Analysis
-
max time kernel
120s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28/08/2024, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
c79e24b7b99ea77ad94c4c977fc196d4_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c79e24b7b99ea77ad94c4c977fc196d4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c79e24b7b99ea77ad94c4c977fc196d4_JaffaCakes118.html
-
Size
3KB
-
MD5
c79e24b7b99ea77ad94c4c977fc196d4
-
SHA1
db1ed63371832fa2a62e65dd24979ea37a84d8d9
-
SHA256
b91394eb22cca789dd44531cf4062b3495b02389794db05369f7158128240773
-
SHA512
ec12146ba1d5955db56f5999e671f46a4756e7d75281bce117ec29beca48f69b6333e35f51246dba6fe4e15753aaf2c725ae2689e6e3347f1cdf6a890f97b758
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 805fa5328bf9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431039758" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5D82E1F1-657E-11EF-9629-7667FF076EE4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000014646ab319035b34d624e476f24aa78587f9bef65b6d5c403f436f10d775357e000000000e80000000020000200000002e323addb262b54122daecad93b769aa40f7d85075c49fd7b795863e5e339dee200000000debcb871991b5de748335bd0e04ee0f01001008f50f2fffe631ed7407ff338c4000000010a22d21920074902e39b9a47af20f1cb55f6cdaaf24d29ea3fa7f697cefba9a0a326ab0f319f27c117c4b83e9f6639e4e543468300a59dea22d001c0c522ca3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2256 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2256 iexplore.exe 2256 iexplore.exe 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE 1964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 1964 2256 iexplore.exe 30 PID 2256 wrote to memory of 1964 2256 iexplore.exe 30 PID 2256 wrote to memory of 1964 2256 iexplore.exe 30 PID 2256 wrote to memory of 1964 2256 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c79e24b7b99ea77ad94c4c977fc196d4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2256 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5734143d2b8caad7bcd0daa23eee7a917
SHA18212e0b3413adedf5a641eea812b75c875bc1f13
SHA256b6fda528685f82c8b62749ff13c541cd3ebc9dad161f9c549a2e548d88aa5663
SHA512e0e9c537887554364a2350bd7a900fd34661ee6e0e358146b8060bc4ebe478be77e16226d18347edc29239b66d568bdbdddfa25f9464f7f6c5ceaa527c3bb8d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1760a93663b363cc8b15ccb73f34586
SHA143c4f38e706c09c7efcf000989c0f7849304d76a
SHA256d42a758f2d3dc5105d39ccb0fe53bc0383bb0645f03f3f07c553a8bb112d5344
SHA512ce83ca2cbc3da9b94174baccd5ea8573be576cd7652929bc9b5eb0237262e3f0ee5ed36749045e45ceaa094e651db0f781f4003161578110a196c13b9245028d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581922aa0a0924fb6c555ccb11944c09c
SHA1a80b390347f816df64469fa3962946fda53fe2b2
SHA256a90d50d438a096f8cdd9792619a13ce705a14da715b26784f818e8d0de57824e
SHA512bced7a581cbaae74ec3f8ad03a342fe962624175eed8a9a66c425f64b1072ba22400f44d1aa5adf0e3112e8055ca18bbbea1fe6c537a8d0552e3445c5a0cfb65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57572f977d0b166a923ebf6593a756dea
SHA1efa1fef17daf5094a68c3692fc8d34b329e10bae
SHA256d8e461f3875bc78b883eb5c68546cdb27cee5a3d43aed814c01046e8027c744e
SHA5122b0798a853bd2a79fb85ca26f666a7523b8b88f264a423c9875aba3f3871e96666c54f36387768a9ccd06381769b1e8f968543cef757ae24d31cc2727c903634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b38aeb957db4660cbb57a3d12990211b
SHA1530c569e6b8ba4f9c178830201d5da4acd9d8dfa
SHA2561b4cc28daab85400787d328432fc5f52c37bce7a793ddd89c2f7483a6b12f188
SHA5121beb7c1bbb1fbac83b9e5faba0514c317b55550dd4e60cf918fe858c8f0b2b261f5a5c13e5142d8f1bd49d96fded2c7382ac7cbe1d6bccf5b270502129c21bc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5258a30ef8f2ce3c1b268ff0f66497cdc
SHA1032cdadb06ee165fcc9b92a96151a261c5bf1e0c
SHA256305049bea638640edbb67a79a50e5b72fcce699c33425ba4786b6db9c2c5accb
SHA512dca506e657eb107c7834198bddc3ecc78f9cb21b8c78377f9bf33adb3df0e122ce8dd98445dcd6029a8599ca826d111256da28d424a8757d093c130ea4c0fbb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5577cc811f29e833110a8c93788a15361
SHA1788882bba3ddfb7b42cc5f4f2e62ea54cf7b1128
SHA256057b8fac5dfb9a4869b20f55c83f624fd39beceff96d38deb328c02a6580c9a4
SHA512642f465bc597614970abf6278c6a0e4eca531cd5e84e04931e6d4b18d5cd4cf3aba0ea7ff56cd1882727daec936b505bdf30ae4e18c3ae8924f126328d6fef8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d50215f41a10b2020a93dab5d9cece23
SHA108466feb1888d93119677955b0094ecdb7db12a2
SHA2565b64a51b9179d3bd0428c0b6b942cad1130b8f74b84c03526d95375e0d387ef4
SHA5121c6b5e285a60f4ee842767659f12c4084521b7fff733a1bad35d295b0a71a7e1faaab16de1aaa71389189107b592ab944dde3175dff4b72391f763c67a55019e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58914286176fd983aa596292af0d411f9
SHA119c84d1dc615ccb89cc77a447379976d87cabfaa
SHA256c465908345e6565ccafe9559f270d3d906fcb10fb8cd5a14cf9011177cec6c6a
SHA512b324f93c1a6601084c52bbbe86c53b10fcbd9573cfc53bb5a3cbc516917a67768303f586658c69252151a53f78292527297fc7bd5c90edeb6202bafe78f8b338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528bbbc69ae84bd042db5a5ca1c6d455d
SHA1b2ac8354a5934930aa3195b46b42dcee0b2e859f
SHA2563c37342e936757d93f9e76a84df42759c2a8075bf6b92d9db4e124bbbdfe7416
SHA51278e2bf4e56594686f53c5e93e500b486e27827943914f1869c20a0ec89216db0b069beb730f5b496a27a2cb26d2cc466f1f8a0686f956194df7c724a4818f452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c75069cfe3385c7bd33ae4f9f635f99f
SHA1cd46eaf8800f31c62b93d2cc9823a5d10466d48b
SHA2568c4e7adfbbdbaba7f942fa7b65d691455920f09f80ad3cc0d86b1b4d12cc95c8
SHA5126d10771df457b4b6c2cb193c5272a8610b5b27bf77a8beaac0290af42d16986247478721135817501da3dc27d389276da0484a817ad718f44d11012957d5e544
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573e550e627cba9e2ae614ead5e275808
SHA1f04b94cb148af9eeb364dddd8c93b8a150080a27
SHA2566df1ad15a70c4e302f4ac287a4f455361cbe5da46dbe1d86d27b517218ed8269
SHA512412e579fe65d33070da188925828e8d0c686bdee209dfe3facb0f2bb860f22b3882e37287d36e2615c0f9bac61cfce1e65124f41fca1a4d4dc3523819280b51b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55beda8f02146013fafeaa428cf56594b
SHA150028959bef27d1b00483c656d32c89ddb147451
SHA25620ca63c6cf3cc0eb91fb8aced44e5415369f82721066abea89948b865ab44672
SHA512cd45d0d9068c96d8159ae8a435aa459d3ce9e56100feb6508ca84b62f7081d8f78f9152102a0b637576f5e6afe275fe5e77aa6bfbe0b290dcd734b25274664a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2f044c78fee02590bc445ee0377a06e
SHA11cf5ed0ae87bb5dfe92ab8c28ebcd4a97ff4d826
SHA256bd8a56fc412321680935a89d7c5cfd798aba071ca50a0f3a3dd079c73a0189ba
SHA5129172ff89a1443d358d838563c1417054bfd9815d83723428d67bcc74367f5a890b22a0ca3a8193c0b46083170e6b081137689a05f1ae23ea00fb760a4b61e9f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd92ac7146c7a3732633e4e7ebddc827
SHA1f455dd010de66e9aeae8bf9292f3039aaeb9270f
SHA25634e07429489d654d2795f9eeef3fbfae7c951d20c36b5a0433c81833396b506c
SHA51266270a6944a8ee0a665c517cbae3f073cbc164a5d161ae940a5cb2d0d2a511e8a806cd91f714e981f3dddf0de55a04565aceaa530263d0190a3cd8f467cbf65f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aafc83730dcf131b1172c13fcff297a
SHA12f11c299476eb836dfb480383772617d1c3f2f9a
SHA2567362de0c72095a13f8aa1f6467a4acb2ca89553a8338fad9b012d5d821ae8b7d
SHA512eba28d2bd4db6aba06f2066b8ba3ad4c638c03b8a4b83b31f01c5b187285476fc8a878c973d4172e8882d25314dee9dff67c63a36ddc6f00c1bb7a596ec16d38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5856b2b31b7e1dae981c0e56d255df9db
SHA144117c2ebeefbb0d680f58e19b4d1cf4eb5bbb05
SHA256215c41f30c7c1ad15af0e493f888540b6b483cb2a8dac2fac08f1ff9d3a0df95
SHA512b7906c4f9e83c3952f7089ffc397042930f297dafa9d3d29f807b29c26b79ea5329e1608b14f9ed986b485cafab129c785c826587ff923ea9eecff866a30b8a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e78a6e0e9d2ffef90e8a00852eff3cd2
SHA1b0122a5a15856201205d92a19a46beb3e51eabdc
SHA256631febf0602ccdd80c4a13d4a06cb9e9ae64aa42c787869af06cfbf3ee9a8fd5
SHA512e8d5ba16c639c48fb07464ff42d743b0aa2bd5133e693c0332bc9dace34181986967f2c603eecbf239bf5dcba5eef5b0832cbedf422ac80232527315f2b8babb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e535a999099aff7bef14e8802237632a
SHA1f9def92932e4977e1cd6a0bead6770747362f279
SHA256b60ba6db32276c23e26acf36f2ac21fb22d926340aa4f26427be1ccc39409bad
SHA512e31881e44f6ce2f97701f35785038ce63938092bac7377e092df88ac940055f62d6cdde157c5109080ab459c25af576ba51bbd19b66287329919fd2ca7ebf38a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b