Analysis
-
max time kernel
136s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28/08/2024, 22:29
Static task
static1
Behavioral task
behavioral1
Sample
c7c35749765359ad40a144638bca002e_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c7c35749765359ad40a144638bca002e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c7c35749765359ad40a144638bca002e_JaffaCakes118.html
-
Size
9KB
-
MD5
c7c35749765359ad40a144638bca002e
-
SHA1
9ba68bc4e02adc6167b2fed29d64143610351b31
-
SHA256
fe615286c879cd8b0dcae854c3b079014d3eb9c92c361f16b62d994a785688ca
-
SHA512
5603e650a56f8af664a6024937cc300d14f2904acf5a850c0296b4ca08c6c8ed281c0a886c288d9e67d9a9081a7980323146b8cddb6d5ed52de59066f2e50f39
-
SSDEEP
96:uzVs+ux71g0LLY1k9o84d12ef7CSTU/GT/kUNpzFlVHcEZ7ru7f:csz71g0AYS/+qzFPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431046061" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d01c71e199f9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000667aec256930db3d03fe125970eb32a471460c4aa758c11659611698f72b73e9000000000e8000000002000020000000c902c0495d475963bb77177efccd218c82b0e4096e24145b84de06726c125be220000000d9b5794bddea0782cfcc0d6e3d8c790a5519aee6dcf1bcf18afae9fbb6a9d2f640000000b5794edfa9716210e3955c4294e9596db6d316763cec2071c57484877a8233c3d5f76fb4a7b9ffe0b140270aefafff08fec149d70d1e9636acd85b06cee8ac31 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0A4D1A51-658D-11EF-AEC5-4605CC5911A3} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2416 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2416 iexplore.exe 2416 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 3060 2416 iexplore.exe 31 PID 2416 wrote to memory of 3060 2416 iexplore.exe 31 PID 2416 wrote to memory of 3060 2416 iexplore.exe 31 PID 2416 wrote to memory of 3060 2416 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c7c35749765359ad40a144638bca002e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdad06eb8da15c96afe60d637cd74e84
SHA1dabb56ab12eeb030da7fff1695f55564d1e73c07
SHA2565829c0afe813c6c59663c3e8367c93ad5e3e6c4fa70acd1091ac82f4eda75fbd
SHA512ff7d0e725fdafd45ebd94dad71db3d7c3ead321f73f60aad8a3ecd945c89ccd1940cfee197efa16aeae6a518e4fabc6c38bca3dc1d89a75fa4e3dcd396cef19e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506333d1e8f8701fb3f8c7a414ce4a358
SHA145ca1654c201953cb05335d137dbfbee09ea7379
SHA256199d389d518d9c4db6afd7764e34b5a6857010bfe9f7366aa18920a0b03eca3a
SHA512c74c43f82c3be1bfa9d74678f022bce1c266dafecf8dab07b100a0b052e834bf2e442c525bf3cf10a638bff69f3184bf52d85c36af5de2eabad21cdf22459a04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a77c9fcf648ef95197a2b994af78820c
SHA1351c5816d89f5691ae67a6dde6f76134e7d7ff95
SHA2562df041009caab14a0e4bed55f56054504600edb6c8b248317af0380524db68fd
SHA512efb215fd2abda6791ddc6407775135393c1759363ce267dd210bb6c8449455a6c5c74466e2c8b5495b860429d4edc7e90d9624d9a731cd15784d0c9c96d0ec7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d8712728a7ba56e6ac9b3e2392de47d
SHA1344b9fa42375f983f01b6a4af5cf46311d7e8762
SHA25618dc7636287ddbb7294294aea4400d402b30a574c538945eaf6ab1a251737a49
SHA512b521f9b5370cac480a302f21d4b817320dfca6ad7442aa0e8ee5ac5640c899fcc8f292c509dddb9221a01a2a473d86e64ba22d00aa91d169cb20dcae4caf6ac9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5412b83c7dda4fe837d8dd0da89a00d66
SHA17f2003fe67fb07fc55a1f901f210492edeb342f6
SHA25603f6a455e342c6f5f402a7204685b241a65ae13859ead937b3ba17d89ce5af98
SHA5120776a8a68db4203203da0d9e40ba5dcb5ee0825cf7ab06f641b388b530d7f0afa71bda58fe0a67bdfc4b26a572eeceda447b7076e8389faebeedb161cd72e5e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b1b835be005c09fcdfd0516b0817c66
SHA16a83cc87b492a699bdf08db3263d1f3d73dd3fb3
SHA2561924db95d9d2f07a98ae4dc8f25e4049e5bd03239ab682c06c69ab0df99ab7ca
SHA512ce0d11bd4781236d33d6272d06779a52e770de015a1da4549e48bbc21d576b8d11f7e8b93ce8fa08fe5a7555be2e09d54cd643875ccd13b5a772d931efc8c228
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5463cc94053b12ea3b6ba135123bb0b5d
SHA1ceddad1c1945f0f24810dc807f109ab188a42c41
SHA256245a6bb6396f064ecf6ac023367f9d574da77988540f0c415d76fbd0e7583ec3
SHA5120d4c5d4c46844ffe1c12c10f06c29efc932e7aed566cd4cb87f955c6729865dc43e5a2d5c80ed9ec16c5bec73c8995ec8e44ce764ed9082a3331b90de63491d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bac792cf8a7f7653b28893a87877b81
SHA14efb4a8503d4e846361c7e227de0b068c2df7020
SHA256fb9108a3d3165da2de86cc6c601122c8b314a46cf59d0b1e738f54d425e7cacc
SHA5120b119f51a70e997ccedf744502474e2505f5d9e451e94e136fdda056ed515f19f9acb799834033ce47dcca1d978374c5c4758280807459600ba5789c8f0bd66b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54451c2382c5932c59bbd14a238cc61fc
SHA102b643a727c761c832cb5b88b8a757ab6cd28248
SHA2562fccedc1b4bfa85ef28573158888fe0e86823d89c5303903babc49c502f9845a
SHA51212473081f7581b2fddcb7deb76c74c8fa2564f5bce4f1e5dba0e10f4824f25efe14d9b0e810d89d81415d9ec231e9d25bc5887edf3859f7cfa96f3dacffb7740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59204ddb4e9ac87adec46f1ac312cf248
SHA1894cc66f2761f275ed4ae0cf955d356cf3228ccb
SHA256fa51775fc77e99e4ba5751379daf92f52f08e8df876b03ee8414d1802ca03dcd
SHA51240ec31575b69e0cfabade6daa9d3ff62b1ae104ed48081ce77ceb9346d78a4e8e8e79e44dec590ec226229bc67f6f4f725e8c336fdcc67cc98d678ab8d98a88d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fc694c1de79b3a4c2bc4e6a0961e034
SHA14d66352bc70ca4834d3525581f4db911b7fac42b
SHA2568c9153fbfc162173b5afb8a200d213edfc2f05db3b5ef5062066131b9b861922
SHA5129167560b0c1c08990b70357007bda71c7c81d3390749c7d1a350c128ac57981f5f22810b2af7f3a91999a2e3ca819e27b06ac6e2c52c82847a1fa07c298b5031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506c764b3bc5e6991b835595a6040a5fa
SHA1c1a27a6f06d625509970ed1ff3432e83a2d37f58
SHA2560c6cf899e53c1b807a5dc1ed67992ccd55aef2ec83b4388b7949c900627aa4d3
SHA51251106e244d681ed2127a04cda0d4fa35fd9adb501d09fe1e980abe3cf079633d71eafa6ccb855c0034da1f1c782a5681716d8e2256d28a5ef36434eb379ae21a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a395c05cf4721083008ecfd61fa2023a
SHA15db73c3150ff27591e390e9721d2250ff63aa336
SHA256b003239501a6e97f0ee2df54b64360e798ac37ab488ec60ba4408307ec33ea09
SHA512a6ed36256ec6b8482d771c527aec3ed5afcc0b37a56a0d3937f3c6f4679273a8e11cc0c42f360629748bab088520d3562222b50acb4b93d3d5172d342442cd5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad0a790c463abdf5a2bf941a63fae9a3
SHA18751680b9fe10330c78d3741a8b873a38a2a7a40
SHA256081f844468122da4624c82646fd51cb58f4a61097d84093518f9d617a13596e6
SHA512b2f6ab8d566b8fd87b162756f97ea6d90bc57a6f740c6eb7540085dc79efa65b46b7fd53e43269d6f045c51047192951966381b916b03d0c96e3d18ecd01b19c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d231bee19e808d828a989cda292759e
SHA1e34b1ad5de7d7ad168d905629119d4737dd1fb7a
SHA256d10cc868256a4c3c126de65bc44028657e654b32cede33efe853a649fd70db42
SHA512e8f250eaebb5894c40bf10142b2598b1418b04c5059a43581539272423510dbedb0930124ad201710edd6dc652e9ddc697f5164b789d4b5ee35eb640522c9bc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52138970607282aa0c3961dd52027429f
SHA1d703d3a6c2a9c78b7ca5627040e8b5269d56e6cf
SHA256c91a467d49414c04e0d6d4e86ed13acc06786f948a50aae892a6ce9c4bc78863
SHA5129ed05f713dc899c360a8d63b2223262ead8b232afa70a2897be0fc868e6afdc20f72405db20d212049848c4a197bd61f17e3eb56518862735fdb172a907aa40c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d4b75e0ecff7b088856050e92bae9cf
SHA15cf713af22ee5474ae113c2ff08c003ace348e35
SHA2564c529c8b52d2950b3cd1635e78574512d9d89fd348ec23528c49db5d03634c61
SHA512aadfb9d994efe899d385cf4bce9275ecf5194193a44f273ed172190392ee4eb31e2470938c3ede884fe32675bd47bf6d89551c09603de7e94fb9e37ac8b23352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc0a62dbd512eb81a624fc1eb67fd109
SHA1d72afb43abe7a3fe1e1d9b70915d066c5eb8ea3d
SHA25632ec21dbf197c54b8b106b2cf6d9035342dc9affef0bba9a587486b5cd61c8b6
SHA512ee06bcdbe8605df7ae6646f5a0420cc6a8f6e9e7ee2d9d68aab6169c680d55276417808bc7687da400e918d04354edf10ba32b055449d2fe0ef13d4e2a79b030
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e2ef428d18a70328162ba6857934422
SHA124bd96c4ff59a10468a57691ad9932add0b1e5a3
SHA256adabc30f51177eb8681618e297347c2b2b2a58b3d58c564619a42882c64f1555
SHA512626c0d6f47d2ba2f97c18f8684a4f078decb0e1a44593314b9f38525de844781ce9b5cb7bf972bae5f2aed912d6c3533f317b2900c1048e99a89c8289293a904
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b