Analysis
-
max time kernel
138s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28/08/2024, 23:07
Static task
static1
Behavioral task
behavioral1
Sample
c7cff17c8d99e64b0163e51cdf18b78d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c7cff17c8d99e64b0163e51cdf18b78d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c7cff17c8d99e64b0163e51cdf18b78d_JaffaCakes118.html
-
Size
140KB
-
MD5
c7cff17c8d99e64b0163e51cdf18b78d
-
SHA1
57ccc04dad262b131391365fcab75c6ed5898f26
-
SHA256
bccd9ff7253d4efedcc4f0a6fcd72a5f94a2672665f1a941e672a043e2c1be8e
-
SHA512
9ed59ccd06d65565d60a893836f7bf1f5310706098bf14f013233a04fa555ba70683a0bf0cf2498cedeb31de42fd9ec3afdf2f343a45dc76cb962d2daa3e07a1
-
SSDEEP
1536:SrrMn6NFlhOQ7eyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:SrkI3eyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000ab9b38325444fb0f9235f772e7d7100e7bc468087e924a98eb3ace4315fbd3c2000000000e800000000200002000000005b962235cabe102c145c5c9d370524927dd3fb529c13d0aaeac744f8d3e2d882000000094bf8dfc6f26f04bceb7e8ba41328cfd4dcf996daccb220b225798ada2075291400000002916fdf06acdd2679b3f91311d7662e44fc3d6629559ce6e108c461ed7da761ee4431c1b6e73868cbe2668d2da5634cb9da958e4c74011d6ae8210d2347206c0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0fcd6559ff9da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431048298" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{410EFA91-6592-11EF-838C-C20DC8CB8E9E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2536 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2536 iexplore.exe 2536 iexplore.exe 2008 IEXPLORE.EXE 2008 IEXPLORE.EXE 2008 IEXPLORE.EXE 2008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2008 2536 iexplore.exe 30 PID 2536 wrote to memory of 2008 2536 iexplore.exe 30 PID 2536 wrote to memory of 2008 2536 iexplore.exe 30 PID 2536 wrote to memory of 2008 2536 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c7cff17c8d99e64b0163e51cdf18b78d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2536 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5485ca2a44eb026110d63f30977769efe
SHA13faa974994305e60cd7daa83d3b70cf032660cd4
SHA256ea136b768acd48ead26bb5afc1f4bb432df2e761cb8d30d0f77ee377ff1b6759
SHA5120e17b3dc273a020256549ed9f5d112e706fce750c78e97632935e3b58c87893f3b460b8681c206bd1651b912aa3a31243d1be429768f26bcb37dcf27880732ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c2174bcbec3d42e7df241223b623514
SHA13d868eb4ea22703ed61a58d0e35d392871fd44c0
SHA2566d2ccd3b99e570bc32505e459607df17068d302bc1e759f299f2f9126acad792
SHA51225c36bbdd136d3469919848bb0465a3b1bfa6dbe7e62bea835d859af434e7af7837772c97a1efce0073756d80dc58b8a42a1593e558f63270fdac38858e09701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f601e0ccfa4b9b6dcb93f0e4d178134
SHA1573a5b126e6d66859360c1dfcfccefea1558ef3c
SHA25699c393815c4f5ab50494487c037a3d3712a491750032888e0906d3e5634443dd
SHA512db6bbb05ae10e1d0f4993cc51635e8c1a0c97d40ecf503178919a9d636ae1c91a9ae3f8979c712550a381b3c675f5d07153a84f93d175ee93882c5bc2adf44e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531997d690818af49d997471728cdb095
SHA1146379eb513ae5b829e6bdd5721e446e5f3d4828
SHA2564063543d72540573d2c263fa3597c4a69f159d35ea63aa4842cde00ca01a9066
SHA512fa8994cd5a2169447e7ed4a7495632bef3fbebca0fdd84033199952e7890078a7d419d3e22ca6c224c496fef0c7b755c4d58524a8b702bce23bc318d6c520321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e368771aaf6711487277e827a8a3b5b
SHA1af4565cdfcb49a4ca9057ad03182fea34ce5484b
SHA2562175fd91362648c8b8e87fb5d575005ce9160b446f8bf775b49e76c62272b756
SHA512611077609a4097674fd2cfa1975438cba4b66219d78f770d6b599380057c6a5925d5fb4c5bd749b0c9bac19bd5988513916c0c7fe4c3e62c76c72e1615bcdcba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a938a4d97ec2812d62cdb3950814c629
SHA15961ef81f5ad8f84deebce3109c7f4118d957ad9
SHA256b8b840214ebb4b30f3c2966ce4c46c3ede48854bbc9a157694edef01518575a5
SHA512d92a2787779e5c2b3063134ce6f24cae5cafdc69c476ec71ea454aa12009ee9b90b7fe97dd4e7ce52f502f6cc8233fb9026febe083d16391ce2fa0723281f092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7bea1f7d0d21f1fec0dc7683fbba3ae
SHA1bccf0c796caea960620f7b54c2f19fa2ef36816a
SHA2565d5db0f01ef9f080d5d847e6678ae117acdc7b3f4e5598d3da28a49219d5c73e
SHA512ad7496b6feab9b0912370fbdc122656b47cef90bad1761ee6be279140d119b63fb6d0455dfb30ae31945985b4865c6272a062d305c1de3d44b456fa867f740bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f15f37ef0288c679b6578fe00dec6db
SHA1a68ab1974bedc0194393006d95b0839867b7a220
SHA256e5ceb37fbde8bf45edca0e7e337a604abf9be2d5b33741f515d98827a7307a7b
SHA51219e18296ab1ca529de4714bcde4d89e8ba245043f42b325c4c980847e7ec885e29d658ed6950055e19f1bed980eea314b2cc95481d9788b965ffda22187d4d62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54edc25294124d4f2611cde41fca04371
SHA1e8913d26e05286db1a1c803fffb4cb78229a0d73
SHA2569104d8d6d1eb0e94ca1254ac5e6fbd7fdc6c53f606393e04a0085dd6a0f7d220
SHA51232f09b93cb4f7e65b7bd9f310dd84bc13d063ccbfe4e7b765fc55678b1aa9c2f93ef0f17c494eb51e0ae4945976b9fb573a5d4e47ce2351fdfad69d9eafe4c73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecb1976d54b6c1abcdfce5b2c05681e2
SHA1b4102fb19a159576fe36d64ee1d3756cbd5b331d
SHA2561430cf1b2f951ae8ee58c689ebfaa93ef4e8e3337b4aba981a70338a7f93cc90
SHA512ef5c0726bce39f292f3d69d268c45e626d2e8bbe4cddb474b28ef863455ca43c5779357d4ca3da62b62df1418c50de05ed3b145f2bdcce8c9449b6560acfed97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b65a1157144d5d54f7f58caae0fef52
SHA1448a7f08cb3832f2777dfba3d885178eacfbeb30
SHA256bde1d84c59ca4ebec7b670e39e596f7ee656152f8cdffcc5643e79c34c878f76
SHA51214e360470fda3df11321d2548709dd9a82edf71dc228f5848f53367e9fd216fbcbde8302970609fcfc1bdf5b8a5be019cfe89466979a39c2c197a4ca5883b608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c57e06c0d195fd4edbc859a2b55e501
SHA1cbf6182d4d55a65fb936204eac66ef411942ee52
SHA25621b09425398e122523ad4044f4bca09db18d870c161ae5a69ca19bce9cee34a4
SHA512b8deb7af88a16715d19016b8120f5dd9b0a8bbdf9c30fa08b5f6aaee00d1fb58d2bc92f48e60988e2d132813e0a846547bfe513dcc8cea31e26c076a6b02c071
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2d70ca8a4cd63160716fa027e2d0589
SHA1b6028028bf5828703abb460c6779e2e3ced6f0e3
SHA256ecd283194206421becc4a0083b9589089a23e76e8949f9c578f401d75e554537
SHA512987fd596dad753cc4a513192320a6571bcb6070eb825a39687c148c8d66980afe8a3a9f8a98c7df919b2f4e12e750a91a88b0781f3572071ee93f2c44f6dcc8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567ffca5cbe7203dc054c48f2b484bad5
SHA133b7261e7037dae76725256976c4d74d28af470d
SHA256fb8557c7eaf42c4e1011b1baf3468340acb4e33c69343805c976bbb808c49bc5
SHA5129cb3126caa0db1216611cbf7773439d69f14651c438be9b743e7e4b8ef4f87868cdf8e84afb9e6b6cc5da2a0fc24dae27e3c68121875397d284426a7724ea20e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d22c80e7de6fa8ea0c98bcda4d8b168
SHA15e6d5318b3f11ad44731251bfe2fda2c9ad9cb8f
SHA256097c91661dcf4efca93e7f6940ce55bf6b712ded9975966a252821159e1749a5
SHA51226f882e6b70f016a33d154eae2080d14e74a60e9d9b044c0257b15532d105b90ab109507816a7958390cfcc3b2337044b1763acadc0e75f66619ac0823e2b4f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551a9c5c3f8abbc6544ef485eb003082a
SHA1b28f8a6ca2f5396ad93cfa0f32461b33a413f76d
SHA256ae24629e9cb4f2bbffe3cc778b70ec481e85c17750f21cb1416c0af44aa99c61
SHA51249165177455ef08d4c90db86e2ea904326a088d40f4e1c2fbdfe79f6a4acba3c32f8028910e15cce23365cdf790ab701c0b30d935d0f6d3d619f05df2a0a8b0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fc4d5aea296bafe125ac6617429cbb9
SHA15e3cf816868119d34ffa13d08f66ad5f35347377
SHA25619b46883062b5944b94b2227e54ff630349c503f8b30b3f0daf98b78b4f3fdf7
SHA512331a010d062a42b217d4847acfd6ed5b88e99661b981b094b16b4d9b37769db177dabbcdfa69e55fd4d115420973d316331752d9149dd5bf15fa603c0adbb576
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b