Analysis
-
max time kernel
133s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 07:50
Static task
static1
Behavioral task
behavioral1
Sample
c292343ab8db10fba1dea84a8ed1bdc8_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c292343ab8db10fba1dea84a8ed1bdc8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c292343ab8db10fba1dea84a8ed1bdc8_JaffaCakes118.html
-
Size
53KB
-
MD5
c292343ab8db10fba1dea84a8ed1bdc8
-
SHA1
4214c0a10115b9e9017892d1e422bd71bc9cf2a0
-
SHA256
2e4731a0cabe6fba7222798e11805599afd916be068ea0375e0fa2fd3f2c9a57
-
SHA512
642917d4a252421a64782e3b4a8d58200bc68382f81bff08afd82a28ff603880800b292419b28871c81387b0a49744f865122d2b365a21c5aad2e9337514cc1a
-
SSDEEP
1536:CkgUiIakTqGivi+PyU9runlYm63Nj+q5VyvR0w2AzTICbb5oL/t9M/dNwIUTDmDo:CkgUiIakTqGivi+PyU9runlYm63Nj+qV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430820521" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EB6E5E51-637F-11EF-AA78-6205450442D7} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000e92a93c4769b8b3076c047b388ac0556f6da01ca6b0aa143a4c6dc6f8b98255f000000000e8000000002000020000000cb1490505c4d9ce1a8d6a1f684de9a5698033704dfee0aac6ddcee1a40f3636d2000000084c35ef7ecb5b7d2dc22e7aa606f261194cfae04ff344fe0bd999ab8fcfdcf3840000000e97ee05bd190a7e96c48c5c89c60e247d448f689b1e00ae2bb7a03da333dc7ad26ef46491fdd756b02dbfbbbb5225b2ef7eab61554c3b94c674c966fc2eba6e8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 800806c58cf7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2028 iexplore.exe 2028 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2392 2028 iexplore.exe 30 PID 2028 wrote to memory of 2392 2028 iexplore.exe 30 PID 2028 wrote to memory of 2392 2028 iexplore.exe 30 PID 2028 wrote to memory of 2392 2028 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c292343ab8db10fba1dea84a8ed1bdc8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2028 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5106942414cdf5a72d5d8e3e4f266e112
SHA16a71a6a09a1eec64e1fb140fc3f24b3508a820df
SHA25688f6a6412194d3212e521448d7d4ad87ff5885935d35443af9c2427a635d90fb
SHA5124ffb188c951b268e862b649119a7f1e300c3f718c02375e8e0605023dd983268fd7eb2a7f1433ae8ecd289e13263a7ea88e4be0e3b4ce327d97e289e05c5d5e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564f5f7482659545feb85b6605e5e0d6b
SHA13085ddc361567a9f6c30e08d5818f68420446888
SHA2561c4969c006ad4212853369ed072fe54c6ed1ec60dfb24c40d12165597a53e1bf
SHA5122364236934fa10a94a9303f34124abf880c96ef4eadc8ff1128bd32459c5afe08f33d23b22cdb8c02e825baaed4132ee8794ab99b7704acac9486c5b59430fc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541d563cd6ae1bfb13a1919f5dcb9c256
SHA12bedcb83b7757064e567faba50cea564c2ed429c
SHA256c9555e67d4a1c86fe4e7339655383796b0f5a558e5c74cbbd9054e600b937792
SHA512a85c62ff8531f78814b3c068ee21d691095de9f56364dc485bdba0cddce7226114bf59f5297ef162b6f904dea02418ab7eb44e7c4f45776736c7dc000efdf11c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5258030403c0426a9f14280c8869c5685
SHA14332dd6658ea10512a317a4c374e89a5861d99c9
SHA2560a87b6a47b0e900df72046169c07b9c9b6144414db0477dd414c791c31a22f1c
SHA5129d69d586de7a1937495768e0e8aa1c4ff764a4ef2fed1ee34ff529f2ec9b3c71dfa9d138d8dacc05c8341222c9c042943fd5a556fc9ad89b680ff1f719cbb45b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a14a7acd400fa924f81c962e0de8ac1
SHA13100233eb8507174de2b603eaab1d6e3d010cf80
SHA256a859410e440af7e83c17051b158cafe015c7b42ede426991818dca52e19fe893
SHA51281d86930e5299f45ca6a6e5f68aea2f5f469df99f87ba7e1c85aa64749dcd42dd69fbadeba37e739a4903c11bceeb131c61f5d9ca01686bb6514afd8392cd026
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5605d2660574be2db87eb5b6f57cdfd33
SHA16018b83f991dd00f2167ce66d5106c4b08ffd690
SHA256cfdebdd2969fb3ec30bab543e7e546e29b51b18ba905379fa8b242753bc6df60
SHA5121473359696d826e51f56cdce7779d513e80d3ee75cd1295d9daf2dedac8156b8a1bf59cb781e2a1fe829ae8af6c4a4d51896e84d0d7caec5a36be3bcfa6de247
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581a46ae4f18697ce313b3869753b45f9
SHA1b6d2f28250b8cf00492850a07ff2f52d1409f412
SHA2566956b98dab1bc8d211871107c0c1f8e4a77882f9ad2d666914f876b36cd996e4
SHA5123c5f6f772a89051e52c3fdb1418093a468116e2a000d14e9c0a48480f0b17d795d4d81ab923506ca423a99089517f839e92694cb339c898cec450a234f710985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2781780e6bddb090946862733f4629d
SHA19d2548b7258663cfcf0559aea2bc7e5f18f61a27
SHA256588ab4b2feb0616dab5e84b1f8969293027b774cebccc9019c34d953633bbde9
SHA512ef3c96997a58641b7094e3d5f2d84bdde655687070bcc21c2bb627dd54ba25d44cbd42bdd76199576d76fae0e40dc125097b0f2b0d515b6b8bf55622684d2aa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c301531bc3814329237b1950349e895
SHA1e39030cdcfcaa5801d83568e32c9000c2d85cb59
SHA25608bff621379ec7cc73ead44ab19d464513b5d4caa3f7c30cdc56913d448d60be
SHA512734c102d8d09af8616bfb9b78184b79b96e45a76b1993b17a294c4c6464947dae129b94f4e03bda2cc82305e77f3655cea6af20ca2f299a74f603df4c9c1d198
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533352f22ddaaba4c918f2e1000737174
SHA1b743140220d038d4899d2d587f8a8b22b15b24f2
SHA256d1414359166a875b24e1343d1533b2ff52320342e09dfb11478ca4ce19aa5274
SHA5124f334c320374a6e60a1379e4b6c9d72b3983d6f01d8728f3192112ff157c29754675724c71691f351f51a0dfc932abf3021d1cffff3dfc5f09dfad626ced9e55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535c3970b13723f2ff3795e89c04aabd9
SHA1c003ec324abf43e833af9ef3074e56737de4913c
SHA2561c4d7e769d5c39726306fd9d7bab2594f00d7fda0e72e28bf3485e93bcad0548
SHA512e445d30b0516a9b48397960111fa22b9becd403bb19b706035e95a3aa1eb1159334b5740de12a83329572ca87408463c39ff387e21fb56e41f0531de6291b8e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6a558aee1cad927b92e54dffc7890d9
SHA174167808fdc60dfa0281db0ae4c6278a5f1404f0
SHA256715a26b3f634752a6ec4ef4ca380263e5d87a5c41eb02b8b4084335e502752bd
SHA5120fa195bc19a48526ca419551cb53ec7056979f4e7a880b98572cc10b5305e1569a0ad7defa743d2308b16fe4044ae002aeb226b3e0c6357b8919cb80492b51c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fa4160be891706daab8fbf892aae55c
SHA1e38fd9a6c6df90f7a0891040390f2c51d1820237
SHA2565f6985a38cd19090cbfe76c6db3d8be2ebe43f424bbe79584bd5a97510a075fa
SHA5126eaffe2c8a34f5e1b21a4331eb574ad40ed0690732ea5f61b47b98fa3e350bbd648b12f3829db4ee27fddfec2fd0545061d05c0d0ce63f185bcf4438b807e669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fff32f7a99f64009c9208fbbdb7832ba
SHA1262ceb10417caa930b08863c4bd9c9ae8e57e2ef
SHA2563be04e4ee5368409cdff8dc70637a179d9930ab3321532c1a2cf9e44cf6e97f2
SHA5128b319dabae60d7d11f0156d6389921b49092be8b1d22fe69c10cb8947034a5b69d8abf600450714c069c893c1f423a82e296e9d556eb8c7a5fa37cf60b0b0954
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa19dfc0fb9c219884224c5cae40fdd0
SHA1704831239be22e6d349df8b1e8b04be5625fba00
SHA256254497f3b523bfeb354a17203f8a9502c4317695791f0649e8968683e27fdf21
SHA512ab3949895684b6e2aa49b309533262ff8bd722d36070f9f2b91b4edebab5356567822fab85fd9e2ec8a7584c2b6425f99e9871c484920070779a783ba6042092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577977eddbd924acf61fa049dc8b8b62f
SHA1853e77d80ca5c1750a3debc7d07460e723ffa4a9
SHA2562bf2a9bde53764459cdc18fc680032ade065d4e73ee33ad8f093dbc1634ae5e3
SHA51282535aedc98e1ef54936a022fd0885c5fac5c02dbc4f630bf15f120aad2ae956611a5b9f9dc91fbf9fd9cd4901bb6741140057081e8bcc7f560f67b93826f78f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55206d2b277d165435cc0cf753939bb31
SHA1676767e6db1bd1506337d76716802b9a921332ac
SHA256e79cbd86ee9e090449ccd0e9608441f99850b14cf5e8ca20f3a76fcb686db1d8
SHA512ed6363a0f788ead077171c95a8f969f24e0b26d3af2cbaafb705bd6528a74a676131fc1d41f160305c36f32068c915eb09f648d55df1b3a93f7c8d4cccbcfbc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed717238a5c070090445a1b26091b88d
SHA1f10b551ac2ac44ae03516e2c9cde24a46958f36a
SHA256022ac8bd8c684ae655cbe5d89acf4d1610822be9539b2519dead00945081057d
SHA5126eed7612a49b5658bf6e9b94aeb6f61ab4bf8adc8378bbe4c6cc4c46f8cc8e2d4c2430f9f5f4aaf537c5b27a0a293a2ff82d6caed6ac1f7c067fd907b551491c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5798fa485e84915240a62c6aa54ae51
SHA162f243e0ec7ae6d83172148ce2104c0726a7bebd
SHA2567a5611b8c2916bf64127a9aeb322773e735fa5e9c3bc22fe92b7d658eb4a6b79
SHA512977f77355a23190f410ead4511d7362e2e21b92876929c1d48b68e460e2dd99aecc0a0380a82ef301c704cd8889bc6a11c303a4ae629f216b2bea44d6382731d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z2D3H3V6\normal_post[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b