Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 08:10
Static task
static1
Behavioral task
behavioral1
Sample
c29a3dd2444713262cc53f4b28952e9b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c29a3dd2444713262cc53f4b28952e9b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c29a3dd2444713262cc53f4b28952e9b_JaffaCakes118.html
-
Size
10KB
-
MD5
c29a3dd2444713262cc53f4b28952e9b
-
SHA1
3677c8b05a1c1787fbe1c29fe74fcf9ed4f426a3
-
SHA256
fdb45bcdba79372d9e31da3d6625c5b29d7af0d481b57400d303ac50ebb9e770
-
SHA512
576a49942e9b7fa65908d294f8a61d972d95d7c8cef9f944db076bd66815729297764e3105a36ea041c83f6b34fbe7f17e04d414605039dfe5ddea865ad5f0bb
-
SSDEEP
96:uzVs+ux74OLLY1k9o84d12ef7CSTUBGT/ktApFjYYUeYqvDaL4OwICbYrlVHcEZe:csz74OAYS/I4BYnejvDaLQIqYrPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000a2342b2db03c65c25882d018b29a5db231e3127ce2ce39a597763ae46a55b871000000000e80000000020000200000004a17b34b9f5dbfca8b370f26487e04ef2b5cc56481d301d6b988e61639e885482000000074a3b7cbbbcf05a82935263820ac7ec97a6e55126d8c39353581ef862eac1f8f40000000d9dd84e4f3b9cbd242361b660bca13f86b47053668af002b35875b6726b8735fc5a41b9583f232df077f32b131e00d701c7cbe4be0be372d4e98cd6e858e57ab iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00e300868ff7da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AF849231-6382-11EF-9232-D6CBE06212A9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430821708" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2416 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2416 iexplore.exe 2416 iexplore.exe 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2400 2416 iexplore.exe 30 PID 2416 wrote to memory of 2400 2416 iexplore.exe 30 PID 2416 wrote to memory of 2400 2416 iexplore.exe 30 PID 2416 wrote to memory of 2400 2416 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c29a3dd2444713262cc53f4b28952e9b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e5b55c401836ce6d83edb1f1ddefa47
SHA1c17c24df983c3d80c67eb0ff0a9a213957121030
SHA25612177521338842c10d6ff6d3ecf7b1741aae59464697751657c99d069dcce370
SHA512460608f2f4d5f1314be6fe3ccb1f96a681997733be87f99fc8f7ee83546858f4095ac540aef1a3051e11da65bfad0eef8a427ad73435e935ca4b25436ee9a1d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570c0a3720bfd1a4c6669df3ca0e34a65
SHA1e66d431a1d29ddf68305ad817e328ba65d7c7a4e
SHA25650c919326daeb60ef77940ea1f5495e3f873f7d8efa341fe53775cfff66e5655
SHA51249d9f0432c7dac071aa51e7c674222aebed4f7fe70f7aebb480ed181410ef7d5535c8a1cb72f966616298123601f76dec67f353f37fc38893d74b8200f771b61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a40621e4111504ce5d49e57bfa3a241a
SHA11d6f82ece48000e20fc5925be4995a8bae4b6c50
SHA256236c6cdda52d3965041239cd6ca54c5adc2ffa460d5efb21ba4ff6c1039f9dd8
SHA5125e8ed098d868d0dec05cf44306cdc886ae6d50436614efd1cc179168513f0718862d5e1afc8c8b83fdbb382dd19d41b50468a77496777df4afa754b498055c01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b5be358bb11a8053d48ca1fe65ad357
SHA12015f52bf96ccd801cae0a80c1567067023a6a28
SHA256ce2dfee62e9f7c2fa07994e43d8c330113763cb2f79153657adec4bd44982f42
SHA5124a10e3d6810034c0c76601295a37b3891466ee434f93e41699d7668562a6f44e7e59608837a347b069be50c45fbfc9befc9b2dcc5ce119c67e3581fadfd8ff00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527e419fc384f6941a2249b0c56d0932e
SHA18f4af1fc70b8b370478bd850c64e2011a720bd56
SHA256cdd5c5c45d02773197cb8f5975271dc546faf33fe79f6d336ea7e84871562cbe
SHA51213d7f9367996f0e06862e21e6bd8e747badb3aa8082dba198a638a55c8e36feb17a057a30db9c5cc2718d5c858c1a362181478c8bcaa87fa587aa8d58b6cf8a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a88fc94d8c746441342d241868c16da
SHA154b8d81bbbd3388ea7dd10b8f009c11a2e1d4974
SHA2561fcfac6d574858acf85e1ae3c394a273e9dd292aabf55b5ce53ab38084649460
SHA512847e5ab0139f34e92ba953aa44fb45cae2ed47ae21afaa1b591c9c54b8cffc3dbe17df196e337189f5a41b837a37e78857475778968f3cfd597dde23ccf6fed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abcc701a1e1f67352b7d0d8c0b016bad
SHA1ecb673018ef973ed10406025ce3c845e30d90acb
SHA256a5802fc751ebd6d1ec5a856d71a10985c10f4b5ece2c6604db1577e6d8e40668
SHA512ce9b3fd445059b1ee739d1db2f8b4071b474cac237a9f36765c09a5a6b3c4714fcdb38a6db5ff2e318e7054ae32c12a1239df0d940f90e1b7f7369428d87dd3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2906432533a37ce10493e38fd25ad28
SHA107ec65cea9e9e2b5f29569372fd4d2329d6f5a81
SHA2569b290c14a59911a259b9ee47a3dfd68411c456a3d17d230b325dde7b09f3665e
SHA512e2f4ecc41d6627406f361ab55c72820baa2e31b8f5dc56db16836c5c4e1185cce02a6a95ad528fb0a86add4587f73551b68ec588463e8506c1c5b78a5496fae0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5489f558eff3d27df7ed64f3afff3819c
SHA168eb1a9ac2fc8bb57e84f2597190ea7a16ec67af
SHA256c5cc200602a5fc3d433a18bcfe558570ceee710f87d7557638041de8ad672252
SHA512c8dd21a62fd625aba8676de999b3a856abaf161c12e7aea722b789112d32a195eff6b5f98c76c9e7e4c673c7d818cdfe7d6e4fb21d01f63003a7cb81ca519543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b2bc2cb3a33af7c7c4be0532e14b8bb
SHA1d99b819a0bfcd4a786d70f17e1a7c4320da1c203
SHA256b054221f623a3416b19258a7985262c52a9b57eb554a636a429547e9f0631949
SHA512a54367beb5982db2088b936df9b3aba28af0393fbb0f2dd2bebdad11d24da389b8a645a5c2dbe2abbd233e03d0ee99394e85293bd14758bc99f55df4a8ee00aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57765b2270f2a55250f49ef8c9950c48b
SHA11572616da0b595030e7fc22596e7ccb674d16def
SHA256b517b084fd2ee0d7291a645417dcfe072a668eb2e05a528ce255fe748c5ec94d
SHA5123212bd192e143a62f7a4cab3a42abf5367439481192430580d157fccfac0db178261cbf96a4cd9bb6686104ad4aae436e21279d372e44e1449cc4cf8707ff5d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5127994586e712f19714cebda935bad0a
SHA15a5f805437c7dd4a06ffe87f7ea732318f5cd074
SHA256484aded2c7520a4a77b474dd0142ef22804cb3716904ccfb47bf32be97b8862e
SHA512e123c2851aaece276e258d7bd8c843678d9bf9b8ce291d0945e56b8a3a0e9761481e328d7f41d12178cac7e9708f231985d226f7d2ada431767196874646e756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a41103eda1da009be53e57c5d931d426
SHA1da5728327b4d7e8f3901ceef34b40161d646bd29
SHA25695db9a50c595a18ff8f41a83fc999f43f7873a2e7d16765c2a817697e03c64dc
SHA5128fcabf20daae3637baf8497aa2596a21920056e9bcc0ce906e0ec4ff18575fb8ffbabf9d549b17590f44796ef38d57076d0386f4b4ba48b563916241836a7986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e773f7190508861a618a3c0433eddd5
SHA1164f5a3f11e85b7be991d282634d23e880f113ba
SHA256709ee75e4f4b412be3045ea55eace2c10b4b72a02c4f50699f27b0aaee9c74c1
SHA5123f4af8d96a63d203ad5872b4d0718bc1cc971ff0c31388d9a1781fef32c22f1cc374d6fc7acae9b410780b238b1ef9954bc5033124a56836d06f0257e73a5b31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5919fdee2d4ac889f2c07d8b65e189a5a
SHA113247f1eeb2a23f755eeb9d16886bdf640b61346
SHA25617e121b01a06de596deaaf64aee03633f6f611b84850c675a1eeb4a617e1e0e5
SHA512a1fcbf8b172abf30f9a30fc38e9248a72092d851c9435ad25cef5bd8f8af39304c64214dc5846e8abcfb4cfeb80ef60a04f3044e246856d0aa162fb92ea6eeb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59007a64eeb40a51ea2d2a75a7b7e4327
SHA1cb8890f449a2db552dde42be4c73af21e6064220
SHA256e30629960d205c9817f920326c65f0d5b59014184895ed2edcf8fafbd3b513e2
SHA51249a4a8b48ae9035599ed50c14437f0c4e9b2f0e2bbef2834802753d9419563a383e7b88170fa41294f5b0486f7df0cab5daf586fbc134b1e23d751c0f9dbb799
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ce65212317d6db0f07145201b93af08
SHA1b54780b3b0762903c1ace6379b1792532e5020bf
SHA256714af07c553614a9665b767ee7df21eb1bf95874cd51766bce9fc2743851bfb8
SHA51268c192d4694e3465d345fb0e9702e6dda661fbee734ab289df301cf694bfff51827a7ebfdc22f88b470a8c38265a03ca137781cb41e7edec742c2f1a8fed2394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5680a27539b0bcdbc79eca28b36e483ad
SHA12bcbc902402e65b01b951a020dba4a661aedf4b5
SHA2564c07371d345538609725f1f1bd2863d6cc02ac3bdd2fd63888e64d768d351e6f
SHA5120eff4ad0d902016b1305f8474cca0a2deb3451c9c7e016ec5efb3697b18fd8e10d46f07915d6b1d1b0829e8ac05bc5495145841befe5cfd6d01e85466d6e0e59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bad8296948664b6e4f3e044b8364f52a
SHA12fb35b784829daf7fdb51ec541070e5feeb7650c
SHA25604c1055516b3dd92ea3f3b6d4a9f2bb5013edbfb33201c5249cc1ce1c7e21246
SHA512b5664adeb7771427a105ab560d5becc25ed4ced0f6a83cd2c1c2cc4e948bee58959c9735876e56d96a50b5dc0cf569f0839ec1bf8e4cd7b9064f233369d0430f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b