Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 07:58
Static task
static1
Behavioral task
behavioral1
Sample
c295d7ea65b678d01ed1ec2f0e958002_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c295d7ea65b678d01ed1ec2f0e958002_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c295d7ea65b678d01ed1ec2f0e958002_JaffaCakes118.html
-
Size
53KB
-
MD5
c295d7ea65b678d01ed1ec2f0e958002
-
SHA1
e7366f9a8d0eb0eb1f5f5234a8ec4be5129fe8bd
-
SHA256
c1b4ed86822d234e9220f472a83ea27c21dd4decdc0cd882987e632f46dbe404
-
SHA512
7af2464328127530955381480ab94a9610e282463d7ffd87f553c4bdeea0a4ef753af3b105f70ee76c057c5b6bf4fc17d8ba5211a0a299a1e76cfb3bb1e15e89
-
SSDEEP
1536:CkgUiIakTqGivi+PyU3runlYe63Nj+q5VyvR0w2AzTICbbjoz/t9M/dNwIUEDmD4:CkgUiIakTqGivi+PyU3runlYe63Nj+qG
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c70000000002000000000010660000000100002000000081204fea20be7d81ed940b78b9ab50fa05e3e3ac118bbe63df0e366d0fe7b98c000000000e80000000020000200000005bca718cb080b5f81381bfebd8d4fa514089c3c89cef23b7af538742086167ce200000002341fa3d6a583e56b60d5ca48b8cb5cc14d45d091a3fa18893b199cb1e61467240000000e98f747a7456926ee138d4308e891ec3ff3fc6748e0657b11698c0b47d74850485134b51189fdac3d5a74392386155a0552ad520e7525f88ea67eada1f154cc2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430821010" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0BDD9241-6381-11EF-84B3-46A49AEEEEC8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 805d05e38df7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2812 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2812 iexplore.exe 2812 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2812 wrote to memory of 2832 2812 iexplore.exe 30 PID 2812 wrote to memory of 2832 2812 iexplore.exe 30 PID 2812 wrote to memory of 2832 2812 iexplore.exe 30 PID 2812 wrote to memory of 2832 2812 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c295d7ea65b678d01ed1ec2f0e958002_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2812 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8f8284969ff0548ec9e13f7d424ad37
SHA1c5fc600c41bc8964661d7edd98b6893ffc6c2239
SHA2560a216af6b5d6b42addea711d6dfb4c3e2bd692b46f7e9cee5bbdedd99853c0af
SHA512857d13028132e68394491012cbe1054cd900c7e06eccbddaf8395a3355ee7bc2371a228340a390be5eb292d806a1c85f80197958c2548f9968c9e72bad47681a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592d650eb65934a6e95109ae6645d20fa
SHA1ef5b56ed14b6bc7fb0ad73f95069f5d89415cc37
SHA25662f144113083543be3c1f99f1c3c5e335b27206df18804b3ad5cff98bac07479
SHA512a8fe46ad65a9c7f9fd81e75491a6864e8619c717a92e4f72d3231485fd7c2c0973f2622b93707416fdd2caff5a4559d441ca9bd24c483fa8da627720fa803833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553018ef5b6591ba044f570c4333f0bb2
SHA1f6d067892d93c467e065ae8248a8b7edb9120186
SHA256a1927ae122947db7b710fc587946aeeec1a267699e6dfbdc66cce9dc6c8f10bf
SHA5124fb52caaf2c5e5a2bcd09763aaedc716db64112872e16fb4acce5924fdb73ce25d71e75cad00d30c1f0ec35b59dd1e963213d4a858395927fb9c5f7ebd800f5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3b68425c29d5db5777ea4459a7f822a
SHA14d1fb973861a8dc9392d0bdbade0754f5308660d
SHA2564e204fd9d6dfc018df96db6e0153e4777fea3690caa64775c5290c11fa0216bf
SHA5121d588d51b045ffdbd7e92738a2ef3c77b38e2d03380c14dce90e04068052bf80026a97edd59aaca87b9f8ca47132a9735a066b1224bb40a0902e136726073684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eb831c8bb361ab796b25e948b69754c
SHA1503a87e36fbc7769a7f38bb9388f134bc9f6e175
SHA256324efae29c9f63ca68c49a249b510f4507a5fbaebb1df932ba62b5ae849fc3c8
SHA512e19f1a0de8b00bdfca9638791d88849f766d42bf88e228bdb8bfb1d4e5f7e41f983b3fd25a3e4969125c4814f765e2ba09ac3977b3aef1e4eaa3ddbb5080ea37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569cb0765761f3864a1ee8cb3fecb3cc8
SHA1ede2b42339cb4ff287fb5cef11070429e4447c29
SHA25669c1bbe10a5f0526ec753e3bd60dcd453963fa316c5ba8a26928b06e4e23440b
SHA51235c0ad9eca33f9480fa2a5cd567532272cecb793a0befe93998d71ffe906d1139f1a474bca31234c5760d9823c08dd7ba31f9f446238701e0c8d48acd7cd8b2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581d368ae6fa97051d0145c7558521964
SHA10b8916e5dd12fb60c677826457cf1d3cbec73e2a
SHA25673d1e820686920e04cbae2f88f5148954798cd207b4c08532dd21f12c636b149
SHA5127fb971a56aca889221e3e7dff8521c5e985a1412104615776a9d70e1687484396274a97665f0982a5eb1c499d1b0ed227d413f12ee9995702d99cd6d337d50f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5347c3c2a346cd2d7594cb7a0f796942e
SHA177b03004dcb9c7cbaf52c9daf9c187f93c4acd71
SHA256cbf9a76c3fac71bb840afdda6b8f5a7951682ea3e9b8cff6b4fc0c661c07e75d
SHA5129a36bf41fb27b5e5a15505ae5f1c5bd58cf2a94b2c7de7f237404e759e82be8eb0ba70de712d1f5c981938f4234ac358bcbd40ce1c9e215691f57b928f533579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a269ba5fc51e29492da17e28f258726a
SHA17b283c051c5c3bd61a7336a071213611e0a48903
SHA256c65db0f94750d7bb4195a753b37ab8710ef491617ac0993c611232bd31461bd5
SHA5128dd4c65d4d0c6d1217d887877881fb638ca1cdb924e30342931cb4f524ef253b36728ad75110d27d9ce4150ec6fb84b26c3654f8a4094625ee0051306c6df038
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WNZH54VQ\script[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b