Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28-08-2024 23:14
Static task
static1
Behavioral task
behavioral1
Sample
c7d2dce0044cc7dab219f3504eea733f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c7d2dce0044cc7dab219f3504eea733f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c7d2dce0044cc7dab219f3504eea733f_JaffaCakes118.html
-
Size
23KB
-
MD5
c7d2dce0044cc7dab219f3504eea733f
-
SHA1
ea28f44d5c994a84157d14cccf69b40686130122
-
SHA256
2b4192ef256d39f8405df5a43554fe725898e6655bd9938aed104772e6b52d7e
-
SHA512
b293afc40c8eabf0ff66fab84eb41c90a1f634e95f0f7474e54f8d7b6440846c3b4f578e994da7c7da4eb8ce10ad1df3df13c3c1d8c3e98dd915521acf83c410
-
SSDEEP
384:e1CCu/Wli1oE/i4fKyyLk8kpZsQIFVn/u4zzu4GO:15/WI+E/imKyyLTkpZsQIFF/u4zzu4GO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431048772" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e035622fa0f9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{53D5B0F1-6593-11EF-9BC7-EEF6AC92610E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000b0fbc6a0672aebf6bc9fa22611d5c6247c15f7d2e86507456f761a15b93f3a53000000000e800000000200002000000019d4b5b91b1db5b7bfae61f4674cfbe9e418867d9f6249930039855da973174420000000b84930608af01d5f88ab1236f0d6ecf68b2a94bbf92cbf564b9c5b4a5e0e385f400000007fc75bed633046180e0220fec097f841c0261cc343dd4d5a73697e192ad0e082294af4113d2030213b5f554b4a83c9c9bcc45977edf5c120927f16fc75b80014 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2076 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2076 iexplore.exe 2076 iexplore.exe 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2132 2076 iexplore.exe 30 PID 2076 wrote to memory of 2132 2076 iexplore.exe 30 PID 2076 wrote to memory of 2132 2076 iexplore.exe 30 PID 2076 wrote to memory of 2132 2076 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c7d2dce0044cc7dab219f3504eea733f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5d7b288659c26a4decd3381b07c6e2767
SHA140a0828fef5030c1e3ebe42e7d1c8c7036c8d69e
SHA2560833861971c2181f1e4cc35e68ad338da12efdff890f183bbcfe9d14f3cdecf2
SHA5128371d2f4948be92edae40f2ff8ebba421d8d97e9a0d52e5c73ace2190956550c2918938d22ec4ad8a52cf9936784a28e0f5bc7d8ceb9dbe1e952552c81e9042a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ea2183c68fc85c71b77a97c29ef4500
SHA14d02a367d5f8d8e9f33a0a3044eda93ec0323414
SHA25609387d3273824a068b984365e1d120c1c969c678004daaa3be5dcc2c922838d4
SHA5123592d9c914c0591b32ff49ea1f5b643cdc903dca211e5a5d4aaf6faed2f16e138ac6cf71e6972e3f0a2c303a90b9e797fa79f3ef217d4437935cb8651aaa602c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505e6c9a454c227bd0857e22f868528dc
SHA1bfe01ed6d038ed20369b440bdcc38b5e87dd86a7
SHA2560d14a2c0878b7a2ef42220345acd8fa5d495d0135913e2f5d6365eb1c35fc7e2
SHA512f8b5ea25ae0e83f37876ae373573c3c2452d65cdee5168b9c7909519ab89bbd0e290553c385d36fc1a691e1cf5c0c234d49133f801d3f8969282cefc622b6b36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ded80db743db5d57321db266fbd52285
SHA12e8f623339bd3370bd6cd27e6111fdde86f86f41
SHA25656a08b3f1f980eb9356fb9ffaa066b7040f08c1d3406922b009d0ebc14aac05a
SHA512e16bb4c043066a06194837352aabbfa84eabf32826d5ae8ef47f8ff4d8eaf3155c40e8961a47f77bee73272f46af87d1c917fe75144090a9bde2e7c2421596e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53af513ac38b320958069e5190a66a601
SHA1b880a1c3a2efa7762b221433e20a37690c05cf78
SHA256a00488d4cb4bc6beef64701d8dc1869cf787eb6135bca4c109f6a017a9e68f00
SHA512cce7ac2a8597351b42b313e12484b6e65c4a288329d86cb28255eb91fac66aa15f37efcc4b356b0ea6a28c3fcf1776ef09173d138cce291bf15294b3e81b4a4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599887986dd4a77b203beedb6d6f35a55
SHA1244a9148b1b827e9e8c30bdd12064c44be916df2
SHA2560c6345b5fc7267e12f105e9c7911f95c15645f82f883649146cdf44c2dd3c677
SHA512299f420812259e5f62c45c571ce582e5aa4d61293d8702a42eef39d3092c51bcf53084f1c023bc5b9c0c16cfd546d062f6971e25ff0017db7db1811be5eec2a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff44bca03f42d3efc73ef17239ed6203
SHA1fecfab0d3d460aae6843ab6082346c0cd5b7e630
SHA256a5e0cb07a7615d54722307f83ae8345fade49ceeb6e24df71bb83140953bcf6e
SHA51241f04eb41429a7974b509564d0b804be9099575c0556de33612ede41d07d4702dd92bf9867ba9491405628f148cacf52fc7a1b61f107e53e4003ecda63d43e89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9cf0cc5438d2c35edf973f991917249
SHA19edeef1d44e69ddf72a7bd5b35f1f995d2f50cfc
SHA256d41b31422f3289062c5a23378d435c7ccf662436620bc9a6b5c4686fc06aa40a
SHA512ee8f80a81c0a5c82c5853293768f602c47a7ec6d59831825cfd7045afac71518710c8601286642099dffa6ead8c7763450b2287aaa131050c9b8f9a5a15c86e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD538fcdba252433e87db72df96f20ebe2c
SHA1ae1918a760f1e67fbeaecf578ede1d4539c85a02
SHA256271e899dfeeaa99bdc2362c7e4d5fe0aded7d7906c892892d5894c53ae0c7034
SHA51266790cccfc6ef077b2b6e28dc49b46b9ad7cc12b4ae9a950dc896e4f91dc852dc3dabffbf1f8f07198ecd8a2c9138149e656e6866cdc81c1ff9aefa4a6c01032
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b