Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 02:28
Static task
static1
Behavioral task
behavioral1
Sample
c8129ab348c3755586fd2b9bb76aba9f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c8129ab348c3755586fd2b9bb76aba9f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c8129ab348c3755586fd2b9bb76aba9f_JaffaCakes118.html
-
Size
6KB
-
MD5
c8129ab348c3755586fd2b9bb76aba9f
-
SHA1
c29f2a8467e1d808e84169e0267455fa59543c82
-
SHA256
1d01eb5d3b7aeba08dbe5b1e85602152475d1de2ac7c24d202a0e3333ffdcb25
-
SHA512
acf66493095e525fa3edff592b7de68e35d82325abb1331cdcfb354029dcfb26944b1255ba435d07c3980d77d9e887af2f6832b5ddb48ec07c3970a2c1ede20e
-
SSDEEP
96:QhM3sHfkDNlprcZSkIfFgGGuWhWJQYcpg/:QhM328NgJI9gGGuWoH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0463435bbf9da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431060377" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{60ACB1A1-65AE-11EF-A7C8-6EB28AAB65BF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000f8dc27e0de88be12ad04757ea7bd1ef09eac7f9fdd0d0a1b1e2f1aa1fe2af028000000000e800000000200002000000042a81738904980da9f775bba539058303ec5b62eb141ccd66822fbbc9e4d3d28200000006a7bc3d59e8b10b780a4e0dde7ae0b8a415f2901ae41084aa29200718ee9360640000000a5ba7b0475b8542acf647c357b84e8479ef89754d798d17ec936e5af9e6488478e54b42e773a13585afbaa875bc8b14b52047d434e349ac16e7f0768e338f29c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1452 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1452 iexplore.exe 1452 iexplore.exe 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1452 wrote to memory of 2388 1452 iexplore.exe 30 PID 1452 wrote to memory of 2388 1452 iexplore.exe 30 PID 1452 wrote to memory of 2388 1452 iexplore.exe 30 PID 1452 wrote to memory of 2388 1452 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c8129ab348c3755586fd2b9bb76aba9f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1452 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55591be2aa9c0aa180bd97664c07afdbd
SHA17683b03d415c5e63689388e0c1716878ebacc3c3
SHA256d68fa9991cc5ccd5514b42679961719597352fb87b99d9e1250a388e424a20ed
SHA512241e773fe2188e96999f82e913e91d60bda7991f18093850aaef6517e67397621f6d6912b3d4dbe33643d8bf67bdcc835080154acb241c5016e9199a7bd05974
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542120cde6bb492a2900023120188c62d
SHA1704d5e01546f8e13649c9c0e15da8c044df0f9c0
SHA2565c2d98dce9c843b5a5be22a45ec2fb9bca55648ff1f24c39751876372b3e84ea
SHA5129c7c7e49c75d3efae5cafd8db0f8eaf27127e73fdb4df97f23ebe5836bae00f69d771005137796860350144881cbfeeb5bf22e55cf0e1282f8c5b3eec9de2490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501efc59498529aaacbb05780b78504a5
SHA134153c436f5821e2cf66b0d94de4cccbc2cbe56e
SHA256df7165ad864daab09ad361a1ab006ed6b9d307de3e2f8795e06157e7788b37a8
SHA5125cc7aaa4f3420d9888c11746ede8d05e1b71cdcc7222ea4d6c9394aecdce7f9ed38cdf8f05f4caadcde525bdd22a52e2a3ccd0eb85f0e92e403bc8fa1b50ca8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581cce15ab288cc067ee5f021fae403de
SHA1296bc5bc803222cf9d2393a6594e5a39a33c19f1
SHA256f16374723f3a736965ca13b309f0be0e02c7fe68d5261d4f4d019009a9c4dac6
SHA5122df2e7a233e601580b53f2b7528c798cadb15f9148b4d465e3aee22ba3c4235f51f980b111b0adfc9286cf2a063b06292603bd185988cdd4b99243cb2b564c5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eec89e449cbd26a225c88d73d5a73d0
SHA101094963d7ae995bc30ee6ba6d05dfa6388c94a0
SHA256be1a6a9927da4a01d4a6106ec0d527a57cbfc4feebfbd12b8306b3edc256e2dc
SHA512c3ad0db5a5efcb7c52415e7936ebcb86d05a4dcd90cc579b23faef95ebd6e3b6ccbe3b22e642fc3953105442885d6799e1fcfc0a5c1f57acddddbca9b94b97ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5627b57dfbedf46df1b691c467e079e3f
SHA1289f559711e3c023a5353b30587dfe5a889d278b
SHA256d7c2068e7aa9f2ff2d373731c213627365ef69829adb393e5e625073b754151c
SHA512726f8ec1d8ff493c29223a2ea2e3907a790282f6d6a511f52f1ed135bdb49bb5b1e16f38094bca36a0ce97468c5f54cdc5dae70fc7d97f30417f5a8982b5b922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520e3db91b483e6153cda7695b88b4751
SHA1b567fa3d4074399050061a7257d6d6c0e540920e
SHA256a4fda78471957c1eaff8f2b3d82d6e9c16d7bb5a458ad04732c5cc809508b563
SHA51213851a97c05d400a0fdcef4e1a91b02b2c14cad21aaaefcec859176780e52ed94faef05250099082372dc0f8467c5493271f49b01cbaf5384e8308a913da3b2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbc07d0a89c934cd768379fcc7e0256f
SHA15ecd337917f5602aa891e1057ad2dbc6bb8254d8
SHA2566517d654212fdd948ae4cf6ed4c0543fec1529b920104480bd3365dc170b3e0d
SHA5123c354a1ae4bbc5ed535fa3efca93d78eca35997e03474851724b2f044c0dfa781576b3166ef3e0de83108827dd1ac32dc0ca6e99c1b5bbd6a773731dff945a2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52efdd49f7dddde99d555f27a76d135b0
SHA1f4f136343f0e2760101e88835acc0fc503aafcbc
SHA2562500e4e58cd6100a87092fd25b809b2c016522f43167d93c054ab530dcc9625b
SHA512f731527ca3bab48898a50ace959c1c18b8457eb2c8a3d6f1e70ea7808bdc63d7663bc965af6c8c9720fb91bf6b02af2a14c14f55b8a14baa99747e33b4ba5a63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e4a739e4fc5b3646f3eaebc0193ab9e
SHA11793d73bbec387deb273b654354a423d367097de
SHA256465c39a2d970bf471bdf48188586fdc274983d8301badbde42ce8b6e693e76b5
SHA5128022db45078807df53a75a97585b5a5d2d28f4e2106e56438f4f03001d2a34d5e4689855910e2854f42a4c3155af720bcd89c8f035d098991f1917ec476fc64c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558848009b07ab35c87337c67ed755f05
SHA105a3828ca7f544a120a5277c9062169fcab1ed6d
SHA256d3220183425489400e60e9c4fe09bd75649ca68900d194ffdf7acac45415d6f5
SHA51230fdee49f072a185d6e5a8c7300fabbcdf5dab98b4dca0fa116e50c24b551893a70e6aec14a25b1f75018ac18a671e1f3dca2a158c658ae2b5f0d231e066c8e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7feccb78d53a68ddd8c04fec2243ed1
SHA11838d3cb208d9d6a28bf443a7ec4d941872e2815
SHA2564b04d18c5f8c0433ff0215e7c4ac469ca5446b2b7ab1241783cf7e7cd850aa73
SHA51208516b8962e67c29369b03b815530bd5685c606384ff25ea96f69c466e35f2692cd489a86080962beb5ee796e3d18ec3af9cb54d0772615bc9a012dab157733d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5375a7beb9dc24c7c2eb698cd1af638ac
SHA1464bb21f6cbc031707226fd255f100d3e042a3de
SHA256a0b9461c00b4c9d44fa034ce1cc0fd6af0e98833a3d865ae56aa92f315d1ad9f
SHA5122d5af1c94103b2a5304a8d19a43f6aa1f3f1b66ea5dac5ca84c0369d0b56290d0d5dad3d3b79508e1b37a18c326bd341c067f9111984d8026a6d6c6a55b152eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5201b9dcfca48b6c089b04afdb2fd1ead
SHA18d04b55304f644801bebcb089a6bfb4b2622b5b9
SHA2561f24ff31ae6542006403fc2cd8c4a4e7168645fe46092356d0849c97f2a7050e
SHA5122a2f0799d0e538c8656b872e008495ddde393f8bf6a82dd3d7d719ecf8dc1f534495a2150a94b859ca49706ac0d2d7213472604e9ab22e23b63e877aef219fb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5027b22a9f34c42146463d09ca1a1eacc
SHA1458ab3c8e6b4d5aa500bf031631dcd16aefbb1ab
SHA256c75712cc3e4efa41f73da991b76b4fe206ba1ca3de88dee82b0c353a52657267
SHA512609c8a32b5f652c72c1fb644ff3993a55d79d15cba00577f1c14ba58aa433f7531961bff4c9035b62127343b36996fd2d0d466250673c068746cc90a0d08dc8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffeb397a9f4517a91e1352f444591810
SHA1b9372af755aa2e62cfcd00af3efd785fb8626315
SHA256c702bc83bdfdee4f4f780112736a62e97e6f3ad3f439f84afa5de5e9a3ef75ff
SHA51208425ff2cffc9b685d31468be77482b40b37e728a1e85220ff1f6b9badf0fb10289c25af3d9f7e71ab2553e7a9a331714fdfb9e36866d5aa9aaeaef35969f300
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a52b263e2cab7694df8478a08952051
SHA145c8415cf163a17d53e43520e846a7f997daa391
SHA256e77c31c01d3cad35511114419dd4b69fe74b2b755723f20f07a8179846bc70d7
SHA512ddf356a174883a7f83e2af5ba7e0412371c79a4cd4543e7bc5b613f51f5aee9ab22238ad491080b5b97bf35bbae86ffb533b62601273d85aeb93e411105e3f8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7406526b728a1fcc151be076a7a7a6c
SHA1ef5cb63f2be574dcc1c4edfd1bac336e0967b21e
SHA25625340ab973eeca7414c18c9f127039fd4008eeeeed888994a6499303bbc2fd3d
SHA512697e246c5366d01e2e41049435826989e7068654eeae74e7f03564664dce68365d807fe85212459500960ddba08e5ae95c7f9e799f2d8b1cf7c98aaa10e3e8c1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b