Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 07:24
Static task
static1
Behavioral task
behavioral1
Sample
c2877d6032c58056c3f30582f4621c42_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c2877d6032c58056c3f30582f4621c42_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c2877d6032c58056c3f30582f4621c42_JaffaCakes118.html
-
Size
3KB
-
MD5
c2877d6032c58056c3f30582f4621c42
-
SHA1
cebfc0854dcdef10bb9aad698c0f5e613b46ca01
-
SHA256
466bcb18adc329c83eb6ec341502941d9ac9356f67d92e3f11a001dae9bd4fb3
-
SHA512
0dfe15a2061698f95bac8676a816bb4eda7a98d1705406140afffdb2cdd9226f1a8b24e8c2a167df1fb426c9b4eef534f5b6b16f362b3fb359e4136cc64d959c
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9017a90189f7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430818913" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2CF99781-637C-11EF-845E-D61F2295B977} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000001c2c715ee7e168b7b37b5cb26c2359c7df7a242f656785d92b3bbb2418f95136000000000e800000000200002000000046a50a014e66095b8dbcc75a26d9c9438f9cd97d41301dc97c9e76f76a1166fd2000000054b813752be289e974eaa81683a30e4c1b8cfc3670ebf0f02d9297b2a4d8277a40000000e165e3df76f5b774cb9a4fe004d50117d3d49627306b66bbf5b09578af1b91f746285f714f161ea1c8318830e0e39a2537bbaf4abfc840599da041f45542b5d3 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2780 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2780 iexplore.exe 2780 iexplore.exe 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2684 2780 iexplore.exe 31 PID 2780 wrote to memory of 2684 2780 iexplore.exe 31 PID 2780 wrote to memory of 2684 2780 iexplore.exe 31 PID 2780 wrote to memory of 2684 2780 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c2877d6032c58056c3f30582f4621c42_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2780 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5718875b4c65acc386ff7d249b9727b1c
SHA1c995d6bee7d1152f9e1d8d5268e68dc77a2caba5
SHA256286fa147c203b8d411bc27ee2e8995374968b5c84b87424d9ac6994e136a218a
SHA512da4074b24721b36d4ae1c36f986e27f11b55c6d1e57556f43d8f953b5d3de4371a5a61a445950a51f7fd1bb6190f0143273ca812895de9348cdf1ce0d8105966
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd9cd992955da49f291b52d9f68248f6
SHA14ab786d20d41254a04c88562607ada5e2edff62f
SHA2567105377f08fdfa9ef03d010f01e5c6577eb96f9172f4e1f042c8fb30ab8e97de
SHA5125beda6af2eaef80c4677396e50b455e790f82059dfc918742635c588798be8239116abffd0b0aaa36a2a9c2902eebda9509d22dfb86d4b6eca5a514a8a37cc94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c9bb7c1167298b01c9522d917913abf
SHA1cf591c8d9a2a1de0a95c80492ed17b19d7a10b7d
SHA256e9286217719fa580190ed7a03396daab4eede5ed85d46b520e34a8dec4eb68a4
SHA5127fe0f35a3fdde79d888af60a32686cec66cf628ee44b9e3f2b39f2e0ffcde9830ec410a783db302237a69cf6a69f136f0b23e36b0b20d9dd9a503efd10fd61e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5630b31035bba02c745a84bd1fb14666c
SHA111ebadb31a7e752f5eca9145ebb4466cd1ebc5e8
SHA256e90401d11410bd9bf8fdab0c89cf4928c2059443dc56812e074ef510eb57ac9d
SHA512b4f33d6c62d3ee4a288df7bdd2c9ecbbdf58f7bb3433f07334c478d21932e04e240a8aca8b429f4a2e8b094fe39e2d317c90ab4a248e78254bc9d6022d7289d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dbb0deae671049d1b81ac05bd95f08e
SHA11db51bc9ad5c26bb9b9379c28e749a57d13fb45d
SHA2563e2fbe4639568fabb206c8c2cb46d8ae664d5daaf48faac93d1dea2353e2408b
SHA51256af596177f9d72a13ae28a7cb3a2ae2af68e7fe0fd42fe7e54c4f4ceeeb4070cfcea2843c3a13615f6668b18a285ca4798ec54c177cf928e1deafd1f4644215
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc6698a4c14379f29fa9b0fecdef8b04
SHA192bb18fd50ca31a7e441acdaefd0a5f322a51ab5
SHA2564505582eecae07fc0125c30ebfb0c92757bbbeb97878325d71e04037abd2e0cc
SHA512123aa8e6a0b58bb87ee2655a639989d817b4db44a61034e1f939aa830d52b7c2ef709a2d0af5e29c8f415350ef7dab60970d597d0118432b29184c8c4e3dcefb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507cdd689a0c5dc4e21304d859db2e4e5
SHA1498c794f2a22f1a36e6bf0c58bc2bf5bcea26d8e
SHA25675698eb80555202a9b2ba7f85dced385af037e1a9dd4358daef4926fcb2c8fe3
SHA512d5ec3bd2040f977c5a8ca11ce1c5bd61226e2ef8ee505d93c1a3fb921a31bc7b4c4ed84ded13d31ed8a3d1db23b2cba765efdb1bb4170e1e4d4b1a44c9e3bea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568afccbdc8703549274660862bb96041
SHA1d44ef6b5b60d1621764113c445d1474b538ad0fa
SHA256cc4fbe37058378cb260f4ae343eeb8dd3d4ed67eb0f58eddb25370aeb653a191
SHA512ff58c3e76be6046ae38f0c7d75a5431193e440674a239f10badcebf45792edcc0d71d562c36c0d9393afdfc457fe4793c0ee56351f055e3def65be3f507f88aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f1614a3e3660291b1b717ce44181740
SHA127a4fabe1c2cce1f1732a966ef01ffabc718db7b
SHA256673be3a5e7a2272058d8d3a8f95067df1cddc627fb4acd4adb671ef59e67e09d
SHA5120c8efd2253130f73a8951f0433775d59a618b6e00a50b3f09116785ac4fd6cecff7639c8ce7d22d565960aefa29efc34527a71838b5a2011f228ee4956daa1a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f2454071bec3336bed4b15ecd0fbf8a
SHA17041da0953b884b7e4b56f338e5cdba9f5daf2e4
SHA256a425015596b6b38dea73b8d93fea1631ea9ba8f98ecfb83516375c325a38e984
SHA5120e9342c92b938e33a87f6183873ea60948f65135d63a7de53cdbaca2ab6f48fa268d05940b03ee535d904153745690adb1f4ed26bbf6a91d2215ba389812984a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7a1f9c75e8d8a2da3fb80dcbbb06016
SHA13842ae412a205da160700e5621d71ff06a008908
SHA256e0341cbba44fa028c47acf1ea668e83783251b3c8d1771fc0075f95d7436615d
SHA512e400c373c6791e45d1d7aa6ce03c95b88a385b125e650b64c541ec70aa24d4f7890b230c800a89353e96a5605ea0dc0266d879a636fbf9a19a9594675689d151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5918eb1e09d51eaf12c9ddd0fe81e9f1a
SHA1740bf56e9f8f8b520a3b5b77edc8c826f35284a8
SHA256435b0d20c7ae787ba0730c0dfb2ed0d001f168ba40d715344deecb03f5d65a54
SHA51214db1df6a027399a7a8e96e8a5e62203e95e67e062de0a41416c22d6c2826658a2f43f9dfe26479912c8cec68bd2fd4c632a8949c5c61d9c13194773f0f1ae7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab1e073f4aaa55a19d5221b4652d768d
SHA17dea23e635e83a38d97275e7a83d7d3833aeaa71
SHA256af5440b40a0cb0fdd70014825803e55cba7cad466f06debddf2ecae98037aea3
SHA512386e10523dce56e498a4f98bfa2641fb5e08f85ac49042f8dc0be50cc3177715c891c74061efa0e018a25a46b263332d624ff3c010a83fa7758a359d8adf8a78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570f032436402e0c5b4d47528bdf0c404
SHA1a454c1933dadc3e8750eb7e4049e30525abaf65b
SHA256c933978922e22121225b54ab8ab2fc9152e69a4a53da432ea65c46a2f1e94633
SHA5127761f5cefde6a1c80600e0197e428cb10b66d713164a700c1e9ad8a91fecae2d8296c434acb545052335c4907719a52a81738ab415be82d62fef2e5b7b720367
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8e7d836a372ab6ee1b02bd9ecc82c7b
SHA12d093f8901131b88b3e8711f4cc524ec365bf0ab
SHA256ef96956a47a6164bdbdb1cc7de34c5f0fa43ac486a292256cdba2b6b80a1f9d8
SHA512a0be40655ed09bd203b2b7af159dd9fdb11ea472df071891cc6f17f452cf11c0711c6ed5b63aaed0201f48cccb6dbb5df69d61b556caae57270478ff592b9c9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf19f7adf3d6e79c63de2ca220cce7d8
SHA1f9ab12e65cffcf8288e17ce7732c674bb6449447
SHA256562a9e162d6d7a6ba930e94653a4cad01b79aa391ceb6b55e7e8764b412f02eb
SHA5124e5d2d2b7ad393d6c3fbaede3edd5b38eb5497c6bd2d01240a40ece38b46e13c1390b014e7145621e8532bb230613b372fe9c3ee0e2db6fb3a7b2a421c5bc5ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532cdc1bc3f9e3fea617f9220c622a6e4
SHA186d836dd3ef2576038626f296f9a206e300d3328
SHA256336d12e13e0775144f5943120e8b0fe6a6809cbd7e041869706dbb50d25a2c57
SHA512fa59f1c09298b0f43f649a6ead75e763068f3e29026e3ade213850072b8fafaabea7d759573c2095d48043e99a617e8f10c750f7e8bc2dd85ea3a4041d63baea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5637b4769e72d5239e90b6108381e5246
SHA173d32e6f0b3863460039d3a42d4c974a82dd3c36
SHA2565da5687af7bc35ea6a474bcb2d6301b1d313fbafc5fc87e0f4c75ddc1b3f2c23
SHA512f86dbbc38dd51bc8faefc2803c5e59de7893f1e69a89824f3a1da4506918e3f100c247469ef0063eb049e998bb6c2941a927f96f414deef2ed9a3f272203605e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568be032861ddd40b49bcd8e86cc66271
SHA1728013ea058698fa05d29342d5db382100235adb
SHA256196289f2be93add81281360282a98568e982c07e377593cbe53ebec1fc3a25cc
SHA512780510138f7860b45d37d29d9f88bc323583f7d0ef0d0168b5506da9125fd93e27733c6e2ca80cf65c0626a852d17a5165c9849d3784ffb041769089c2eaa97a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b