Analysis
-
max time kernel
146s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 01:29
Static task
static1
Behavioral task
behavioral1
Sample
c7ff6f403fb8704997a4727d1a7fac9c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c7ff6f403fb8704997a4727d1a7fac9c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c7ff6f403fb8704997a4727d1a7fac9c_JaffaCakes118.html
-
Size
32KB
-
MD5
c7ff6f403fb8704997a4727d1a7fac9c
-
SHA1
de6d3da01f44f36029da04487eb6cef663d80779
-
SHA256
7ea36aecada83d062f6bfdfaff2a1749f748233c7c333e12e60a645b28210be9
-
SHA512
0555b25bf3b18580fbf0be79dbfc76e304f03caa40feacdd88fb5676ec2fed4f45baa240d7c5e261c2d006da816558ec31918c015fc5167609f3b4f3ae60e02d
-
SSDEEP
768:XVutZQpuS0/02u9JPPPUZixfsk3b1XoKbFuiWSBWFSrNhI6MGk6wPGyV:XVutZQpz0/0L7PPXxfsk3rbFuiWSBWF/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1331DC51-65A6-11EF-9584-DA9ECB958399} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000010711a36bc3572e00d5665e35575c4ecbb71b557a4b7fb87bc47b855e4b443c2000000000e800000000200002000000025b93ff298246234e7dd7de0188be31b4ec5dae692c017fa9fb79443d317a39a20000000c9a3851198c8ab63774c637880d782aa2c1e09f0e3208004037870feb9a3d5e140000000d54a2d6e503fbe7564cff85df17b06d18ef5839150ffc48f4af97c9f45d4b69a58fe8c6fd79b8c3ab447eb32a580f08eff20289b8927a4af3adc973c618cbbe9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431056836" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d066de15b3f9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 iexplore.exe 2180 iexplore.exe 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2752 2180 iexplore.exe 30 PID 2180 wrote to memory of 2752 2180 iexplore.exe 30 PID 2180 wrote to memory of 2752 2180 iexplore.exe 30 PID 2180 wrote to memory of 2752 2180 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c7ff6f403fb8704997a4727d1a7fac9c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5285ec909c4ab0d2d57f5086b225799aa
SHA1d89e3bd43d5d909b47a18977aa9d5ce36cee184c
SHA25668b9c761219a5b1f0131784474665db61bbdb109e00f05ca9f74244ee5f5f52b
SHA5124cf305b95f94c7a9504c53c7f2dc8068e647a326d95976b7f4d80433b2284506fc5e3bb9a80a4e9a9889540bbf92908dd39ee4eb25f2566fe9ab37b4dc9a7c09
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD58a9c452cab4c2d0283bf4c46d965afff
SHA1910fe02478a0316d98d47b65418950bde822c5aa
SHA2568c5d05dccc7ce64c90cea98baa1b6fef13b35b0219a38069fd6b2b13b144fc49
SHA512df708d362dd4f2c421d5411680cb472ea36ab0b198b65be94fb4a50445813ab990300536dc08ccfde5040fcc6dd8b360a24cec0771b4dcf44ecc4561b25b06e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5188141ff360dda9d12790ff637c1f486
SHA1360d06383de35012ee0a3ab9cffa72bc994a82c6
SHA256ef64a01a8b1b4f7ff8492e665ed55d328e5fbb3697debffb47521dd477c13c00
SHA51271d429871c2089d3ca26ea60fd615e65a0fb88956bc53f7a5def534328a3e1d8e5e77aa2d7f9531b03a572770b4f1b766d9f62180dc8a4c3664720a2c8b53c01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ade2c671d8a369250c642433866c2faa
SHA1e0f6bfe9d01537484779f3191d1c4d3f996f47c0
SHA256c5dc038349bd18461e6ddbe22b985d98e1fac07e2cfa8047804c2ef423d37947
SHA5120dfa7cfcbe68d8f078aa1349c1006b3d148b75ab2a8f1eaa5189da595e1e98677dd74399cdfa53524124105e94e93736a153f1407b703987d1a655fb6182d427
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d51bb5599d3a3a6f5cbcb0827f8a2448
SHA1f404becccf4943ad9377b2ed07d7bfafabf78efa
SHA2569744d5baf41bfd78adf6b963b2bbac41bdcddb5fbb567b48c2e8ca7d43e2eb79
SHA512e5bf86a28e216d492a375cf9f12c1ad08ee49281e0b20feb5091d2ec0078a508e3a2d37ea2a5649f2628eb1f4fa121094f1dcb864373079871a680d7b8bb3705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1fec9b814102da9187c747888e40261
SHA12bc8f882548dbb33101e3e3794ad5e5d7d2de053
SHA2568d42d6e3b0fd805d58781981165e5bfa383e691ab4de657ba06ac009394add92
SHA5127cf1a327b61201a88d25e9055619a99e758a48ffbc1e4ddec2f770cf1eba50f0348f8227ef4eb4ba4cafbf3d1d38b5974cd1b98f1e4e05d780d5f9c3cdcba62a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531cdfb0275998ac7671286919f4941d5
SHA1b9ba63f50e8a11c4839f7c5a937ccb38eead208b
SHA2560328ecb2ae8d2c77849c7a07bb845560b584faac83be518174c9256e89299d4b
SHA5121ddfe4981f8dbde002971a688ad1d315a3097b1c390e31f89237400b30b6d2283eddc020ab60ee65c3064620ffa98d3aa454893674790844e02ff8f1d35ce3cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6335236bd56d653215e5100635162bb
SHA1fd6dbc6540e86e043974df51623f34b05bad9515
SHA25660d819b892fdfd069468b4e945b68a852c4a2e94a60db0e0fef479d22ec7b1e0
SHA512ad049351249a3dca5c1aa60d765a444c05306fffd35323ae6b2abbf1f1470b1fa64a6092048d8ae5c9fd0d926303714b7f551d55c91753bc59ae834584d032ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5710c49182a3d30de7024fee5b34fa4f1
SHA170ba509f2f4bef9ffbcce3784e4e7a3120a403b5
SHA2562df10fa10921a6d6403ee60320f8366512ac3c39caee79c8590d3dab3a9b6a1e
SHA512f7cc4909242e4bd3f4e48f53cbfcfc1be6aafa59ab5b5121469eafad9793990aa26c5a3c0acda10199858685e701d1dba9abcff8ac468a0772b1fa86f1f1874d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b1c3b845b7b78a76c0ea8115417021f
SHA10540197f5b999d40102cd866ea9066cdda54f08a
SHA256200b85187587488fa3657e68ff008a374ee32f753a1332b3229add5e96c5f7ac
SHA512f0547b0839b0de35e2e7dd5aeb9cb50f26931202e4d1cd9a8fc24ff2b1052790db0b8b295e4ca58315bf3263d0b187515bc3ad7ab8352ab4b4174dfb8f7fbac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f44db63febef4dd4c25094f668ab7540
SHA1ca13a69d93db597857c4a74dc26e4a188e975922
SHA2563020c42ee43373adb8f04e8345d67074c996ddd37aefd9bfaedd6ed61dcd68a0
SHA51278eac60bedd5f6b825d6e919112d27ce9a2d78a6d036b48e99d619bff3e954fefa54bf34c26f937ba7da1dc973873d692a0e4cd482ebb158da09f7ec996a7fe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1ecfe153b49424341f7139d86e5fd38
SHA13cdd1bb67ac6ee57e45f56f6707b196142d64954
SHA256e6a9839aa6aaf4a47cd2cfcae9ed82c96f2036062d72da8cedf6a2edac74c5fe
SHA512dbb2e9efe9d9c8ec7a2f38ed110a3077dbeb382b35c733b4f54a9fe7220467816109f46250525752a74b5d7e44886e7d2875925802ba980a6849ab21892392b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c53d76cb1202ca10b414c1ef833368b
SHA13b2a3c9cc53da02b6c226ae799529e1c99ce509a
SHA256b952414c8d847fa8c27842c8125226df8612b7f383a759ba12f7030dd5e1183b
SHA512e53ae3938190be95f4f237992f5ad90f41356157b4d130cd333bac30fed18d8ecd65946fcdba2be739750aea6a56b38c5f313a12bc38baaf114c47d285885797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f808579cd66c2caed1ee71fcbf78e14c
SHA1a669080188436f0b7025efe04a25a9c9e20363ca
SHA2564ead2444709d16f8931e13539867b03acf463bc298bc089b5c25129139e7b87a
SHA512c56ea90037382cc1c9af271697029afafc659d19de4a8efdc5400bc42a37f7c77b2467195e04f483301577f01772ed945fbad84c3faecf376ea606dcedf33f41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7aec4cec42a35fbc223934ff7e66c22
SHA12cceab601eaec83b98e3027cad09a6398b42ec64
SHA256621850d3a5c462d8b4625f3cddc1ab5d65165c77f52daf92de89811365871b11
SHA512a49a5cdf45e195b250da3907e4d03f53e85979b96fae94d3d16a7b79f4486742b183aa21f8cf1e026dd16a186a988363ade52e2384d8524ec2ae8293fa193b8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a99de5f97258200a642360276cb074de
SHA1356870a09986582ff69fbfc928efd4a366470198
SHA256d505588bb9493e2e67a36c46ded33d9d7c4a5009bf96a917a6db4836d88506bc
SHA51283e4ce3517eeb70deaf1c8fccdc80cb04de94ea6d2b2fdb153bc040b6b19133d0e88d7bfc4181ee7fe19a3dae4f07666d532c95af252d3f26f52b9fd488117ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502124424ff4e3ef7b3ca82e7ae436f8f
SHA103818f980f25573c7d7e3e886cd4e75e39db6c1e
SHA2565f285f1e681637c1da041c561f661d91c91c73ca4badd2dbf766385773f8b4a7
SHA51240f244fac653b54ca380cf606b03b6bbc403fd5332543cccf6cd1062e061f1e1aa97457c2fa83e210bc322fff595e47c35701221c9ff28dc45e9f2c9a5c7da63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD52171fa1cacd7d01c119edd326b6321a6
SHA1326a35725392b841f773eb245f2279eb77d69d23
SHA256da50e057af705fec0ac0fed092c31a37d2ccab26b60a4217d11d16de7c84d14d
SHA512678d3a12bf5307d77a6dc8befdcbe959a6a8a8f73a38ecaf89a019835a84a9a8b46b640066b8f0b6dd69b6946512bfc1885564f3443832ca51b8d4df5098e3d8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b