Analysis
-
max time kernel
136s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 02:25
Static task
static1
Behavioral task
behavioral1
Sample
c8116cb675ad968c8c1ad9abe09c3fc8_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c8116cb675ad968c8c1ad9abe09c3fc8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c8116cb675ad968c8c1ad9abe09c3fc8_JaffaCakes118.html
-
Size
31KB
-
MD5
c8116cb675ad968c8c1ad9abe09c3fc8
-
SHA1
449adcfd6f1ee93986bc6fb9c207f345f8690332
-
SHA256
d0723d6210802eeb9907e02240dee6a2c6d0a5a921350b46ad23d43d15755070
-
SHA512
9323bdb3305a4fde9eca86aee385e9b8c3be9082bb0ff0fbbdafa199b4f841a5fa14abfcdff6f970a706548b0ad08027c93980787174a27db847dd7c829ea4a3
-
SSDEEP
768:lusHBm6E7YpXHll8iMgzlS/fHKPMHqUWumNATq93LLDXXrPO6kfPbZwBL:j8iMgzlS/fqPMBWumNATq93nDX66kfP8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FC8FF881-65AD-11EF-99AF-7ED57E6FAC85} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 401c35f6baf9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000889fde33c76877a1beeb34b346260e86965a78efaf6c2686e1852fae83e09058000000000e8000000002000020000000d12a3e1c0561d051e2dd80d77bf667ee73e5c655034311ac3cc87ee6ae14431720000000598b78fba199af7fb254348d946cb3cfe17e4e547166c2c1225197575aee9c2e400000001b611810ec5bd50bb0dc7142f8032ec2e437c0179fd6f5f96413a3ac295015153eeae17f9f84e1d1a24baac43db0caef29fbbb5a131f3a5aadbabe0fd665cdc3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431060209" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2336 2172 iexplore.exe 30 PID 2172 wrote to memory of 2336 2172 iexplore.exe 30 PID 2172 wrote to memory of 2336 2172 iexplore.exe 30 PID 2172 wrote to memory of 2336 2172 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c8116cb675ad968c8c1ad9abe09c3fc8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545f03a97e4e12414093aa157f2f4b807
SHA10fda24c3788e9cada9c5bdbf6299143bacbeaba5
SHA256e4e4a41eff5037af6af4f471b71f01a9e052d06c312932e77d37f6796cd46090
SHA512dbc2cea02870c05263a39751576abee05a639221b2cf69494e045d2473557d05e340b5c21e7af8ccfe10db134bce3db310e72108d05f815b1667572619a469cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7e893e3dcc502f72b7c6a96445e180f
SHA10dd8e16f8f784952c556e092cde72a4ba2a23caf
SHA256aab11d40554b3a0c6536389d8332da42ee107443f9bc233427c7d4dd9271059a
SHA512ecd375522ba167b8b3d6a4026f30cabc00102ca1a4e95db3172560c72e2ca19348aa00fa72cd00127b1cefce61c1388135ecc5f288f66f6f49142f995d509aa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f4af86de0070a9253b6e12b8068156e
SHA1110d03a517c39300651e13738738e04e17521c63
SHA2562365b1833ed420634ade5933ce1bce52c719946d00f1a512ba3ea24709ed65fb
SHA512305b223923c9b520ac03d39ad0e92bb16ec9d854112e2935afeecb870bf004e1905ff810fab87bf9dd227e9e8e72ec7627aadd7bcae60a759dc1c401a60d0d1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569b2b020db1fefcee05306f283436126
SHA1d321c1cf1d0a3bd4d90b7372e4c37ca46facd8d9
SHA256a690540e578e83d1a1ffae67147de4038ef98e11cfa588267fd7b931b804ed94
SHA51266f37ce05009d0386402df89ed02cce580e395411eca7fef08daac081761b1d31145e9a2a6175b6ca7a664c8c4851f1769e0c10bbe86ac3356bf57d11ada2412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc949627a41d1b48c8cb7ff37054499b
SHA14ad8f8cafa239da986571f579dbedf9dd83da025
SHA256061d9db708659ada06066c767bdedbd2e3afe32ed881b86557c610475bc34796
SHA5128ebae90bdf75e3bc148f29492221cec42d7f8cc141161e82411e42debb4d3653d3ce44c9f31d3376b199e01a66bb7272384fb918bd2bad03cc2378795f942079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5532956f0e39b3e5704fe5efce5dbca56
SHA154db73559d4e38dd15cf04ecb56022cf5ff065c7
SHA2565654e1213ff751304381bd2efa8c51a708e63c7a59f2dc0e16da73956b523659
SHA512cec65266f589851b55748708fe42a2c45ad78f777f2bb572d6c55945291eddcc389b04126353f01784d02976a5e92ef23af9dc431a30f13f9331cadfa89e4e0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0290ad82750461658b9a429cb26ca39
SHA13147aad5ea7627609c934636c55956174e702907
SHA25633d59580874ad028346fb277661c80267a0412ed52e79b78598a907234715e51
SHA51223ee220d82f8448d7b0eb705b215a1781214dabdde3517f3d6f5145d6a7ac4b3cff4f49b4c65b3ec724b8e1e61922d4e92c256d4350464825a1d967bae69fe35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5484382a403aa863871f1ee94e7933a57
SHA1da5b85c93ed8ad2f57744aec4d345e6fb6de031c
SHA2560d3e82e132b78c8a176dbebbce62343913f917aa0eeb588e6214c1324556d93c
SHA5127fc1ec0019b80e19070fc6972e0afaec086b7cf5c8e720a55a581bbaad7c16af905a08ba6fa9d0d4effc53de14de8b07e9ea459d11805f8975a5d5c352f2bd34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57baff413d770515865d1b425bfb015dc
SHA1edfdf1c842f65f7eea650aab0c2b95e9a37695ba
SHA256f3c17afa6ed6edcab65649b7e7e387e5be564c7db1e29cea43f090e539d1c717
SHA51264daf6be41f44dad09d3a9bf1807f88ba9bf6e5fb8e42ec8bd41d1c9408e2c1ac5e0419d86e71fcc64e923ff53afb676bbbae7d7ec5d5d1648a296e055b7e28b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ebd36f022421f347f1eb60be9c029d4
SHA183dd1da49ee9bfd3ffbabfa293b13ff4a1cf3e48
SHA25632d06208f2163c9e9fdeafd5910cc727754b3461560640a4b8ad76df93392650
SHA512842c46b87f24fdf0c92bb16bfcebc06142fb52161984026706d85f36ff0c04452733a7725cb692182f505b13d442308fcb2f3ec6727a13b7ac30b0953be0df83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556ea013c73169579d5d703fbb6e2e5ac
SHA120514ed92371a96f3ff3d7273d234da6f3319abe
SHA2568aea5397e1a7e0a8e2609148eb39ef404de2bd704fd609ca9a3de9e484b439be
SHA5127ebda30904790ef0e3f0e8da634f1ecd5515b25e203f7b4d0ff22b9700743d134e5b578efefc03d74489e40ad798a39c283e946613adc4410cd5f529aa0b665e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2996931902d84025b53cba45199418a
SHA16bc2218f95403cdeb03a7646a2d23ad5afc962f1
SHA25618403c5fc8c276504da01fd1dcc02ac69f55590856fbbb67aee0384c5e91b573
SHA512c1f50dffb65aa8a456aa1a3c48810622f19696e45afad3c6e06cdb11978a517f7962c7b5ca7864b5323b61fb6bb6bf41d109cf6a539eba84ff7dcdef65301993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d3d7c66dff865bd6264b6c72edcb9b2
SHA1c5c0cc09df0f5ec8c199dd8738b759b4f4d2166c
SHA25638af7c8400efef8d3ede2ad66beb19883f747c483d819f95696f624671b07493
SHA5123d00c5a200c8c3efe97e0035cf116becde81c8c2495d26dd617e108439f6adb57ca82e30bb31ef610626c0d70a31a975c75b4556ca0cf98eccd5bd3b572458d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58277190543dfc513df25a152114e2e1b
SHA1de1baed7cf6e15330951071e1735bf3688d1031a
SHA256945694c3b65f9f210efe1d6b7d216b00c01ac33bd25fac36ebd4204bd08574c8
SHA512c7fe41bdf1a49632ed9f0c57adeeb33c188ae74ab7a586949c3861ff28776e5765059d9bffc67977a53258e52b36163e86339de105728ff3ee5f0d57df7adf57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a979183be3e37d21a3646991dd922ac
SHA13689edcb7f70333d0afa7c553b97c514352f1d6e
SHA256fe0bdde1da27001d8ed50d16b9c256358badd5ca1a0a1ccb83df5f94ff42d7f2
SHA51283872742395c98103ae220383a20db78cf35c0a8517bddb0b02539ab156588cc979205e7916e02344421519be01426d274daa7e61d5fc2587f051e84f47113c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550143b9ed9170b02cecd836b5e892fee
SHA1bf4f5ff388d5354a0b663f8237306aa676d0b137
SHA25673c272e5878e03d3249179f74b607f78ac6bd5b93ba821e75ae014915ba1f3dc
SHA512e64568db0f639ef963a18167ef4851652c23cff5b1020d3104c10f457523efe4a985a34b4e37a35ab059deb7e3e5d72e0423b09937f72b0707ff493aabbbb4d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561a7747bf4beebbdbca97b64b7b80f1a
SHA1cc4b24ce136483edba2c997407b5f4b3757b6557
SHA2567caf8b270b133c923921205521b466c93cb0e958edb315bdad69a4c038999f18
SHA51223281cad89aa0e473bed54617452b76b945d0751b70f42f0539940c41a2afca7dca46931855b54f9a062cbf65e1f220ea9f864a07a5be1d2a06956ead39021d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572eaa2dadd59b20cec528ce5dce8a7e6
SHA1c238ae6ef1ef553c31babf71f9f62fe1a0e1be67
SHA256256dd852163598ed7710fa5b4aae9bf8e0057bec59eebd8a13a229682c27da9e
SHA51206a823f939a7cbf17f4ad78aa052c2289079833cccf7d2cc7d5b925f890d161cb613fa9f18f993278d4986ba1dfd3051ac6e8f9374f61d94f87d29e33890d0df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d9240a9fc1ef8e3180219b5a4cd1f7c
SHA12141fa97ef452b084f7e841fbc043897a5df73e4
SHA2565051e5fadfff74f97040307b38e74bf8098f9cca55c9fe1d3d8cb397f3fb9e87
SHA51274885032e20875930cc3e71c96a16b73587ab919b15fcb9ee2af8ebf36216ca0bfb4fefa6c11b7cb3f77eb6e3799c3b04432e1f9fe1e8e5e0249f34706ca4e21
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b