Analysis
-
max time kernel
135s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 08:13
Static task
static1
Behavioral task
behavioral1
Sample
c29b75b97918498f31f8c41abc04ef09_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c29b75b97918498f31f8c41abc04ef09_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c29b75b97918498f31f8c41abc04ef09_JaffaCakes118.html
-
Size
72KB
-
MD5
c29b75b97918498f31f8c41abc04ef09
-
SHA1
842c679f5f56f4277a8291a9f05878b11a9d364b
-
SHA256
d1c4ed0946fbf0ece7f58cfa869275f58e059f7ffc66439aa65bcb91b0c25ba5
-
SHA512
fed87130ab1e1a5a6650c36de0c2bd211375ee5fc52f2f7a471d169e21f02c15cdab351769ceeb1c02945fdb26d32f654c2010414b9ed806471dd3bbf59a49eb
-
SSDEEP
768:JiIgcMa0zZAx997fzcjykE/ioT2UCZkoTnMdtbBnfBgN8/Yyq4gcRgQFVG8s//IV:JEA0zYEWrTgec0tbrgaWcVNn1fl
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430821885" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000006a8fa5b36d4037c3f81e479c5db175efcbaa5cfe8673ebe5d8492b52b52104f1000000000e8000000002000020000000aac5f7ff700829585b5bfb9768d836e88634865af0c79f0708892a3ba8ed566b2000000071331ad9f6e89e0c23050f79b0b47d876803bdf04548dc33217f039001de52a940000000d915002a525d6cec47f5bcf80cb43cb53238c8733b7b20228d916cd006fe7af857c5369a4cc4ffc32120b73c7e7ee01a5a405037ae051d54bd40caaf3c9b2469 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{17B5C9F1-6383-11EF-98A3-428A07572FD0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 501d87ed8ff7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2752 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2752 iexplore.exe 2752 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2752 wrote to memory of 3060 2752 iexplore.exe 29 PID 2752 wrote to memory of 3060 2752 iexplore.exe 29 PID 2752 wrote to memory of 3060 2752 iexplore.exe 29 PID 2752 wrote to memory of 3060 2752 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c29b75b97918498f31f8c41abc04ef09_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2752 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526f9471821d11c5f069d1ad14ec6b003
SHA1cba22f894ab884809bcd391f267e8bdc7abbb8c7
SHA256735282818cc553c725e05bbdd9c0b104c0c138777217912fea9e11989aebacf5
SHA512a2227e85d51066f6c08b385417f55fd06cb53b02dbabf81a263f9a1641b1151443f093883707c313220174b1b91afeb95945d555cee3983e9fb4f080db6b5085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558445ec07d5de9e95c5b318ca28c0996
SHA1f5248797c87d2b9cc46178d4d34fabecd43c1a59
SHA256a88176a0cb6299664d37d72809b9b118bbe188a22a5538d8d17f958a070ae2a5
SHA512582a0615d02981d9e9d1a95456ca53b0d10c122769801d3504ad265197c0e1bbc6fb9ccdab357138e5b173967eb65aa65b924391836de1fde09f5ff253f54b90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4e396770578a9ea2c51d62a80dce99b
SHA1452a79a4f9324151185e4c9adc9063158cbc39c5
SHA256de5ae936a405106a47aa22fac12a42482c937715d0b31a6cbf885471b5d40af6
SHA512d0a0b179c73df88aaa2f5e5113085dce26837bf0181f6f48b7b73810ed60be0c686398acc87ca559ade07c3610847ac63231809e01e909250e48c04a5d8c99e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7b99f6153f2c12ce4c7c322239d57e1
SHA170d9dd061679ecb81912d0bdcfc3c94ccbd9ca9f
SHA256ac58dd0b54d14fd68d4a54aa32e3b4ca0f1175edb9ebdc403d7548479a4eb5cc
SHA5123faf909d27cd8ed5a431da56e9df3aaaf7e9020eba05a50ba8a4e83020ad64d1285c936d986b45c1db35d0d5ba2b772178e7f2a6623085c284d60e968edb2dbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f0d2fd4ec6739fe51ee20623215ab0e
SHA17652c26beb3251f4b854cc7f7bb9a9fa9a706241
SHA2562c899f8883de88da92d44c6990aceb3b0228a896acfeb1ff1cf2450b10002a94
SHA512abf68a7f7cf661b9b07f12141292db03842a8d22ba05010fb05176d860b47233a79a1bd866b37039350c38fa29c09dee3a77d90409eecc55c677567f47b2a7fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536fa72cd35e688b1fdc4f02c41f0505d
SHA17d0b9d660bb9e4ed56c8c425abffcb5b0acbba96
SHA2563280d6807f07969356228ca8cc6c08620c0f92f2273ad89772de0075abb49253
SHA512b3870e50099762a8c6bedac093cbcf751ca51bce0aa07bd0d025fb196d9075d4705d93ad089a698dda52f46b2473ad316400c8bfd1d0171e1f520df2ca421586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5639b001a118ed899e454c8e0e85e6c82
SHA1d33a9641a3923a576b1599bd6251683d66491cda
SHA2568d97bb512bf0ad4379ff2da7d802530ef98228d52c85f5b62915f6c005bc7ccd
SHA512b414681748eb1387759f5e5f39f784c0f38b816e032bc6e67a54e77e9b4faf604f155a41c252b40ccbea0f749dcd9e2aa6dd23501f1a8f46329ba82095d5fe1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f0e0c264cae141581f87abf55f4c299
SHA1583b573c564101452903aad667e54377eb3dacdc
SHA256b88369af0deb6b0cae7940a5d8d96e3eecc80569587dd5920f32fe6892b30c29
SHA51283dd0d7e53c9f56a606cad1d39ebbd22f9be87f50dc4f5d4dee27845eef96b6aeeee0c0a1ae4c46a4a44894b42da8593848669a16c22e9a126bf0eba56e16954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d74814c418a3349c41ceea810dce15bc
SHA12a05208a4c006261fbf269bb72eb5d0fd98380b7
SHA2563338100c37517a76357dd268803bf4568084e9a23b7b7a3b74e1e8fee9df998c
SHA5125390f777e67d3f27adc11b473794774f762715919e7a8a52a4c9e612d391a28a770901f2aaafff550b3659ef30bf8e41a3c72a1b0be26b381de159d459f1613f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7cd01052e98f1979882728151146b43
SHA18f6ff5c3928e6d4b47c750eb50b9a71c647f4537
SHA2563d3fe67bde9a58122ca5996592dfcdb0769e04f595b2d0add0c3711f39653e32
SHA51238fd23f7effb503c41a1b81479592a1d66df37585c91e0c8f6d1193a4779ad27de46765fa19d089f8fc6791abc4f72abc29daea5ae938364ff10fb16b32eb47e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522c004fdc7b8c92786019cd6290f12ca
SHA125da8e7bbc1bf62c824a5553a1ffbf96b01b2501
SHA256bfdf78a5f1f8de76f7f3288d39214c28d587e9cbf3ed30bcb1db024b6d3fa893
SHA512d416ba5f853a60496d0709068d2895bb50fdb6f33c020256d0074ee67843ec675299e85bc17d5ece0700b7957dc28e59df80c79d7b273db6ca040bc36ea038d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b88fab2cf0e10cfdb267e144efd27407
SHA11ba1a86a63cc16da4053ecdee12bf35b9a09510c
SHA2569b5e4d7cf6939b9ca6d0af12f6831b2df089b6955083fae323d051b02db978bd
SHA51295c8bab40faa61489a9d0f0c12ac24445590f389feeabbd74b630b25a0ec183ba8db7b14eb112774eeac449a96eba5acca7e9adae295ae2ff58cf60a0c25d36c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5023426d3f6a0709ac14a12f5c7709a3e
SHA15081dfc01950797c8c6346088a54ae2df0749cd8
SHA256195bb1c1418abcfa00ce1273e1c777642bbb4ed6a092cda1b372537dd9206e82
SHA512bf2ce95008180734d5c642aa12882b5a14b4653764289b7ffb864ea384cf59567413ef37b928b2d4272d21c3abe1c8afebedb79280e649416f844ca346bdb023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548f26e2f8758f878fa5b796dadf52d5f
SHA1bf794f395653cefdc802332bb9bed0e607c64b73
SHA256317cbde9d476cef1c1a72844be63eaade17e97bc293b16faf79d6010746c8970
SHA5127de9dae9a01688edb0744044a284fca1ac443cc809ff168ca047ca3fe05d1de12564ebc90ccb620044d650c7408c74d7f73401cc6bf500b0984bc055c8c7cf87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514a3dc174fa5f79ab30159d3c3da3950
SHA180442b0494d22971ec63c904d713137a255d2f3b
SHA25610e03ee36c3791f22fe1608448c8aabb7b2e02df508a08ff7c3ca7d9510c7dc0
SHA5126f72063f2fc807605884f7a3b202c4a4580657813980d32e34a1efa84a2147f144c5661eda984567b18f80f6b093f70132862f33c0ab452590a9175be9317f23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d956656e32eed270a20ccf254dbc1fc4
SHA15277df4242ba127b3369bcd68a2d2f9fbfe6f238
SHA2562a84840dd1f40974e06d76913d96f9bc15b1ffbfa44e675a6933e7f9419b72c1
SHA512f9a170eaadc913d34fcd60f052da8bbcbb9feada367e6471a603c122106f506e208987882ccdf072367776f22b3b6c8c86e072d4d541ff5d5338c22fa5fbf6dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521d4ce10e155ba27bf26489bbd33edb8
SHA1bcec572cedb4b9eb7fa3886be9b5389b695e004b
SHA256ebe7e40b4278e1de8632c6d3cec084181759ed0ed279ce8ec0d3875db77d4ee3
SHA51219d8dddd7487105a143b9d88c7a0d469a7ee9c2f95a74607dc455a75bbf0cf93d207c6cd396371e0a075b083141adc988a9db2161186d85c89ca2546e32a9b35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fae895ebf60395316c2ed040069e9170
SHA13b8839c6f600be9ef146257528d1c5683eeb683c
SHA25677fa4e243e6d617ad6b135168bcdb18fed6df764e9de8ed288fc682315afb74e
SHA51243d484762a7d17b2c0fc3fa30d7c815de39052018cae887bbd33b3a549bc94ecd93ddea7d992985a67f11db52fb68819f23c0ab53ed0ee730277c5ff66165234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efcf78b5e3a4271e75b3c6db2a7e2d58
SHA11480329ed7aa619459924589b0033d525e7554da
SHA256913ee19c1dfb9e7c64ed8a8e68be3ed0ba35615f0bafbca8a370108fb372fd36
SHA5127548a96c572d09956ea9c4759e8d0f91d4b9a6a9f0d0d0d8f06c69806a9ed240cb2a9938405506249edf956038baceaa2c3629897031bc72e5dbbd0c775aa37b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b