Analysis
-
max time kernel
68s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28/08/2024, 19:58
Static task
static1
Behavioral task
behavioral1
Sample
c78c49aec2057b18b2f06b8c6c8297b7_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c78c49aec2057b18b2f06b8c6c8297b7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c78c49aec2057b18b2f06b8c6c8297b7_JaffaCakes118.html
-
Size
35KB
-
MD5
c78c49aec2057b18b2f06b8c6c8297b7
-
SHA1
5642677f5e42a7a3ff444d0275224eb2d2fd7973
-
SHA256
2452ccc1a8ef0b4821665950836633137e973ce4da171e97cdf8c79f2d36036c
-
SHA512
72c1962e365609bc525ca1a3bc1822bf648a8df9d1b00c3ee93e8781a19f1b8098766b99f75e44da48b2fe397466b8d958db09fafdc97385d18b78650c8236a4
-
SSDEEP
768:0ARRRU6BkmlNVT9ge6FrxUqiP58a0tC+GxIDX2yq+zNIjA258HkzJaXmBiL6B73A:fRRDJirxCP5aCSYqkzdBhLY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EA825BA1-6577-11EF-BD1F-566676D6F1CF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000701e290a9bbd2719edb09a9a5aa78252947d7f0491039c4a2ef14e9a8f888483000000000e800000000200002000000000698ee052476824e1a33f9de34466895aa2dc6546480f44f3b414926af3eb21200000009dedb72672e8c2f34e646e501427f29a725d8939f8346101a0feb2f15cb2a017400000000594551d08328620515fa1e9b0fa741fe5a0fa09ba957316197c954d63b5281b106ea17c37eb8ff3351aaad8b4d2ea283b1d447bbfe583f143779d8296c3902b iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60507bbf84f9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431036987" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1916 iexplore.exe 1916 iexplore.exe 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE 2732 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2732 1916 iexplore.exe 30 PID 1916 wrote to memory of 2732 1916 iexplore.exe 30 PID 1916 wrote to memory of 2732 1916 iexplore.exe 30 PID 1916 wrote to memory of 2732 1916 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c78c49aec2057b18b2f06b8c6c8297b7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1916 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502411b9fc514ddcb6c125762b7445939
SHA18f7082144394e1b5ba74459f0f8c696ce1ce1d7c
SHA256f3f4650b3815764359e17d3492d6088aeec76a97f8e5175e5dfa13a534c47fe3
SHA51216a6084bbb9cdf4446fe863c59abe55341a6fa99e58ea81c3236ef9a999a733d0e80c41ac40eda5791ae24705d6d1515da135cbc31e034a1ed5af20a852f824b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5108098e30bbb10d7597164def30b0f3d
SHA17890aaf2b52fd34b9acf218d23b8f839de0be314
SHA2561ab959a0d0635b456f524716ef18042b921b8a361adeac74f462938a711324dc
SHA5125b5571686ab0f94dc97126f0b609c27b85bbf50752cfeeea3fbb1cfe1c5c5900f47c5b96dbeab46e3cf1ce4a876a2d55b3bf46023591a71f67f05cef5fcfea82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb625437f1f8e06286478e90b9dd0a94
SHA1e4941d1a56debc0c2a7035a5fd33284e352bef39
SHA2562e6a4700b37568e10c3e676cda6bd32c954c8ab1b282f10a99f9fb209554d34b
SHA5122f939fabd9018274600b36934fd5702185545c46ed2be37705ef7607cd570d72980050b84abe836cf8bc44cd87524e6600f09ae0c33604c4023d116b0781c533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c0866376fbdda61fec79d81ccea4157
SHA1cd07da358062d3b7e267be4da79dbbe4ab6fda6e
SHA2569b6b70754cb24c57cda61b8c17782a4c29a3e60cb72484afd9d3e35a4dbc44f6
SHA512b9e2a44927618121f15a8d0463f1a54b472d1781e553fb2cd262f9b57f46f981ae05d932eab6324d26dcd0eaa724675b0fa5a52bae525be3afb2d00ef9ddf167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516915445c088bd45a484edf8b8dc84e1
SHA16b462569899170785cad4e9e0eea3242a30f828d
SHA256b34c05f325e5ecae45a09c03022f0fb8ce562395cc1125f6d60a9afd5227d4dc
SHA512e16c519109529b17f676b17ff1a97d14e4e1c1843aa85d1af1b89c14808a994ad2a265784ef4d784452e6ccc45ffab4167c69b114e763e30d3791443de874920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b2a3342e2d395780b45c5cee2db6dd6
SHA10856bf338ff208011b1e5dd53d59cccbd4ee51d5
SHA25629b7ec93ec7a45be4b7e96cc588aaf9b5591181993d39484730e6e372eef60a6
SHA512dbd93f0a4b07bb14a05b05716a0cf66fb4988b798e0593a7e6f7d74ccd0bb66b9edcf4d901576e1fa7b22f6c75c8b79384b16a3ef5aefc66e8d590c16d498072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c876948489107edfb7402614b515e272
SHA18acfe14752978af1b00e2f413103a768a02da4b3
SHA256f9e2e782cfdde9f14c41438c1f70fa896332c8a921de4f81ba74414f9d898c53
SHA5122614f244b4acbb429b8a421f12a49a2b39aec7b4668d7661bbe22a3d2a48a4279b7e77c3c193352afbf733c07d4f6b2742e047eb78f120360606177e2a331223
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56579539791c897f109fe1c4f6d1f139b
SHA1bdad99959835fc18393c03cada1d8532fb413e06
SHA2564b33f8fa203f1b67a154942bd08f84b671f5a3c3c3e3c21238807148aed46692
SHA512b321e3edd59d7ea0b8532d15b7db1cecd1d81f293322689313b08902f0da05474f64c7123508679fa4ce8c9733f9108e27b4f0e677141fad0c62af35f09bb490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59648c02184789afb2eb6717d95ebf8dc
SHA1ac2c66f73200f9dffaaeaad3c6f5b7b290124b85
SHA256ed512d79f8d8ba954b79c49d259cbab705be3c4ef0b1461be60dffdb40d1c789
SHA5127d274ae446858ce0270f92de39ce531bce8b7c0c3120552857a1dde0cdffeba3cd500ead98fc704fe879075397e5d847c06a6db66187e2d9944edaadba434216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e35b4d32f8241f012ae2608c5d719ca2
SHA1655c492d2232d5aa1ddd40938cd35e4e1f1b0726
SHA2568452e0a33a22b51312e0b65c72d64d2472916c97d7371c32402db45b1f914b66
SHA5129af2761d9c81723b5831caa02b23b0c1584afec756b12f12c82a876a0c92384602f97491b407b3700a29fd4e120575ded3bc6a0f8b590d9ecc90cd80a414353a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee94d3bf2b8430bd196d4c4a3153e2c4
SHA1dc140677b70fe3eb25975dc541111758ff473af0
SHA256718515774dd0add825ac6a99e1911cbca48a5d68aea9c40f3004d664b3bb191d
SHA512ce5de9eb439b635d9d2c2bf21f6542ec901f82bd331459e29c2894623f368f8b04c08760eb5993ec64f087c8d1ab190b4971bc9a9cfeb7b3a23535343934028f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f70558fb52b50c759e6b74e62f44380
SHA11dcd692bd84ea43012202ec92b8b40b704874b6c
SHA25631f85636c36de3bf52bf1d4d3c63bed49e9c5eb631992742d0ba8af4fd73ac18
SHA512dd66f86648797e380e864fbcb86023c08177b86d37cd489671a100ef57f45c3fcd6ce7f6b75b358d6cfbdfb052386e347775da9e36b36ace83d5602d38073c91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c19c304a16bde162dcfa262d0a0c77f5
SHA1f6b9bf49e55211d1128b86e84d1e3d7f3bab1327
SHA256f43df9c42c86e8e67f6cd7b0f760c50fb7b9be89869d59e7a85de7d12b239999
SHA51220c0a28119dd60d1e7f81baa1ddcae416d7de0ebcf206d9ace0a6dbaa5c43b2bcfd34d9270004915d726ee32b4e90117a5a588fdd3aef11710ef2d7fbc6580a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c1a8d8d6d20aa753a3136e71f476706
SHA121ef332c2feb516b8219c046b768ed6fe2c8a62f
SHA2569cb4e1b488b49e496e97594e41ddd104aa14ad801ca846134aa5f02637cf3a24
SHA51243b8e6aa4e3a272e2cf0ccb010e6448c3094366038b495361e8a7dd2fd96935b3bc7a5e80490f021411811cd5c61d11b4aa6c117914822cd674e6953a19746bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d380f103ce52c8c008c73a9ab3f15f43
SHA16c7d729315b5230e9caf550c44606a603ce7f5b4
SHA25603d05106b08d17a5228f9d0a8ffc04b44f874a1fa684f75c65a538aced83ef11
SHA5124fba7b625fd459f752e09a07ae98e6b8dffacd470690918e644d879911f466b9a5196c5b0dd4d6e6b8d2a34799a26237f3f17814b8a65ecb66e39c66fd32754b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a4671ae37c35a885dbcc1fb3c629c01
SHA109c3b883d9acefafca0691fda01ad3b14b733742
SHA256100753e2e2a6edeef1132952277b1c8b1ce1dc79e9dc9c28586d5b97263edf36
SHA5127da8bc9f13f046b2bb748266da21268d8001d28e8c15e349c6f70d0b8f6dd82686d85a70380489c095d9b450b6baa6bb68b5a4f100b455f3cdfd64baa0ed2f5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5222a7edb92a5f433d3e45c0e3005bf45
SHA1abdd37316548b780a1e0a3455fd28f6945433ef3
SHA2564fec8dd98878dc05b8f96b6f254421c33260ecf09faf5033b0c0f1ec4c1db8bc
SHA5129fbac6073cd3fa66f02236ce010fdf58f6e2383f72828f90b0d8ee8cd905db2ef369b6379355b343ae9cf75d33464a26dbcecdad108b424117795e147eeea39b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580b8738eeccd922bd398fd63769d009c
SHA18d22742eb3057dda6db12e80f6f2eb22bbde0f37
SHA2569d335fd8a6348fc3df7366507000b1ab6e6fe4aa5aba9e8e109893686684d32b
SHA512333a9065235cb7ffed831e86a7245dab431d6e58268917e1bf83d4b588cabedb3617d1b5d0bc442e64d0b708f3360afbeeeb7382821565898c50e93c9eac63a9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b