f5d0bcb3416f47
SHA118ea1b662d2e73e3d424e9013565750a13b735f4
SHA256f37ba5b85501da708383277d071370299bb1244f5a8af3eb03dd8b6ef36d76a3
SHA512d40082dc3319c71a1bc2cd0f7a51dcd21ecdfd936b7da8dd86606cb23ed7e0fbb949e16e4974c8ef44c7397cef7fbb5d7d62dbea1804f717fbf4c1437c6b47f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5516ce6bd6241d75ca1e96feb85ba23b3
SHA188e85cdc9b3a7cc849295a76f86d7ae92aeb32c1
SHA2564012bc35e222a99c628cf923fb25e789d9d7c9ad835b5fa8879788da1781b117
SHA5124894a266c05b5ce1cf24c585de974a38e4b87186a4aacb464dcf2b1920b1eb2a2fce4343d4dadf3c907ae0ec519321243c0a6d041929ccb183ddadddd03feb90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582caf28e614e0088e9d418d375d25578
SHA13f82e418b4e9b44067ea9aa07e434a2f5989736c
SHA256e109d30ba607e8ad50c5dbb94435a3fbfa5d4882dd896dcd3a054b71888a13fb
SHA512e27567493f8d5a801bf5ce67e406621e56aeb55149de0afb9048eb691bc6c1a94dcb316ec1917d6daa6d477659cbb5d5f538c9354f237038cbd3d86b34fcc00a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd590fe6158ffe38621c031c420db163
SHA1db76acccc7b17e8ac91eaf8dbb2d80faac6da7d9
SHA25646bc6030ba006c07ea56a40382e41ff3c4ee97b99bee1634087876959e129e93
SHA51242444be9935841cc711779bab30d8c80e517e5d465115d9db17974972fe30f8ac72bc3697910f62fb6f4085943c400cc9c418c9849213b32cac650cb53860b37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5533b9c8d6bb4c98c2caf67fd1e186593
SHA1d8afb6dcbaa5116db650b9f895a1e4b33ac36e85
SHA2565571e246e0eb594a59904461e0b81c3bae105814569053923b72a889178b181f
SHA5122dc3b4f9bee7c5ab43c6006e90c4346ebc31d22bec7c075e9907d1525a678a3c8a16a2fc9dc6391383337a4d42f52d6d1af502cbd5d8cc52fd8488929c9973f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543f7275b5e9f7f5c4f7090412c415967
SHA1cadef04a291540887b7677872223ba61e721da45
SHA256a2cfcc1cf7123e4eeda54b058a0cf43ed949630609ed7714879433b833412c3a
SHA5123f199c7e5d3c32e279f46058a5fec2f1a27bf119bfd3a0bc2cd49d933f19fbf7e7ad4821bbfd1fd5e54d8cecf2bd2fb1eed818cfe64771918b35e6fb626c63e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598da0571781e56ae064f9d123a7fc060
SHA15a69e2d3a5ad9f2d696d1503273217575d2cfbf2
SHA256a0e9e09b8b15f210cbf865b4851c480a71ba6493732e9fcb2e27654cb784c815
SHA512942514a9a049d825ea4d711d5be470036c78160874f63919a0c7b4353c6b46b0f5a96cb60353ec30d20f47d4bb681f591c26d1854d827760aac7b03cd0c7503f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516b9bd58fbf0f905bf5e2f9efe071690
SHA15d28118034282d0223e0b9fb743c19b4c26ba85c
SHA2568d05e003ceea11328f864c095ee775889caba0cbedde47a443714f6ca6efb0dd
SHA512fde55e8b872355a94d3c7144fe6cee49b49fc22975e18b4638f1b40f0e62f8235c316b6e74659ef3bc10c9b582a49ba9976c6a17e00e1562644c7afe70b39c59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5861e55bc7db90c11cc4fc801aff12916
SHA117fa89b028ead928a8dc50349c19e7ac3a7598e9
SHA256ae6488e544e993f9a4858f2ac7e49826b15141f52d35d55068bc3d50c015af0c
SHA5123b1ab4c15341ec1f3bcc7786d5464dd9b188ac4ca4021105b3192ea86a8105f24d0f779df850d0388f8b5a6c9909a5b9f8fd14d6bdb1f2bab0a0c410241839a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b34d9dbee8b18e5c447208cda84a8da
SHA1312ec01b05573ebf94066dbba1f7ffc30aa59ce7
SHA256939aa3bd87ebd87da2d223d28bbf443c575b8ef3b6cbf2772225ecccea761c86
SHA512369c7a5e2294d6fdf17fa20e97ef0baac35872067deecd2106039bc8dd85da78972edc8dd8b7223124ec56549f87344f09662890208f9cc22328f8665a63f38b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5705f1d961f3ae5f380a8adcf3681b552
SHA13215e218a9e4fa486989c742e14bc1847a2f4c8a
SHA256f0a99b562c9cb3f3ff5b499b12e6e03352cdc15c0bb43c332cab91fb2e19fe6a
SHA512ebec628a460c797d4bb70c74e15f58e9bf40ddbfa4e3254c9aba41eb37fb1eddeab62ebdd41e590f4028682d87b8c01792ef571d3e5502075bd5fcf8b8a31ed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5351ea16926ebd6c07677e022226709b7
SHA18bb39781ae27fbb33eefde742d2dd235da0dd141
SHA256682046e47a59087b584cfbbdaab24480effd394527c2629f3299151869e16cde
SHA512a0978a7dfac844e9ecd677207aee62218baffc7fc8ca4f28f773183bff402b9a8fb6f84ffae0c6618675a3015200a53881c72a54d64fa52b4edf59ad2a744375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539234806c6830bfb1b8ce715bd8247eb
SHA1598529a09cddfc1a62e6fc67bdd1d258c6a218b4
SHA256e7fe79b91a2ca3d3fb5b10fe5eed86789aa9e15b3013417dcba8b67ba95c4b66
SHA512c65ec4ae6b8d987be52ca3341f868cec2dd7d3bf2b151ed30ac6c512337369a25f37304394ef18538e8de4fc9ddb2e881f31feffa0e627fdaae7992eaa2335d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eaa37bcddb8ea2406dfa87becbaf1d2
SHA1c8cf2b467f967e92c15c717973078e9afa396d68
SHA256837d8f6669152a6a8e424c1176d254ce57c061a33352aafce478c5039b40ad4f
SHA512cdd2daee259ee4edaf08f335093cd2d2f39c891619b9a72579bafdcc042ccb43a3037bb29fbce95ec675c3e864de27585d891049993bf24f2de758a76ec20bde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b7ea7bd623107da34e23b9e9788ded1
SHA141dd93589bbafb3a1b49cdb45c0b1e0d4d6ee8ec
SHA256885cddf35e04da9345dfe4884618cb08d17dfc2351419af0e161f471f1353e1f
SHA51253c81bd922fd530b0659ca55d281abe3687f14af31ab6f41753bc4dfd299a0fcaefcfe104ce1fbce38693df4bf98965049803b6be2de1882a9fc264f6837cf2b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b