Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
28-08-2024 23:21
Static task
static1
Behavioral task
behavioral1
Sample
c7d504beb340f01c833067133f3576e9_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c7d504beb340f01c833067133f3576e9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c7d504beb340f01c833067133f3576e9_JaffaCakes118.html
-
Size
12KB
-
MD5
c7d504beb340f01c833067133f3576e9
-
SHA1
667f93c4aa6c02b24952b1c898096858069d8a0b
-
SHA256
6267b788be81f59be55bac1b837fca2a733fe2317998cd82b6585e015eda6d09
-
SHA512
47313744ae88d6feb2f9f3134b5238d0d53958902528bf533d06f1a0cd4cc271acaf14774ed676032c0775d48da2480bfabe55d315edf38c5d128b93c71bf9fb
-
SSDEEP
384:B2h2xkFaM4tsXAn4Yrkc0S81JQbCJtK8Hz:BuFXQnl4Az6U8Hz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30916e1ca1f9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{467124C1-6594-11EF-8A22-66D8C57E4E43} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000c2b9ff367508144c0deaaeceec53d49e1b5ab5474b2aa9d0645c2dc7f1ce26f7000000000e8000000002000020000000a79edf1660607df313e1c6180fddb430bcb8cd19019163432a74e41787776e83200000008c0f77f25b2bbd184d0b643d9ef83775d3c7e4640fc553fa33e2423f4aea19ad400000002370aca119e7ea9499363204c49f79df3fc46569ccaf49f9fc7a053dd7a66bfe314d9834d0b834f51be24c3e95bba7f5a71c06bd6ef817f1fbd1821470053209 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431049166" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2436 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2436 iexplore.exe 2436 iexplore.exe 1500 IEXPLORE.EXE 1500 IEXPLORE.EXE 1500 IEXPLORE.EXE 1500 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2436 wrote to memory of 1500 2436 iexplore.exe 30 PID 2436 wrote to memory of 1500 2436 iexplore.exe 30 PID 2436 wrote to memory of 1500 2436 iexplore.exe 30 PID 2436 wrote to memory of 1500 2436 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c7d504beb340f01c833067133f3576e9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2436 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576e4796a53c0ffced3f3e3fc3ca9658a
SHA171b64d046fc338989dd1dc5f1bdedf7e752e50c8
SHA256a1a7068f4382334e5b9cb36f8fdfc10d673df16206805febf5b15ed228a6de42
SHA512e3376f214f0b51cae31d47e6842792007951641b675d21ffb828f6bfa249b9b472bed839825bd2c1834f931ab4cf289ccb147491c346e688cdfe589a13983a3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4b7ce0b4ac6eb46842e3e78f8a28220
SHA1c6812a1bf59502cf043fc12c3e134c90b37f0151
SHA2565fc9c205e810bd1da2943c85d688fca0421f9133e9beb69d76ed39b80bcdcca9
SHA51286098b20f7c7fcd7d3d9601e056765b64da4986b91303b1078d2ec4485a7a02b55dec75f5eb2170e0d9a0a050596f77b03b8597894d3b062f4c79c0fb8f42b14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b52f6b90ab185ef37b579b9d099dc514
SHA1a51dfad52f2c3491d4340b0090e441b9a5f4f3a5
SHA2568f12179c9b9d0e2eb4709c7175f9686d9d04b1b4d2072462cca74cdcd9874d76
SHA512e247bc41744af5936c4737c7dc51d7be811608b038526742f0b1c537c152ff66e166b12b7c94f1b0d42f4e4baeb1be8186567621397ef324947e027c9deec278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5140b567bd63dce10b2f479f5b5db6a67
SHA1739ee4aef7c63a6153baa12418b69713887ecef3
SHA256fb2660bae5a6bcace992e10a1c590a1ce04c857dd7130a9401b24b6fd1c25938
SHA512dad4c2c3430f60db34fc8017d54b6e81ce56edfd926203345359f071def39360a6f05b360915a5f1a085c5abafca3b27e4beea4c2b5048222bf3e37d7f8c8892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599555e5d2a447322386af0d717a816fe
SHA1835f03ae63d44011ddfa2123527f51bebc47b087
SHA2567e4b07179125d7018ceed24f76fc0782ec8043ee6d186d1f6b7dd65d06f1fa81
SHA512ffae6d50abe1cec6c1c6e71527c907e1775f08058211912969a5de9b50daa866dd7da43ec9344a5de0888596d69df0f9c68b37443470942a37792caeeaa87113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561e8c87bd9f4881d1250824f6aa656d5
SHA18003512347907c8e67bcc725db58a33beed451b8
SHA256618b19a94169ef70c641df8010d9c37384926f9687ba004f3f0667d1cf9ee1d0
SHA512bef688c5b9f8d9d7aa11633a41d16ff764a8b91c2aeb7930febbec0b68cee9c0cf35626bb8af69ef08462714ef65f47cb7cb795baea8d81ee285f535df64df2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d313aa627af92fbe4623237ef1e8093f
SHA1c74f62e02bf3cd0a75655ef8769304451c58c139
SHA256e33f7d290c5997597fad6c44a967ee32babb0ba8cdfce5ccdd505f42d15e6708
SHA5128694b05d92abafe44788e50bd844ad233d2543de038b7316fc6f9026473ab249740d397d87eb0ff57148e60c26d84d9381add4d16e825a4836261d5251c91969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556284562859e2591dd0176de116e82f0
SHA19d949daf7a2cda079607866b3bac339c6962ecee
SHA25626a312970d3c5f428a60ab02f8e2460476f2a2d94d9d1502e6861a9f821ef3a3
SHA512add331607b986e06557ff4e7e2994d2ed94e09c5581eb88eaea3e7f419c7c5c7f2151917306224db7d0441bcb73b831dd0ea4f5fcd374f9a7407dec2ae64d22a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0a9f64acfaed3888f5aeff2c968ec09
SHA15d5ec45e24773c3de3bcc4fc60231c7d9c1e9939
SHA256f5f010fac94d2e1e5117f0ae00c04f3a5cfdbc3c8336c4d0db8705ac6aa79dfa
SHA512f906d8f28270a1820a69cf23385fa1299ff49500d90c8c0f1e266f1ed4509bd763c3c0b62d6473a9c3ef6e8965a33093418738a367d805b87939fc802c664015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb9dd5b1ec51b94011fcb34b0d0c45f1
SHA15e30822215d27d7947397daba1055a1f5eeec1ac
SHA2561df30ffe0ec894b9be18c4d99829667f162ff4707257dd7c2e82e693e588e5c0
SHA512cb42a5192bbca5f5d31a306c1a41610a7b5a814b537e418c091cc6dab01377fbddf26939688c838af37a89d88d6a66eb35fe610c8f35f2fcd0834e223f7aa201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f90b936d17ad197778e136922d7cd2f
SHA17950c6b65ef9413d9fbe6a84b1db87b3b7e82ec7
SHA256a40993a4ad55c5a0eda7f65b653fbf81a6c154e46f09768e9caa5ff727c204e1
SHA5120fd4dc87507b55e790aede738f6cbd46b47ff7ebce8f539505821d7f33ed2d29e9fc8aa4e45d74bf51105c0b821c149c0420220c7f9e93c36da60e2b0755ec35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5982f7b0246bede9607f8f87b26f5ac89
SHA1d2ac334c47fbfe4ae6b2924d7af5ecfff9dab767
SHA25608c9daeb5632c739791e9cc712a7e2bfe5b376d2c8561c1fb30bd3ec16593b20
SHA5122a1fd129659593daad0241668f5ab5afaaa580b2779e8989d7b7ccc9adf7647dd132233aeb6e46162ddf3fdd157fc55e80318a813a71b10e490e4f6a2f1c9fb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bfbd555d56a3ffc4087e156d1d97d3f
SHA1e43f67ba96506644db10357cb7327245eb0a8c4e
SHA2563de9c9f54e8edc017723430e8f108b3b8a16a3495a0df44832585051c55eb739
SHA5124260b69945af0c383eef2eb6a4c4bfb6cb0d7888cf90facb335d5bea46ca040fa565e752a02bd04e1c2041379a84b35dc04cb0c5a37962ba51464cb9f633a5fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592a44cd4945cdfde50ae692fdbfffc5d
SHA1a00f99c41841ce6b48ae48d0e3efa625950d5260
SHA2561f97e9d63ac7c8e8aad0138ace3c1043a81f2e8ae58022db2506b7cf3747573d
SHA512585900dae362dfbc913b89cb6b4d8fe51605cbcdeea375f549405a1a673a92b23e9f5751d71cf87636b3509b0405ab134e268bda9b931c533864edb0cdae0c80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ed293eb28c97c0e6bd1230c051faf5e
SHA14a40dba7a628f89e7d66b1484993e6a900998683
SHA256e0b6a5da576582f86e79acdb05a429a32de56129935a8e2edbdc7cefc8c725d5
SHA5125537513d07141ef4ed746a74d9dfa2ad5ee1d411d124b5d31de50e6475be3f66b3f4b2ca895226b8657bd4ea7487f8caf82526649a9ab4730e4847d61a7ac989
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1eacd94123fd1c2470356dae73de45f
SHA183e25e393622c348eac21bb0d43d4cd67442cd1b
SHA2560932ec5013d8ba7f7b2df5f6434feb2b6c062ddb5cfac7cbc19db2fd1e509ce3
SHA51211e3dcaa0613a1132ec020a16cb5cfdcb3bbe0a8cfcb192bd6f8cfae81adf6607a92c606d9967415e277a10fe9d9812c0758edec5466428fa6ad9d2a2acaf5e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535072617ce9e7b5b710d317f1a59faf4
SHA1b294a027e0e3f7cb6dcafb7c074b468258be4ff3
SHA25648b20c51e279975885623816a7e4fc38445851c780a194ff6a324c5846efd0f7
SHA512908098c1ac94b0f136acadc53390d93326bf846a9dfe5b6adf6a0ac8a33af4ecd91ffb420c6f38d568d877b52675ab48a6e81532320e4cbc52dd7468b9533e1c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b