Analysis
-
max time kernel
146s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 05:07
Static task
static1
Behavioral task
behavioral1
Sample
c25809fbaae23044ed6c54bf5bc9919a_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c25809fbaae23044ed6c54bf5bc9919a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c25809fbaae23044ed6c54bf5bc9919a_JaffaCakes118.html
-
Size
135KB
-
MD5
c25809fbaae23044ed6c54bf5bc9919a
-
SHA1
873b3b9edab933c77b9556770f5f2afcc6b83466
-
SHA256
af86af8ab8acf4890ca58db095735cddbc40dd24eb3c81d6b299676a37f00df3
-
SHA512
3aa5de0f0a9300f88b131483a54023b72baa8147a2b03fa37663bfdea7f07a459f0a6004975bec2b1725869cc57c3531fe3f83b0fdfcd760589afcc8dcc92120
-
SSDEEP
1536:yyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsQSz:yyfkMY+BES09JXAnyrZalI+Y8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000b3df1bacce1ec3b0b0915db4d24bd474bc334514e40641d36f1d0718b9dd7729000000000e8000000002000020000000bc4e388019bc76d816a77afdf77fd4c8f5a09f7ef51d49da752942f6f2900d2f200000008906f67b84108f4efe0c39bca4b676a79ec11befa33769facffa5e1e9c544cca400000001a6121bdc70d1830ede23b6d083382f0843baa9df03416fa01afc8224f4790c801d77c98c9306175ff5827ddaf58e65827fd055364ce2b13ed165ae7f47d0661 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430810739" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{24DCD981-6369-11EF-98A3-428A07572FD0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c03ca73e76f7da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1076 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1076 iexplore.exe 1076 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1076 wrote to memory of 3060 1076 iexplore.exe 29 PID 1076 wrote to memory of 3060 1076 iexplore.exe 29 PID 1076 wrote to memory of 3060 1076 iexplore.exe 29 PID 1076 wrote to memory of 3060 1076 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c25809fbaae23044ed6c54bf5bc9919a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1076 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5502693d072b02b1020c0b382f90470e8
SHA19b2e6a9c01e186b085ababdf14c5e58073bfbb05
SHA25644a5b5a0ec6441915710c9c2215d934633dc7d2ba40eca63d4bf82c6c72b5b16
SHA51295aeb1a56b9465e42db638f4df8842e9ae719d1e17e8adf9ac9701efe20b9f91a240098f36681ee6a9dd77babcf932a32f2a3458ff72a8f7ba10b98b43439a47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e82ba95a31037664724ce6dc03ce5865
SHA129a39af226d365f21253fcd239d1a5d4ed389e91
SHA2561f246dc1a673c3a824f11df835ec89ff6dfa1da1fbb87b340c78d0d81cb85802
SHA51271a6855ad59ab6f0207f0058d16c0bc4352099683963eeeb7b46fd430ebd7f608a1e1f6e45a354540fcb227b4cde1f22b4b315fe37019203cbb1a8cbc9843f19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bac38e25b2dcec36ed18e879fbd27f0
SHA1cfe7cfff10251eb6ee2d0005d8bcc68316e25ff2
SHA2564aedf5a6d5fb4e91564e180396a7b7e2168a94b5606da527fce3d5fe2ef44ae7
SHA512e53d3131e4b896835b0593b16c8db21100024ec18ff440b703e0d153f50c6ee928f395d4c1091c38f5ef8cc0b5b9d7d189371d346286877c6987eeaa24aea4de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e35acdff0b883ee06ac711c739b2916
SHA1fd7d068fa3ba85ba412a07a8c01aaefba307c97a
SHA25609ae1f1f549bb102c1b75e0f437ebbc6d6c647b3971c0d1f8c4e77706fcfa6f2
SHA512daf7b8e5d8b61dbec563a0651826037786afa77672598fec92a509283e717518aaa003b9ee5c3e0020bc063b94789d9222b3ccdfaf3156ede320962609c375c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a16eb03e17a707befae54e947f75b209
SHA167509bbe1c9bf4274495db1f2d502eeefa89677e
SHA256c15f118ee5c111fe3fa52147af2a0c22564e788812e90a8a08cea032ca475976
SHA512f60c6efd4af41ba3de367e758a9a8694379cbb1ce8674c11b15a47e9ed16f36dedaa7ab2b38ce868a1e0f21c00c2266affc69b11f37985bef4734eecbfff4b6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5086431dae81f1dc45f64f5b36a649d66
SHA1afc2b017b29d404f31f1dd9be1f90fa0a766c5b9
SHA25602852fb3f9de223eb598a1067e61ce7d04363d87aa6902d8e626eca98978c675
SHA512ad236e1abcd5f2a903ef13f46992b86fadbe62bfe56626ea46fd86d986a2b93e1b93936c2eb4afccf5f907b4cadc34cfe3608aa4056236bd46072ec6e6ba28b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b14de36197acd57c3490274cd00a0ee6
SHA1e44a5ff00304693d89f3fe588980348965444d21
SHA256c6a2bf35be97f133809374a589f82e801feec9a12ec1710732d3deac75288203
SHA5127a3cdfa55da696701adf2f32aaadfadc5c95b3cdf5895965af5b2a195267d7556ca016a4272d44b2d582196159d96c20dc575bc0791beef4e228e8195e01f09a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecb576f476879819aa7dec0468eea063
SHA1495f83f09689382414dc73cb7d240439a3192bec
SHA25630a256aaf8cd8f6af20743c632feaa39f85ef60dd9615dcd58ac4b9b238f083d
SHA5124a12c0601724e870635deedb1ce94c5cd679948775b41719ebc6786fff1243ddef27bc0eb39a775639afc8c6a29dec3c5f1b1a21751388b339846c84f63b3539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e67456fcbcb1be5cd02f46215d9e84fa
SHA1a6b64be57c113cdbcff873e8f43eaa8ba0763d5d
SHA2561796f145682badbb522f5583c87dd2b760443f48f797c28297347a5c3ee5eea2
SHA512d57fb6f5cd15b4b7b9ac7626d979e13f125824199c415c34de89a7a7123ef8ac743cc01b68638227f149635d6ac73f10c00cb7241815d36b096d738cd283c708
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575aee9589c373fe0554aaace241e379c
SHA1ff0bba600539103ceeef72cf8dc3296b2581637e
SHA256959ca615e21bd955cffc04790bf415d58e2ec4b6f613dc85bfe82d54778e6c12
SHA5128c463940650d61f5120808353eec3739c3e727c8a73558e0ed6803ee1e20304d6315db83645be654aa99b9e1f94e25088ef7ba19134c832a082e0d8aeb904513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5208023c59d655799a6931c0153129e92
SHA1e84f664487da644c4d2191f5bca9f4df35574ace
SHA25691f77586aa7f6607ff3d3fcd45491858b20db58774599ecd248f4e8d53d032d3
SHA51261a2a744b020532934128109590849fa68b366dcce1560a4eca6641098ed2f4016a9fb343fcc67ef4e524f2d6631aaab086934f92ba9d79fb4f4139db214aafb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be95ae7c428c28b4ce6bdf13009ee1cd
SHA130e96551cb60a824fb7be046095ae3f549795a41
SHA256871abd4acbffbd55a9af9a7488a17aaa454d8424a60ca5853fde5f1edc72bef0
SHA5125711962a7e60385e615fe0d5bccb0112e56b5c7a7b8652499c8a63c0fb73f4f9606a10eea7402eb707fb5a06240dce90422a8821ab154d67c169582559f3b6a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfa3321bcb1c0019efabdc416c527df7
SHA1829fcf55841013cdd89360daa468570fcf177b78
SHA256f2172ad9f8ff5b0a80548233c16d7420ee33d95c85fcb2ea6ab03dbc3932fa99
SHA512b683978eda6de33f2d29729d23a13d5cd247423942bbdbd2164d0cce93e2e30b7173b58af3a405e6d6f3f6c815179645285c80ea9d71a6ae8d4c1c741c52a5ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d503a017a87fbaa946ee3a1ee605e6b
SHA1a6036208452836e3ccdc7afc919b15f5070eb594
SHA256da1317d914f0cdaef8a50cb16858c5357c1700f9625eff96be81a94fa9bb1886
SHA5127ff0f2678a9657d3abb1547d91875e41fa8b0248a9a0ee63105e96610c665d4a6fcebe4bce22396bebb96579d249e53380a5ba7a542a265cff7f515b89ce70c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5690c7b284069f6e3c79670de2dd7eba1
SHA19ff108991144684e77308342b2afd4d80beb46d9
SHA2561eb97c69ec063e4784383bfa08d46c899e1829c65526eaf561e4a49760514794
SHA51253e841f158c69c56884d5d1e4c5e5739093a4595ec135708fb88115872f329433fb0c38ea0a651d50742a8ea09952339696302cdf213bd7f194ea6003877988f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575c5f40ac71a6cb44d802421ff838b42
SHA1e138287722c2bb751ed7dcf95ad07cd0297194ca
SHA256937b0b7186621c2dece79bf3861240d42829fd4a74cf6b16f059ea6ebc1c4059
SHA5129eb909681885a733df53a40354f391b4250083332c6928bffa44f142870237d46485eefa214ae45a831df04400d9cb88060d10dd1465b4ff62ba048c5bbe095a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c07746c2972db9dc36c59c6350c9e92
SHA1232a910ad9d33aa85fa9f7d1223e3d9268d921eb
SHA256bc70b14ae295b888a47b34d789c4804769f32eefe1ba28abb86f60c7b3173b78
SHA5127e5a827e052d5abd0eba9c7c0c234dbfbb5901325f596a9b361d8e78ec6aec2bacef779d9ba11856eb5ef635054f23947d94f060dd5f643753a073efca65d145
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f78c281d5c59ada2d102742215b94b91
SHA1cccdbdd4a3b3f5796bfcfaf8601a72261e640c08
SHA2567024ad1ea98ef5e7fb3ad98a556bebc5fd566af6a52c53008864d6f2aab5dc55
SHA512343ba341dd449b2494c1e8e7884bf39c2cdb052bfc077ccae92dd9a1f818b0fc31d0de539cd6cbe35a7b6b9d3a8c88803df4bc2283318b4cbc58cf89504d54b8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b