Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28/08/2024, 22:36
Static task
static1
Behavioral task
behavioral1
Sample
c7c5c397739633487dcf1ddb9f12b37a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c7c5c397739633487dcf1ddb9f12b37a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c7c5c397739633487dcf1ddb9f12b37a_JaffaCakes118.html
-
Size
52KB
-
MD5
c7c5c397739633487dcf1ddb9f12b37a
-
SHA1
2379a617bb7b0b25d591a5fc0a3a27b64bf90491
-
SHA256
00c458d695871ef05dc46b9fb9b8bd91366eb67babd1446c58ce7808504e3961
-
SHA512
b19887c8a9374784033b990ec39853264a3c713f394671d43e729924389b8d08069bd2b34e38467ca193d504f4822c8c5b33f546aa4ca9afb3fa8a3f0b907f32
-
SSDEEP
768:MQ7D3wyYAMtxG21WscPRR7i11HCRayN8HX:P7D3wyYAMtxG21WscPvu1NCRMX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80ebbec39af9da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000ac80d99a7e69bb5d83c7d7da482078de040b550d71f869ab9c36ad815aad444b000000000e8000000002000020000000095aeb03dcd05fe63d18d1c908f4246dfd8ab9fe63d3c4e57e53276c26dd1b8790000000abfd01c8407afd32abb2e4c73f3503607cf42e8846ede5d5d10e726d2ef20c4b37c21542358c9fdcec35840050020acdfc3a5a0c3de35b8bf2dba245ebc9a2302e0b4c3ce64d1c923eb1155c78e6a23e4d20f24e9f68fec2f8f605ad2568871eb6d3a69aec4b1efcc5d9b737191426960f768109386b7c2799aefab394497fd47ace894e666b8137c813d9a818cac22340000000d769e3312137dd0cd98de86f693873658a994b393635edbac72c43a3d293e79c7a07ef4a699704f33a36da0662984380c63442741d5f920aa7f0c1afe3e3481a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ED9BC6D1-658D-11EF-8EE0-F67F0CB12BFA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431046441" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000c9e6e0cf906ef7cbafaa3594b602ea2a6e3063a0b7a1ae575bab842b6c8adb8e000000000e8000000002000020000000397b714c079b70fe1a07635c0ada120d56b5f97e215fb6413f4c85cfa85400da20000000d16cfba3b1f4385d69e27e4e70e3c80ead1c4074eabaa9b8c8024e17b38e81c040000000d775f5f78d265974c5e93d02f1a8334dc300018be48aed907c0fbe5a3b5483798af5827e34d26f92834127f5590a85d28a60f88523f2f228a11f9d9ade07a1e1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2548 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2548 iexplore.exe 2548 iexplore.exe 1100 IEXPLORE.EXE 1100 IEXPLORE.EXE 1100 IEXPLORE.EXE 1100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2548 wrote to memory of 1100 2548 iexplore.exe 30 PID 2548 wrote to memory of 1100 2548 iexplore.exe 30 PID 2548 wrote to memory of 1100 2548 iexplore.exe 30 PID 2548 wrote to memory of 1100 2548 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c7c5c397739633487dcf1ddb9f12b37a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bd4e10150c6aeda7b583a63617fc1e3
SHA1b1b2dc99a6896f9de2c64308c2baf695b6263408
SHA2562859347682c7e8c61b06d0e19bf82567e4d180eef4d568e74db9a430219aa176
SHA512b198f5212259f1a54e5fad05d6db6e342a1216cc44a2c004206de5e139803117c90656498deb1282a4c650ed1f7ce1d22875b9566af30f45ee899f9eafa742fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5970f2637aa8943ac1590a0487f718dc3
SHA15324e234da09375fb44d662946a835c01803de57
SHA256e999e7dd6447517a6eaf8262bb7a7261ec26fb72b607752803aa3953c24beca8
SHA512ef0a8c03c389805ae604f80ba90f74b5ab9675a7c19b987f4089cbf11a0bd34c9fd2880b3dec846d0aca41ef19ff7b7023c42a6ceaa7c13dc6ef44dde5d2be70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5910bc182302d5af5be73d58f30297a50
SHA13e0269f8e10558ed28018c3f383c1f6c94403b7e
SHA256afb4651d4be3716f7a06686794eb415d8e8d6c652ad31decccc5cad8daf8844a
SHA5124abdd6eb9c286117ed2c7f5e3ccef8fe50627873b3b6ba187fde2f0b2ed06a23d04f9bd8d2f65dc0a7c7e23e84aca38819182410cedf067e33cdeb5bd1fabadd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540ecd44ddedddd232c451c958b775936
SHA10f0c73c5a81906b355886980a026e8cbabd3f0d2
SHA2565c9374294691b79f15ed880d2beb0c2e889e8f9968d633585d8ed1aeb218a0c1
SHA5126268377d5c5a1029066a65d31c1e7633d920af85104120211640dd714103e60179860f4830790a0e694a683a216adf229892a7ce84cf30ac78683b6c5181f231
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8a2b625484a612593584f5bdfb5d0e2
SHA175cfda62d97eefeb219ade9d754fd7250f3a90ed
SHA2565ba47a05b6c9c5b1fd201c31e5075b4f5bb90f51a262e01f26d7567b6111a132
SHA5123c2aacc0a148d2a715f1a3965d467da1f6de37d81300451e9d90772c52fa3f4949c2fe0d30cd98d69a2de16fc3ccb6adbb86c6fe9503a7fc89aa458ce85e1229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fb61ae40d0166a1dde22a4cf831efd8
SHA13f3fa2752bb1144221edbe7933183d92b6bf0e46
SHA25604662546e5e0397b052e976f0717865131933676ce4e4e6e2a30f47ca5756f32
SHA5129af8fe9d1106889bb1a877f4536de1b7eff3cec694069533be270fc5be6fc2af56e0dfc16a12c72f48780246afd629b8f7d26368f044cd3ae21ae5d19adcce43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5567a2218f0d1ad22571e11e1dc881c53
SHA14d722dea7d07ef6511168e34e2950cd7e69e8e50
SHA256a3ef10414d660eff40fa8dd10fd132a4610b06075323749760cc26a7e3b2ae1b
SHA512185d7f0271267e3fcfb88d4de09f2f50a70c5c50eca47e9241181db550b914af57851b9a68ac3787c4c983f2c716552f106c1714d219d25b9cf4ed1939a412ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c4dddac6e0a946805c642d3b241f610
SHA18925fd2f2c4cda10fd29d3ed958f8630c34094d4
SHA25678e433cab2c7a189b3cbb8e494aef79a49a10de782237bb4214fff68acdaafaf
SHA512d3bb9b0d3cc536d0109a198472c3e12a2296c66837c24136c3c0d8d3beeb209c5370d7a8c85e848067bb2ead45517414cb79e1b86b5478031e83dc0b3b49607c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f390dd69b95cb85d0533bc0ff2de1df6
SHA16e328b8ce1c025acdf119272e5dc0cd6f3f9a223
SHA256170fcf520d2807c8fa3735214ff96d94e02dfb729780810bdbff36818705c6ff
SHA5126b5d0b3d8877d78f42959cef08be15407cbe9eec37f388d6b0226d53f1090ce0adf2f7df49ac209e9ae00dfbb9df5d2326595285028d519eb43abefc6e6e8bb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a97b5237d2353aa7a2d0cc8acede6d8c
SHA10c9117b813bc99de9791704081413e256c7e7ed0
SHA256f310a36f9761d9b5c1defda57731d9653c435b6a044b33a53aea539e89c97aca
SHA512e214f100971f3250b7ab48a66a4ad043de392fc77dc279275b37426f1ed0a119abe453bdd84ae970ca13ebb26f6f5aca86326fd81f16570f0ea50c6b9debcd57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53226bef2a073edd63b2052aa09388608
SHA16f996c236eaeffdf0d4f8a2e7f6ced27e00ca88f
SHA256deaadf42374ae1f9505fda22e854f8ca0729a86dae2b266913859148a7f531f3
SHA5127f7bf8179687f785eb4dbcbe484cf052f53c4b2a43ddebb6ebe50be613d62fe78f86e589b2c9a00906d99e2beeb6c5832bf1c51d0145c9ad758cc6c9a5e13abd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bb42394a7d9c6fe6563d9581e7d3146
SHA176819d0684f35b40ce151b6bf7f4623419ef0835
SHA25605856d719a9502ca325a053757168b2d4f45d23f4ee57199d5203a132c8b70c7
SHA51245dfc077b5a90f4ccca4439b542b20cb450f9458aea4a483408d0134d557e91064a6b4663b0388a365661898b5fab1220ead5b8fe46a67da3225858ad50a3123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58525981a04d9534ea01e0ee6c3c1bd82
SHA1411a4f197714a3eaab2dc6a74a9da5e973d2b415
SHA2560c611f9fc362829ebe358a1c98257acef75c8e9373a8b302c4811fbd1071939b
SHA512355531d2056370571982c9d865f619f5cc92887267d4c112bd56836c0727d8130b460ccb482e2462e5097013d0fba5ad2873a93bfad9820e07ae8a7de48c3862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae782196c20fad0a65f5471943865462
SHA12280994ef0d362e4d50f3f978ee853269c54bc89
SHA256932e529a6130cbecb4cd90b1cfba1c311a85ac25d470c0a71c744121e9c38017
SHA51237bbf5a5c37f25fa3cc9a35aad6d90b328f6bc2266a5bb5b0be1b1b866367d694e3fac1df891b5afb60ad50cafb0434afb09438fec71b4c47b0dd38187b71c07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5659415eb3469b0169d66e250cd5b6cd7
SHA124f72a235f424b7600cc07cb37621165490b407e
SHA25673677df088c10040411be1d9da24b1e3da2a814cae739896815ce3ccc2e61761
SHA512bdd9130c1906a8d749325a8ef9c24d0bb71af79df26f2f04d12d348819fbac6603abee25ef025ed48da1cf532c072cd9bf7da9ad835ba2407ffdbd683c29b1c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a9cfacebc3b71668f58df2fc6cd72e1
SHA1dd968cdd1414a8853703ba2da48fe5995851b854
SHA2561dd638c9360cf5df603560564498f4c79a9cede156d4c01e2b572a920277ed2b
SHA512c917bb7fb3fc3fd442699a2c46115fa9d3d13f3fcff9d91cf6a130fed6924b56699ea0a6d72be3d9af3426c9afa21789265fc41bebbe3493ca12ed1652438665
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520a064c1ba3cc3c632450cccf7ce8df8
SHA135d315d83b95062b84831494a31151f83f0a5871
SHA256351a470d7e27a0e724b21c223211cb4e01e3917639caa30ab0f23ec8469d6c92
SHA512160f8a66297acf27ecbab371d880263f21bd8bb6a9afacff1c11057b5783796ccfd4e662053d940b34e40969e8e32da43ead40bf992732aa749a8927f55c0570
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7da47c0af28da98ece452e739cd16e0
SHA1e2b447d357173485c078792b915ef7ac6445e025
SHA256f8a04f74cad2fdf753d538d38abb70c32cf7b6b52b63af54e6a550351dade0b2
SHA512bcbb5550a98b70663bdb01f181b0766f3080056e7ff4582ffb99a3d50bfb46000fcb25a5cce4dabd0e5e1232acf418af1b548355dbb329d2eafe120fa96577ed
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b