Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
c24f7ebece7192e75ab801fd2f97cf5d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c24f7ebece7192e75ab801fd2f97cf5d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c24f7ebece7192e75ab801fd2f97cf5d_JaffaCakes118.html
-
Size
780B
-
MD5
c24f7ebece7192e75ab801fd2f97cf5d
-
SHA1
dfca3b65245b94ed8dacc9e0e5ba938498c4868f
-
SHA256
45ed4e6efabb70a1856215b59777fcc900ce5d3e34f2f12d4430b76cd17676cc
-
SHA512
5cabdeaf652f15231e5ccf0c36f1584b8a364e9c198b5e273da0bcdc2e0ca2d47ba74946a060cd836846e235d9ace7004740b2298f2304b214163845b32fefa4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{44C0C9D1-6366-11EF-A550-D692ACB8436A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000b16f4180ad0336c05e8e3a1fa91889bcaca2ec9a27705afb11cd88e67defeead000000000e80000000020000200000008dea026b992cbdc5fe3c3af7c4cfab73537a741a08bb243abba140e5b91027d0200000004c708d7378a50bef4f0e734cb6e63a071a1aad0a54da4ecda0b43fa83188600d40000000dcdc3f166d496e7489a5efcf2193dc2f6602481303738c360657a0388161ef1847fec2e042f14685420fb03df1d44f8d558b3007efc1de88730bc01cfa8e9589 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430809504" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b099c40973f7da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2348 iexplore.exe 2348 iexplore.exe 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2432 2348 iexplore.exe 31 PID 2348 wrote to memory of 2432 2348 iexplore.exe 31 PID 2348 wrote to memory of 2432 2348 iexplore.exe 31 PID 2348 wrote to memory of 2432 2348 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c24f7ebece7192e75ab801fd2f97cf5d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD565a52ca9e756a9351d9a268b72466792
SHA1cc3bd35fac5885bb843124f26a197ba4d05ea9fc
SHA2569c29338d99b2a6e68f8f0d4c78f40025fe16e8bba24424ccf1c003c0c787ffae
SHA512512f953d77cfd74c7b567dd5cbf3054afdd85e34a2d402a1efef3138954ad6859e6e6648af8ad0b5d32cf5f1c3a6be21ccda5098dfaf4204b87b94fbd1f9289f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5caebf0f8d3b2ab6fba63c45ced3a360a
SHA1052a3878ddc631d73641cb8dd77fc6f4c5183730
SHA256e291ef4542610ae8808d0e3ec5344d98cd22823170a222164aead074387f574e
SHA512ffad0211484f66b18bfdd47d81edb93e71d4f61cd635f81c8e26b626a4b3c01de7defc75f4a6cbce834465bfa7b2cd7622906ab0303619baea5f1872066bd910
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b0d2ddf5b7d7888d8020765902412f28
SHA1b57c44e4ed481b8d26d15bf74118dc7f9f13575a
SHA256a093163a37fa40a22b7832ea87740ad25b0e1fca120eeb9dc0cebfee10a539e5
SHA512aaa93010330371b651d9783ef3c7d5860df63984a184f97946c321b0b970fa7067ae08157319aa63e43ff9eb3e4c66efebfc0d6036452b36f74bf3ac26f7ff11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f6f71b13c8ff603b7dfd203c8e6c6ce7
SHA1886f4d7c0173edcd5cd4bde6cc260dea9ea9df2b
SHA256a6908b07de3cee3f4e8c7dae9ed7ecf2046362ee0b59f319079a19e1b1045a68
SHA512fe1b37bdc762bb3d1e59163a1f9de16a3f4e8071ae5c439fde6f3be98671fe1fabb958fa462ba63dcd56eb8eb52b4779115638a6622c6f62d3d70a8528e39d34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD575c57f6015d5b2861f5f978d17a449bd
SHA1d1a6f9f63783323cf52216012385c18652f0c373
SHA256f2ec23cf1e85e3d481b3d2fcb1e8de5e69ce6b7b7bb6325fad68f15a3b20bcc8
SHA512089280bc31632d7e89826339b415c81d48d844909ed908b324762cc969986611426719c844721bde97875566593ed65c4b7cbbb53302fc83d87caaa5d4a6480e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58453c4ee4a836a4ec63985f90811dfd5
SHA1ad4ae924aa021bfd919d53f13a97845e915b0553
SHA256365cddff41edfafe63ae7810973b9ee8c8e19659c851545cc78d13294f9ea011
SHA512e80bec82bf85f620fb1d1638f69dbb3623ed18e41943a040cc593671075483c787c136bf31ceead9b808ad340918487762ce7e6fa9074be095b93d87b1571dd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD558ea88d01ee3646ba2af013163c798b8
SHA1194d5c53b06d58d9bddad108392c540112c4a49e
SHA2562084623cbf0c30230a9ee08da3fd0302f0edbf2b6b4b8f316f847995611aad69
SHA512c9da7e6252ec86ee6d42b38c9706c11c1f7ae5a127e8ee1792eefd32732e2c2260c75fd4cc1b3b2f050e39cec0f15e6c57339f3eed36eccd7db8fcc78fd90a89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50a465febdffe46d97b6d58d4b8be47e3
SHA17984534a48c5dd1d03f8ba572bbeb4598d6db1d1
SHA25629ef333022f278e0144b500909dff445d610a2a9597dce38f837b83ea8e739df
SHA512a59c682cf63a22225a03b243482202f73a72f192244e952d2bb09fe0a98250ae962a98e9ccb1e0ef4541de88c69873edffeee05b7b23e7576ea2099c4921d8f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD586989977cd78776c33965d97ab9488e9
SHA104f85d5afabeb2110201fb0bdd1b369c8c1dba2d
SHA256a308e441eca76fe9160bad9703f56693e56d65f95fc17217621d54573d4edf8b
SHA512e37721d60ac706568c1dd68c77a599077b2f23978a7cdaff4261136ac38c8362909bdf122d3118b5ced8be37a7faa7c0e9e6fbe09e7ce4fc9b7895f86ab00ed5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5180abb0387d6680849452a109e13794a
SHA1296d932feec43817b784f045bfb9772afb1bd360
SHA2569447f0f4d8268b416a50b7bfaad8a0817097a874d60587cdd696a67118346771
SHA5122c74e907b458e4958c0d4a80094f227481eefdf95d476d7caf73aae989fa302e6afbf64d5efa79f812656413e11faf561647455ca16517e9503a3005da8efe5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ca30a3960a1a4339da7927aa1f07cd0a
SHA1ac31196a6a83b2859d9879b185d45a7b1ee94566
SHA256a2e20ef34e0e0b70689719431d92e84b7628d82a5aece7404eeb052319e85687
SHA51221ab374328af1fda7a93ee3ae2d199741485bc255c452110288612bf58c7950e7462b4c8d10cc9b2960c4a7d660ff828fce9e076e5735b2bc3327b839524ba84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD551710dbf63196081f3a3344a57f56b80
SHA10c3e409ca26869fad1ebac3deca64a2fa4c89f0f
SHA256b786660bc0019a7288ac1e37761d546d1538722b2112c00e0a220f5cbe6c36e3
SHA512b0ee130e9e4ed96205855953e0519d0aab8eae91a02c5655a7d1a314d1f474da7f911f1a686d19bd8eaf01fb1923dd36b1964becba7c2149fa8bd069f939cdc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5279ad72461d74ba229cd371a683e5106
SHA1480d277e82c5cd4c719835a9522dd47e841635eb
SHA25614fff8488458c7e4df6bd8d9c8302b72cd7d4624d8e12d8c9263301ff34ef3f3
SHA51297fabc0ea031f97f8a7b57f01c277c787f36f66a2d58bbb95b2f00d6edabdf4a72ffffb2e07e43d0b750ad077babc41a4155b9cce67affc8bbc9629703d559a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5af4af108c16a77bcdeabd982b9894076
SHA11aafc761e31f4c23cd84b313726115482b90e2cc
SHA2568966eb60ee649974279e9f866da99dda649d4cab449b31214eabdf5b73e99b71
SHA512f6c9a09527aa053e94629552850601a96ea71eae3ed8beb5d2a602b32dba132427ad90ead4f07c5900bc01d95cb295ec47126a61cbbd957563bed3a118e611f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD565dab06fc294b14bbfc5c040a5c6ab26
SHA19a08dc5a4983ed4c86daa66a16a48e022ca3c6c8
SHA256c48000507f5183e375be5f2f962511804cb402edec3600c19899d10f62af16bd
SHA512a7aae8707c4d70dc95b47811d0c84676643a9db60b4da1740d93e9df4c4b96df1f6fe68c4aa5bd69d71e156c6bf6889b7f03727031ddc3aa7833f744ad2e367e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5297864988138b1616d4867ccfc94d979
SHA18a956cde0dbba85dcf25328fb8ba385d2430fea5
SHA256eef4469841e387714ad405ba5fb2c565cfcd3aaa54a62a7634a818e3077f143b
SHA51281bd34cda72130556a70634210074d6814eb03549897ac9afa34c76e36dbf9ab1f0ff69f025763a67d5c8fc70828cb31a0c640df54a7c6f018ce47e5835c1322
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e9f9664f47ac7c64a3f366f0465b2ee3
SHA196284e573e098c1b9cfc65933bbf0c3a415b5ff9
SHA256c4ad04b56b6c7d364f6683652c5fd4564508f545eaf6f25c1a7dcca3f86b991f
SHA512c4f5f6577eea85175e735b9c52945cfbd2346da0055b39cc9d16668683be79551cdbb7d2456e15d1da3ea078ee31da04a17760d8df9111519ed32c401680cbf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58b90d0811fb99738a828a60a6ededf49
SHA1fab30393a259ddffa073f7eaedd2c9caf934b8ae
SHA25678e8160e6b5d37d198b2deca10a1eaad34e57d5faafca9ed8ee8758a40671f21
SHA51281329521d2f0a492370c657c7ec43469b4bb3a954858c00fbe81d4270729cab1e010cc90a7615a877e92f523d1584792ee4de73d0657611de8adcef6c9384457
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD572c586b9a19d2b03699819b9be830e06
SHA1ec8084d265e858690beb6fd4d06499f3a934ec76
SHA2567e16d5203b406272840d28fe9001e7870010f8bc0aea60880dffa0f84f4f7321
SHA5128f9bcdbe55f9badd4a8d84b01327ff1cedf5855efc9200b60c81d4dd1e8127d83f596912943cfb6755d9a154b1f99f2161682cc9f271af3a64e1489a22ef06e1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b