Analysis
-
max time kernel
132s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28/08/2024, 22:53
Static task
static1
Behavioral task
behavioral1
Sample
c7cb7bf0a88d3ee00737747bec59bfc8_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c7cb7bf0a88d3ee00737747bec59bfc8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c7cb7bf0a88d3ee00737747bec59bfc8_JaffaCakes118.html
-
Size
14KB
-
MD5
c7cb7bf0a88d3ee00737747bec59bfc8
-
SHA1
442262b9321bdc8a1776fe2bfe70b4d883a25958
-
SHA256
fd235591541e419de655bb1a0592eecc4f3d4d15cebc1c8a573aa9025ab8ea67
-
SHA512
de1cab2f03b8cdb3323b08fece40cc42662cc3e7290da5bfbe7b4351290dfcd4273905768b566a3201ad917b23a73a952430d17f3bd90d478c50aa33ec88920c
-
SSDEEP
384:liM0qbBit6rJL2CNRcBXgHGnPDyhwMDpahJDKTR8F:wKBit6rcCNgnPDyhjDpah4N8F
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431047466" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000007431c6287d66a7acde068144ba77af2e5db377a86de7ab43381eb3b958202da1000000000e80000000020000200000000efc539ea07d6ff589cd9ff549a7ff096a0ac3ccde88b4c9c661705d6c8333a32000000058aa7c474e8fb02cf1afd58311bfc4cb7c56683189c587e7c78be43ea9b4693a4000000018f78a2dbe654a9ccc5b4813ef106ca6a6fc24b0714a67039aa73bd99d234f9f95442b26477e349b7102b9a2789a8fe0a4c033d6aa70038ab51c58386c1905ff iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 500aad259df9da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{512BAEC1-6590-11EF-913A-D61F2295B977} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2824 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2824 iexplore.exe 2824 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2948 2824 iexplore.exe 30 PID 2824 wrote to memory of 2948 2824 iexplore.exe 30 PID 2824 wrote to memory of 2948 2824 iexplore.exe 30 PID 2824 wrote to memory of 2948 2824 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c7cb7bf0a88d3ee00737747bec59bfc8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2824 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5140056575683e56e662e5c49717147db
SHA17f7ec78b54d3597599d2c5cd2c07274d3032fa08
SHA2566a747a20d4b6d5e2f91a068f176e2ac0573f02e0435974143fc69b3f4c6f9b3b
SHA5128a4e5934a8e1a0a7632f819aaf0ac47bcb5a447d20fed771a37562d579a94ee8c16411bf3c5147531c5c335f498877b36e6934d370da7d760df7a029bc498502
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517758b3f99ca509d0d09001dd45f73c8
SHA1b6373ccf4a8d12ccd91116009dcc2ec0f038a116
SHA2563401be311a330332fb163a08159de703479b8a30ef26c0e86ae44eba8eebd202
SHA51288096a1f1546fdeb8657b204c76bbaf75b698b1f6e440e835d41421876ad1965544aeb7057a31928fd8e92f2a10e0941453caa8c41390233d255e46b4b1bf2c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590a9cc53a05bc52655e5b0cc448b978e
SHA1544e97aebce25029bc72cc0695c9e1df69a64583
SHA256a4151a6af39e56e0a168116bfd04a9b6de04efb5ba22efbe4ce312cbbd3f9333
SHA51258032a3541ab8b66107389ee65248dd45fcc27a2955374bf603a7c9db4507aa624f1e748338ded305c596d1f31f5ad754b46d5046010f5934e180f9d322244a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca9d956a7684b09745359b8962d9a223
SHA119bc5740b9674b158bc17ca71f261599ac4d471c
SHA2563cafca9e44f995b5fb3bfe6afe272f5abaf0b946cb8c5bc23eefd9774adb966c
SHA5124d7b0656d416648ee2f7a9e70dcc0d6697219f252a1f805f6b9941009fee205965f27956bf9cc05915bdeab5c2dc0472d689263fdddb8df3e5819e7202040fe9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5424763187597b90569a9378fb98c693c
SHA1118628e942d0cf11085fafd83b5ebc122f8b68a2
SHA2568b545156972e5d884e8a4669c2c9de7867e67464ecfa2b68e1ca130cdc537063
SHA512e0d3f844260d903a2a6f50c36b9a6ada04db4fd28968dcebf0f20df0cad1a9a65dcb10c67aa13b2cc82d5494fd54b51326e50e6311087c2b2373047dc34e7d18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b508d7873db1fa40f9ea4c74828bc3b0
SHA14fb94e4c07edb8cc7d35fbb76e7b017da818c6b4
SHA256c8f0d74318768cb0fbd245d31488d22d321e5abeb32464e20bc0dde970390346
SHA512bc7d7387e486becc633fe67f9cf80785d3ad3d62d9cdce08e301aa0ae42709c71146faab980f17dec8aec4aa6e9a7c9acdaa62f18726cc1b1c962331fd9e08ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b928d36dcdde76bd6682af110f6b264
SHA1b39c5b4939bc82a44b1f506de5b628a46abed5eb
SHA256597cb2298319c567126d9e66f13aba40846751dba539e7981fbba533fa592b5a
SHA5122804325ce4cacafcc3b91e640980474d6c197baff5c44b9c054a599807977cb0e05c4b39427f4b4feb8d3cc77cf046d793c192285a75f65e8d466f5aa0e143b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaf83c61f6704713f98f361364d4351c
SHA1c84954f99feda9fedc0da91ee18af116bae279ae
SHA256331e23b7b8a457a60148cf87d244551d0ca3fab0f46c64b35420b5e2e9c058ad
SHA512a7dc6eee8adeb22510154cf64247cfa7ef04d489422fd4dc4e146616767e157d3f9602d9b9d605095146e582485f657f947a36007fa2fb5fd3c84881a7812129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529c7dd6ca7fa8ad5675a769640da8790
SHA126b382438cb6632fb95b970900e8402aaf15860c
SHA2561678d52391ed763329df8940b43463902d98b3fe222f8de3c870b79bd3cb16bd
SHA512558e071188df5ff54aa543ee3e1113fe6699a5442534ab180071766fbf687bb82bc7689f2d5cce4e5018e55b6b49a6acfbde63c1b87ba12790730bfa0d989b13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0696c30396f6cd7d2086575cca6e000
SHA123ad8f853a0d9c3384389a9ee1dd035a6a3ec0ed
SHA256aee7e27aa18dacebc92bbd0d29f076593779e066a26d271c515da1d46a3af130
SHA512292c569c9a8599d8333882826d9d65f33972d80ef9f79d810883467c2210029011614515efba826919a4d1e0b7893be618d83c69a3eee74e14487b51f02838a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5251ff72649aa1e05864fff8093af7aa8
SHA1d00653d714c844bb2315cfb1360d469a22f8c2b6
SHA256e9a5905c83cbf8f0d8d19eb7a42c2c7971752f68d69ac11a0a02d6cb93117624
SHA5129a507b34c79f144bf58718dc2bf8349433d75035c1d825b2f838015f7744057c71876a7d0afcac38ef704f589a5fd932e04ffcd88a857ba368d3e869a5e61aa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52835d2e8c0e4124d110612a940e9feb7
SHA1b95f6467cf22f1854babb06864abd21767b1e891
SHA25628cb63594dddf5f50ff2950e7519919bbcc13380069a7cf03ca631d0cd3ffc74
SHA5129584da9e25262e6bcaca46d0bb510f5ed11e0d3972493593dcc81f8c92195bcc03028b5559f2f9190b167a5f8fdc522fe919ee050993668b6c5c1c7c79df12b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a52c2f5859fa127b330d7cb71e882f2
SHA11e524b009da2e5611c7e1e63290a36c8da2a6ba7
SHA25621965d1d2f3cd69bd9002276608af6008a5907ad59ecdcf804947d6afcbb1f04
SHA512be89693dc7fb905815b146a2a9ceb73d23a4b3f7a397d2ecfd819665db11efef36006469c55d104ee5a565b7c64d53c988ceb3b8610ebf94e4a479e87b6a1f8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e497c73a0cffbb83910a75efad4d572f
SHA166f7e159229d0da68946b1b67d1031134a448803
SHA2562572f826d3117aaa318fe4447ddbcb8baab5d7c27e53f13e58705ec0bd54a271
SHA51267dd76648e07ac4ecb9f6d2e01f6695f38ceec72d7b162811b333abfecf4df6696d478d3fd17a38524c5bace4779627e99acdfe3568969d7e0cd5d17f512b19c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56603626c94db3033a531d5f49bbc56c2
SHA10c63569481a29ebd997f2606d406aa565f8795c3
SHA25615113bbd7181785651c20dd1f888fabd681cd9d69f2a23535e13ae43730d338a
SHA5120252534a544ea519e8906e347d8b6935ea10fc38fd0639fcdc0ac035e25a9e6d4688153ede6cfcb25b94bc2a9b2a65c8c7cd33915629d1a5af32441804df738a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4db6473f1d0cacd4e348e172242e29b
SHA19afb560df44c45dadbf123f2c00bf8baec303125
SHA256a15d9f11c82f3e09afc6123565464944d95e042677d70a4a0ebd585eb5e2a724
SHA512c22bfcf8feb608348000f891ac0ab0f1abc273939f75d4e562f793c3d61cf04ceeb49fe9cab1f113af9223a868eafaf467c54d92af04d8f9956feec7a4e9012a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59589786580e1c595246670ee05fc4a2f
SHA143c3aeacf07e6dbd56fe7c72fba2e84705346c0d
SHA256833962d6f94b62285ec4be61d4c869f9558b2127971406561e17e3019d6815e4
SHA512ac0c67d1bf1382affbf017cda50f843f2c522b919dd56d1fa5a32e3ff86385e5299ce04f0b3a9fa6d576f7c7ac3f8fca898256056d364ba0c200bc0fa7039c14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7efd8423263aea4b2c78e7e8f08bff5
SHA1c51760d4e94e133ac5093e1abde5fb99541ffb05
SHA2565f337e8a945ffa9b2b015bd0e8a95f0217bde711fb9a2df95a11f05ff370e3ae
SHA5126dad9550be97a4a694bb1cbb6e81002fdbc87314a7caa33c5c5051f45488a01b3112c0711f405961ab51d7950b777382e42feb48508ed5ca589f13d4ee7bfd90
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b