Analysis
-
max time kernel
137s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 07:50
Static task
static1
Behavioral task
behavioral1
Sample
c291ed160da6ecdc23f62145e90aac4d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c291ed160da6ecdc23f62145e90aac4d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c291ed160da6ecdc23f62145e90aac4d_JaffaCakes118.html
-
Size
139KB
-
MD5
c291ed160da6ecdc23f62145e90aac4d
-
SHA1
69b559c0d1ac04798e6b73ac141ad180fd161170
-
SHA256
944613ad981c566ec9868152a137c5acfb221d464b2597ec4a105a24d6909133
-
SHA512
2c37c5bd90bf30f1dff989b7e58f7004188e6a2db879c180cf06e7864fc2122fc8cd3109b0247f3b1aae180efc64a9bb86376ad6f6346ebf4089067a75a4b564
-
SSDEEP
1536:SbdEVcg9lsWyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:SbUZyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D92C4401-637F-11EF-B74C-7EBFE1D0DDB4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90ddd8b28cf7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430820490" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000a02bd8bd72e128760caf2d6963901ee975b114fcb17c911b4aaee5aa3e79aeb9000000000e8000000002000020000000bfaf74fb585c6d5b63e0bc3cd5258356580ccff2cc7458bc972d48206fb44b89200000007eca3696b9e6c7a4315b4d9ab7fa54876bb721a3883f27655a95208f118a9518400000006969d8a87418172cf71c964713dfd86d636a3b80d318996e9723458d215cd38390d61a77985412c450de1da27ea6f8e0886f7fcda26b01a8667d7ce87158c4ba iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2540 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1528 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1528 iexplore.exe 1528 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1528 wrote to memory of 2540 1528 iexplore.exe 30 PID 1528 wrote to memory of 2540 1528 iexplore.exe 30 PID 1528 wrote to memory of 2540 1528 iexplore.exe 30 PID 1528 wrote to memory of 2540 1528 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c291ed160da6ecdc23f62145e90aac4d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1528 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3704b75ddde31220a553eec4279a9e9
SHA1f0830289222325a9dfa8199a04076f149aa578f9
SHA256c03b4dd69c03cfbc2c1dd4e8a655cbbdca5a95088d97c24f2aadd20ffabd507b
SHA5129e188476819884011c0e9302c8b575aad3c5ab5fd76f74746f943cc24cd455f67a7d2dca3d82a5dce414204a821b77c24aab5f5376402b37240ac308815d8953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5025bb2c3244479e26b920b466aa95a
SHA14ecdef56f9329dcc374bdc30ec29b1b6523215a6
SHA256321ba7faebf2365b9bffef944f972c5a71dc186a5c45d30e1e16ead454c209f8
SHA5129fbb7156d935a7ba8b240b7de29a87f5ddc0ed1510eb28075f819ea9a7c5e535716c90b323084315546c78b11c68f9e9038b870ff2b3d9fa86d2a34792827d63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5bae18c34ee301a21058f492db51a81
SHA16458c976c587a0af6c265565e3ba8ba31d89377a
SHA256056ca3765c44e61f6f163e38470953fddd7228994c2d60c38d82bedda5704cb9
SHA512a377e4e97c268f7ae10bf3464d24e08bddac6d90f2349f8a184293736121a25f6bb737f9049eaf4c41c2a087cdc73aa77ee72e65b0e09abda2411ac64c8a6c9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539b222a79a930f8091178efa75a97dae
SHA1aff304024e5ac1f154f77c7580ba8edd0989d3d0
SHA2569a9d41bb574087ff8e1312712d65eb2e0015a6a98dd36f1074d00afa6d2f2f4d
SHA512bad834452f682fc562887634dcd9f1436f9fb422dd897e8e5909a8c00dbbeece2541266671050880ed1c41399098732946cf3f4657e6a63ab9d09a4bee63f6f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e25e0bc5ba6191d560392a3b9e38077d
SHA1e878c8cd6935bf61398af184112fc9c0bb3f6b21
SHA25650144e64c3e25b9b84fa43885fc55f3d1cec9c390c77924f40fe5850fc7e1538
SHA512c7c8e1609dd7b2b23674c6228a08249f5af560bd3c8fa8736df8f32559cf53f7108801aab58e090d0db344dd97d79c6cec38c94733999bf4fe4f5848e1b7d526
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfa874e31630ad8586f0ffe6fa4a40ce
SHA195f625d38323cdc170de013c88200c9a1b82bbd4
SHA25632a8805a6be74dbbec4a7de0a2de7b9fed05a8c1eb5997e35699820a4eec980e
SHA512a51be594315c226a8123df3251a2fb750da348ce7efab0e86b009826e1156ef02321516ceca7fe2b34ea960c0164a2de716c78c210a9dcac66b573dc38694654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5974f7b4edc48de1f33e18fdcb5440a17
SHA1c4e279030141873b81c7bfd04719cb037467035e
SHA256a88fe9d5a45064365a8f9b85858112b37802d02dd518eac1f36268b814b26781
SHA512a05b78e0a2207a3ef54a59e1c0779795a39657a3c823a35da1742d75792215bf75cac444cf307ff354ffa6ffbbfd5160e330ee25a3498d1936ddfd421aad4cf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6c7718f39732a0d1961ac7a095d4ed2
SHA19a0c87630a65fe891af4bb3742d93bb612839916
SHA256bdba0f5a5a5f885f3b72c62936bd4d30c5350bba21a67dfd8b1a7985f95f123b
SHA5127de3b88509907eef90ce554de7fe078401ba5124112e06ae5aeefd8a0d98c4d8f088a0f32862d6a675c74129efb621cdeb1e81a44aedb14b798914daf5d33bfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7a22032b7083114660274f5c42f04b1
SHA10364f9bf89cef419498cfe71734e463ca086e8be
SHA25662a07312bfd490a6a0971d19fb30ee44429445fc60f79f2eb9d77b55e7d7e6a8
SHA5128596812ccdc348da36b62f49972b0c75eeb34f3ac091bf1d0f8d6478d3dc711a5e21a68bac7694810a36108d792eeaabce024b8fb903f05bb4580bae679fc16d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fc772ff47acd5dad33f43a0542e3611
SHA1afaad4905429d3bbd4bd2325d8a413789e25034a
SHA2569bf1b0f79947c7fbf5e24b85fba4aaef14ec74c19b020bcb029b58f63f875592
SHA51289b6b67499a69b7220e418bd4250901f9dc9e36d9b5309a93b000d4666ad5ae5ff1b321446236238d59444f99138fa7155778eda142d9b5489c44293898d804c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52098b3ff797743493f27132d91122774
SHA1c5538b42edc3bb904e090a34e65cabc166dd2934
SHA2569c2d8e689d268c676c087d51b71a98da37c96ef6574ce37bbe7cb1487c73564b
SHA5124debecd168da463b6c12022328b647566671094e5af5826051a55e417404c8f6dbcb80532ad9f3a8b05f3d9705ca700d5b17f51debf9f038c7dce75c104e0229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1878aabc01599071f7cf9f2d4209bf9
SHA1d9cd9b7a29e3dfa2f7f62ef8db47af3748ad0dcc
SHA2566286320e0b62c3ad1bb301576baf4969766bac13ab927ebf31a0ef56bbd7b281
SHA512b2cd75f1527aea59483693503b5a3a2ac9f9c324fdaf4b11448e38c8b1411ab3a654c2d1236c92f16f5d72d8a6f03dc40f849c9ef2df20ad24ec7a433fead5d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56af730f9a0989d2080fb6d89b59c408e
SHA19d9d9b2401565d9421bf7f5c258377c4d91dc459
SHA256127c29311d5d667fa2649634b6d3c95a0d151d9057247467ae79d2b154834dbb
SHA51244542b627bbc714091661ae6536700341d8cc02c611bd478fe61f1951f3f9e6ea6505cad7c693188441f938fa034cb55377f338c831fdce39fecfe6530f9681a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b23ae0f3e4a891201ed8c1f917d78c01
SHA1b14f750034e7c21360a01235e2c84152a184672d
SHA256613247f631a089ccbfc740be4730d9e3a0b3ebf21ce511223b4cc8004821142c
SHA512b24e5855bc3bb693bbdad760fc87c15c69ea97b599cec1f6b539fa4ce063038e7e30e19e7ac41c005ac6a704b9302923f6bd50153d3de75a4b8910080910e2a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc6e0fcf098c015bd1191d6bd9775c02
SHA19131855765b4c20e7aad3823f68e77719dabe0bd
SHA2560ab8d1178a85c0faa9db6959eca802671800875c795b9aa194243545a42092c6
SHA5124fa8d742cf1014f9251b0946d66df57939ebfeaf5238cf82b5efa4e432b7e2433e474e8a2cdb47fa7f8561d13aa096962e5eeea5c549e52082e90e00cb3a61e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570d82f3ea36faf010ac829455327cf57
SHA1eee3cc199c9c269ef8b0206259f18c7614b1d6de
SHA256a225c5a76732e05025d923f76572897d6c1d8061cb18d54157e36183cf94633f
SHA5124219b2db73515f68991d28c197650f662754cc27fcb98c51343e5866fad11e270d634ede48f6a53f2c8b37f92d13d557d361dfc204fc67f23969cb26c7795510
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5502081f412cca359dec77b7ff78b0ab4
SHA10d6a21e19d90ff930f9b04f8bcee2e9d9bafdc85
SHA256c3be37e23c9ce9a7edb8f26fdc2cc96ce47e92caf2a310cc10c7bba7bb6e7073
SHA512514f550f4662a4477715f8e965a1ca5d3045997e1906ce1ddf3ba132037c045ca08ac35a7a4baacbdb9f7e34042ce24cb586e14b58b38ad2af5b9c58c2dea1f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feccf1cba055d68541fd706f6aa61a0d
SHA1e3b59fe9e25d05c6ff97d91d86fa24608e423129
SHA256bb6dcde99b05224247ef4b3d99f568f414322133dac238ce294eb477f73334c6
SHA51257e41a70fcd7cfa6c29fd91e0808aa73122d9f3f43b82244ea2296211af418150fcfc965f8dcdbd6776408c78f3ba7a335d006a1f4f38377f3b3e2e1077e5ac3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b