Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 03:49
Static task
static1
Behavioral task
behavioral1
Sample
c23989abcb361e3a9d292c7eb3ca3e2c_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c23989abcb361e3a9d292c7eb3ca3e2c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c23989abcb361e3a9d292c7eb3ca3e2c_JaffaCakes118.html
-
Size
66KB
-
MD5
c23989abcb361e3a9d292c7eb3ca3e2c
-
SHA1
8fdf6bac2534c704711893fbf12c3bdba9dee586
-
SHA256
5f911484860152247e6a369e02bf8ee925afc20afac6408fa869f919d23097ab
-
SHA512
1cde6f8c8358e12c0a11909c250c522b4d06e3450dd86dcd6c4aaab043ae4ac9da66b3bb7f617687b03877f644e029dcc9ae722a04b48aa4552f16a8dc40cff3
-
SSDEEP
768:Jid9gcM0St8tN99OIsGwPn22IPS2+vPoTyOqhCZkoTnMdtbBnfBgN8/oycc8QFVf:JIG+wf23SxwTIgec0tbrgaCcFNnzAC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80875f136bf7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3EC73121-635E-11EF-BBBD-C67E5DF5E49D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000462d10cfa47f2e1620db6a60c2c98a9bffdcac67fea903fb9540d4582f14c490000000000e8000000002000020000000937343512f71aa50146a07c079bafbf4f96db19b21da9a68ac36959268f4fef9200000008e0621fb07b7794ff5eb64489771cf5b2c34199e5f2b6c36440f0505492e123a4000000048537e67aefd1e2e5994429dc2dac7c2ee97e3f33591382864cd73738861554ebfd73f7cecfe3172194aeaf614ab240b2036a7f03693b18dafbe4c7f8c3ba563 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430806057" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2876 iexplore.exe 2876 iexplore.exe 628 IEXPLORE.EXE 628 IEXPLORE.EXE 628 IEXPLORE.EXE 628 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 628 2876 iexplore.exe 29 PID 2876 wrote to memory of 628 2876 iexplore.exe 29 PID 2876 wrote to memory of 628 2876 iexplore.exe 29 PID 2876 wrote to memory of 628 2876 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c23989abcb361e3a9d292c7eb3ca3e2c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a2b73f8757e11f13230f73dd5b64c0b
SHA13b6bbc6b2f133f88ed011456a15f61052fe6013e
SHA2568da459aeff33443bcf5c082261ec5d8ef07591aa78cf890045a75d0eae653f2f
SHA512fb8ee8e465c0caf1798705c490e4d004442fbb3a8be2a8d321e364515eff88b9fec6c7d38e26895556828748b48d6ee84901f7e81632d5ac9db723da8263f6eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6f4c084971def4e302b61d004cb5682
SHA1b55d3dd873da07474843dc3507dd4439ada956ed
SHA2569e226e6922dcd528e1c99271c1a0046648cf5c4f8d3e507b48e394b6893e9f55
SHA512ce4602ce6e46e4fcab174061315f7943b480a043bcc1f5f829ae7b72b61cb376b127c2a58c9b8bf3485dceda9befe8f56976f07fd807dab3891c72ea89a23639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab2131dbfc896a4e5ba15085fde03148
SHA1028d4689e1882d79837f38bfd1c50cf5888f641f
SHA2568e3277a9aa9bd4865cc35f6b2af81d78b2fb1d547fafbad54219a784e4f31346
SHA5128663143c126eb3199f8d2ba5c1536510276a765130a4c0c368698aacffb84fa515debf92b61a68ec3fbe71c693de2dbb1828389be8caf9c904db7b958860a7c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d47ccb560bc804ee79bf8fea275b384c
SHA142f2c6d925765efb50f4c76e9156d906ec5f44dd
SHA2562cfceb6d5378ef9ad187cca814b02c76ffd299d814ce99fbc7ab5412c01d2ac3
SHA5123d998abebf4bfd5eb615d8cfd1af7321d151e1be1be33255dfb8d0d8562c4919a44b02a69366fe08553fc26b0b7fcf5c6e95860fc2dd1b0b5a8c9a3e878ce9a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb730be228aedabc383003113b8c06a2
SHA16e1cc7a479064bb0ea01f7b9a28ddd669e6194a0
SHA25639a1211fab8dc996e058ec3870c4df59270b2d4600eedfc27533aaaff9a7e7b9
SHA5123820fe2ceecbdadf7161f976682f0d925d37f91cc6f0201224bce077fd1f088a5d4f369c99fa4b055450c3c1267b75e6b7b7dd76b025dc20a96bd8dedf2e8a01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e0253694af5d9e94e4f56504c32241a
SHA163eaac27c8467f76db0ad49a9be5484357aea814
SHA256ce8742f61fb048ac698b8d9a9bde36d19986d986a60c0fbb667cadfa526f61db
SHA5120eb9a98da3fb8285e06b51672ea9c0316ce4b439a555e0f6f887f7d91ec2e438f1510fae674974c9573a5dc0f966a3559d73ff751e62a5e1576abaaf3d95f576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a92f85500d168752ecd8784ad00330bb
SHA19807ff001ce37b2b5fe5fdd3668f06745f72c7c4
SHA256d5fb0876e10bb34c870f7fd32a7ec720088ca83e7cd51dc54b7620f196c79dd8
SHA5128189922abcfb3942d662a4a3c175f4dbb473344214c368a01ba1d163cb7feae596388883b15caeb83fa0132c1428b3848a84478573208cace09fe7f6aee84a1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6c70eb1f4f5ef7b1bd15a0e5c8250bf
SHA1f662c5cc6170a541f71db1d65d715f44b3830b49
SHA256d95bd6fa1c49562cb83972757a69bbe545f7732bc48e77d0d21c9636aebbd1cd
SHA512d46b5faf223bf22564bbfffbf02f5cd6b4cf781890fcbfaf6147643eaccb2793ef61d0281dc9df83b105bafae3ed8246e69d0b12b287f5f9d6da04650a5479da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52173a20b9643f82553ccc4dbc9db7b56
SHA15baa66f68b3602a9b3912b29626cb2da8af832bb
SHA256d395b4afe8b46ddde28f48c7513f193f3e18e52d4dc18b7ebfd0fb361b737fc3
SHA512f95e66d594c137643d5e072c261eca91bad606134c9dd1ad42506e7fd8ee390b997df1abc0e89c692eef79ccd854d9bf60d469c9e0df0a3e0d5428702c3d6e7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571051480d5184b8b2168f35d14e700d9
SHA135c45d5eb9f16797d1dbaa692879fc0bc5e222e6
SHA256c415abb4f056d3b47d82881d3f14362387fad8a14193858be06991f65dd8117f
SHA51220030575a6fab29ce039a68bf9820058c19849b91880e139ba4cfb95a7877341e3e4ced255eba22fbc1c5ea2f481f8d4e5756dc3703511788a70466eddc54672
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573a8c0a5ebca79d51faf14fe629f0731
SHA1ef52b5850876a345f34ad70b702364c0fff2c184
SHA25669bd80cc847af50712717842e399b3371dc7d7fa1aec3647347ac1bf319066eb
SHA512151e51c0569887e9a559d99b434ac211d6547e96b3ed8551e82e8a7148ba3461a123ca63df350f2239a03f42d1c03ec82644daf524d4916235ab5026fc1b8d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dc6b6667d3cab09c3085f40a8a619f1
SHA1cfb4f7bc912ffa8712b52a67a05daf3569eee1ea
SHA25675324d2b859943536b891d00036ecc0b0c700b9e743379b9678c74b589edc782
SHA512fc1d803e2c3d34c928550c464537db6ee02d1ac6d6312bb7e19ff831ce1df89cb13a08160bd3166fca30b6dda18b83291d6ebc848924b0a3464f2c2641aadc2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56da27571f4842542f46c68e8da3ff3d3
SHA15c6c7a460e28ce3696ee6ebce3ce51ddeceffdee
SHA2568a22f77cd64f10138ac257029dd5414a35a72fb1b271c695bd363ab152b9f51e
SHA512d747e3972edc4952a3e022d5ecb7fa1e5e5e4ceafdc845d251a28808e2769a64eb7e01af0db4aacddbeb611ec117c5220ae206ed2772d9bbe60b2e10f0df3970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c4b51c06ae83430ca1e992c8c32fe9d
SHA154d90cbf177e90f83f9e38ef9fc18350981d4e37
SHA256f5395b53939cb59f589ea91f05da487f2214c7f137c4d23e203e9c9e609c273d
SHA51236bd0a7d34022e942874a3305a53fdc60cf8dec8d2af154fce2f4de59c4e741be9c76667c45345c360d4d629deac98e8d5f0d6cc4fed7d0604b196a4ecbb884e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd0760c74a18ad200896810c68deab97
SHA1d4a8a5f94b5f0f65c9d06d2b2983bda66e1730be
SHA2568a34e94def845b0ffd83390f3257124828f3db6b91e67649d9762e7595a53289
SHA512b59dd7cc3708f1bc2289277b93f6209f9163302fb419b1f8a1446b63c0f21b42cf7da9242fd1b113a70355c9b3787bf47f9d0bf7562ac63862a39fe66d12d359
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2b204510bfac965fbbc24ac9e9b6183
SHA18c48b9d3cf370f3aca9a11073bdd9cd5c3aee8a6
SHA2565eb9e7d23fabd982e2003977354c54d8b00d9d2b5b6dc25b7d32967994d2befe
SHA5120e994bf04c3f520a819840f9930ece35b45a043bed8d8b9a1611b388bf1cf83d7fa3285fd202ae17784718483fcb49f92a5477ff970daab5b4cf57fae5f46340
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ffe8d1456bea631968f9ddce985cb6d
SHA161c90360dd976ce428564b564c57a441574c6a3c
SHA256a6991104eb3fe0c591249d76aa6e55f8600bf9404dfae09206125e4e213acad4
SHA512ebbccde16f15e070b33830a76cbed441e06e551351a6d7219e5781fe87e8d09c8b5ebf58a5994e258483283f0657c227cd030e9217e800dcdc5dd7bfd53d9435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56efa7edc4c32ed06880c9a99c8cdef27
SHA176dc05043be32ac0a7ec2b39d0002ded5a1a694b
SHA256914101cc6ab9e22ee81d3eaf4665ee8e636dfd9b3f43abedf5af1fba915c4494
SHA512a51be4440b5a970bafc360456fa3d6b000aeb4544cc54601c5eb4cbc8dc8e86014c6bf4c58fa9b724a7f26cac0965b329018b5dfd875b01046cd2e2b33c49e4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddd5c0ed87db8f3045d8e50354266328
SHA17876fadc925d72ed5d5ec719770af62dc0354253
SHA2561b597c6087d8cd57fffd847ddc14745ffd80de308d8d5d85d3d36c7b06d16235
SHA512b115b37e43291727ce5b1ab813c4b95b206df9040afee3ac6e2b35f21a21dbe600496080a20ecd4f5e5f2ad477be1d8cbe46f62b7c0ee305a65c284c28395e87
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b