Analysis
-
max time kernel
68s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 02:52
Static task
static1
Behavioral task
behavioral1
Sample
c81b75bd44d31f128228e7c2654181d7_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c81b75bd44d31f128228e7c2654181d7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c81b75bd44d31f128228e7c2654181d7_JaffaCakes118.html
-
Size
461KB
-
MD5
c81b75bd44d31f128228e7c2654181d7
-
SHA1
744754101448d43db876b855d0828b3fde0a5ab8
-
SHA256
feaf6bd65b0ca44eb8e00038a0105c105dedded804efdd96c7d53a44fe3861d6
-
SHA512
e7eeb0dab1801c8059962aad272f4d92b0449c3fae71f76aec45e8a4e69e4b22769c2c26e265a6bab9c8b90d78a11dac1f56ee1083e61fc4d8b3978f694aeb43
-
SSDEEP
6144:SzsMYod+X3oI+YEysMYod+X3oI+Y6sMYod+X3oI+YLsMYod+X3oI+YQ:W5d+X3r5d+X3q5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D05C2FF1-65B1-11EF-920C-D692ACB8436A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000001fb9d5ec3128f9dcbb75df585090f585217cd0ce035ea614eeff59ce5a3e9755000000000e80000000020000200000008608af022c8c6747c502d398d989f796ff83d372961ac90fa189090409de79482000000027f0c4dc8a9dabb2b7a5e5d8b0f10f0add91827568dfb37f5df7ef2c7dfda82640000000a2ea70a3e0c88348d804426ac6a5c4a0f573ce9c3d2a239751c9c96cc481e209292734ce710dcb21f580e57200e46cb57f9dd4656aca0fc12014cc731c80c830 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 707815a9bef9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431061854" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2540 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2540 iexplore.exe 2540 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2696 2540 iexplore.exe 29 PID 2540 wrote to memory of 2696 2540 iexplore.exe 29 PID 2540 wrote to memory of 2696 2540 iexplore.exe 29 PID 2540 wrote to memory of 2696 2540 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c81b75bd44d31f128228e7c2654181d7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1ed3b5deab99b752a086fe7e24611a3
SHA1fc425719b1e924f5ae207f87692a3fb2928ae9bb
SHA2566e5c90bbcc65e93dacced2c60859ab684bfd59c2dd0935e7574c758c97ad5792
SHA5121f7304aa872cd1e3d430e68f15dba0171538548b6567303e36d7e9e330b58385dc8ce8186d8c8f124aaa5c736f9ebaedc9a255c6d8078e34558290a2acce7e57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5530d2d4b61581c5cd1c0784cbbd857ea
SHA111c44018f99243af86302db7afb59c801de65689
SHA256062b8cfffb8c037b2aaac1912cb30a333ddcd7ec784f42dad19ed1a16cc7200d
SHA51272736d2c1b45d14ae2d46cacaec01f51645cdd22fff0ed1c006fcce3e11cbee88bf52cf2bf91e7f8f5039614ed72696460d7ae63c4b5e62373a72f621b2a9b13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59599e29609ccec56012d40b067cc0899
SHA1e0dcb839915e25fce801b7ceea98a78f1a3b3792
SHA256bdb4b0c48e4dfd00cef819fa064f916b9436ce4f94f328fdcd9069878ec3a90e
SHA5125acada4e82e9562cc85986f3a9e50f9f7621a08a494735144cd997e5c4850a6f1ce371f7235aac989e4444dfd1424489a8e02d551f34fee833fce2cb1bf9a55b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521d2e94eb49091531afc3786ec93d1ed
SHA1587c6e57f2e2d31462bd6438b3ae2937e918dfe2
SHA2565621744d734a219f31fbf5ba4575be3164ae432c205c80419e6b044874592924
SHA512acf9825fcd8c7349f64cdbad740a9139f3324d766a93288317ea4fc85d4614874dfc7326bbe402fe0e00bafa1a473faaaaa1da46f540d79a1f7c7ea6104cb05b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b272e425319a028fe79d981fc5960e98
SHA12f9bccc7182b838764bba6cd25f6f6e661920e1a
SHA256efef09f75f3bb1ca4b14d682ecd2b29dd7bdb762689b11a8a8c0f0de93f34daf
SHA512bd4388d6a8294e3bc4b3eaf9a0d1c3110db5d7993d83563a7c352cb0f3d55be344500902a2aca08d51cceebe1d28c05e5dff19d016af37ad3616b71c6867be08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57405d85ef824feb2b11660a21b92c126
SHA167054757786c5045765b481e33c6db94fefaf87c
SHA256a0abf0becf7d761b2b1ba6c0810f5d2d32639d0fabe98c20555a940d3350a98e
SHA5123e89f8fa2c0ea347d3ac39e9457ea7e3c912539f23cd512c0cf832bd7a4c7cbf08ee75fab667fff897515ed7d0acd10ae87cf59129e866615e9dc77e9c62306d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50af1fe51a23e191153623cd9e9535bf4
SHA1febf6e3261ec2b06742323ebca9ad1e72583a34e
SHA25644b63044694f8cbfbee586352591fc4aa8988f75f396515cac221dfcf2e8590a
SHA5128348503dbbc2c7f6474b75599b244207c9e5a7f68548b3ec571966e6e47e2d60b97f1d26ece40999acd92804e7e317638d1f2919b7ec4e41d4feb2723cbdc9cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d98c73db708053196307cd51cbb4db92
SHA1f54670531f35849b5bbaba9665b31919a85583c9
SHA2563e437c1f8252fc239b0a1622c35cb396eceb44bf2d6140616005a2e74197cc60
SHA512e529b92f7b3171fb7dae9f907739ef0e833e25b4067557a100a1da3c41856547ead34308f371e764658d3e95d1422a7d286716bfe212da54e8c1e37deed1a645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1bf9647c01715bad3c931c64cb8fbd9
SHA10ecee1eb95a20ac9bec210d970ff0fdaf1d82899
SHA2568cdaea6ca4bd39eb09048113cb9dff4dbd5fe6723c4f15dda8f34e222e15a546
SHA512686bc4d006e4b6792ddd9aec8649959a4a726643663ae461d315534b0a9db3b6ea1af02574f0f92a21ee9340d523c8c262aef28c71e9b71a3e9a841b89d2978d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565a9d3daf215b3da61bdb63d1cbc24d9
SHA132c97c4f885b9cf2cb959d1f20504a406461caf7
SHA2560cfa23cfce668a470333df2640025fb1ddaf94efe4b3b3ddaf63e7d9ad505e64
SHA512fae69d89fd06eb2ff2ab6322dd67594fd6f8bd7ca33bba26f4902d6722b4fb64dfc0299d7c1d047635eb32e3e78c952553edb05c1defc21e149fcd0de0947b64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a71402ba491353b1d2f02215437f9c18
SHA1644f4c90a715137a5ca6a3fc1c4bb71257e64332
SHA2563073ca5a71f6ac6d43f200435163edcf84cd4b65c8bfe17f3d21e8834431f7fe
SHA51289867084bb4a28905b6ca83fb79c768f8718235a73df3e475b266e8b9b98c4d2046d169762920fce4aa9cd2ac846e0d6db613847471c659e45319b8d41737300
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5105abe02aae3f2cab560fa51c80ad8
SHA190f00aa9e1673fa0726fbf0b976087ba26dd79fc
SHA2562e44d2850d16b2b1769c785cfd7a3a1a755d442de579ccc1ec4fddfc18b4e84b
SHA512731449ea84a936b94307ef7277646324ab37566c8174e56bf00f66cb27fb206a0f77d0898281956629a145655b0fc6037172b7c406512284911409a5dd912c0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510b625f75f0a76754738ad393be76c7e
SHA18f54a1c5a744dd7a54e5bb0e8d9753fcb629fcee
SHA25681fd0d9661c9b2447efbb563083eaac56360158085b0062039d8687175cb20c9
SHA512fdb5bc64a99ebf3065d4c72beced71014f5948bd9c494dcee333c433ed46ad6ba28b5d8af81129804fa12e166c60ad11ba63aa5b41661144bd9213730fde22df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c80f7f037238476f10b6bbd28f62f47
SHA19ce57ce742999c93ff473478f6ce78dcd281f53c
SHA2561395ca4dca56ac2a9967ea5217e7a1304a1cc7dadeb3cf965b652d16673f87fa
SHA512bc5d0527a9c2260664122103dad2b985d9fbd1de9cf0829958365335c94afe33d59cc3314962a93f2c6965826a510121981500c68194118a5d56e007c25adb7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8db6f867a4beeee69090c6fbb18b310
SHA1c60d8b70032b5a970fcb7b1009adc1bb96ff72ea
SHA2566222d0757850c52466f1f55e94c0758a0aff73900957ab359d3a38b4b0724cca
SHA512d38d8319e1c2d4c1fc00b6e9a5516f99082fa9a029c57a642b64c608a11f20d163da2b6e248b0db41882e4400dff78f8c8ec9ef5e61d79db1f9b29c89a7ceab0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5918823954bfe46debc33f6cc4cc3cd7e
SHA11464b9fc0cab92b251d78eeead7fd05cc70a76c2
SHA25663ee51c4cb257b012f684342f39ff3926a660cbfc3eca9c42dc0df57e660b7ce
SHA5129a53b19c69d7cdd8beb9da34304d173b2a3552b1dca18d65889f585d7e058bf7bf076d7c62f75af0694ec632d1b09d067aa9c3fbc9474e024c63ba7a87c195bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fb7059536f8e7fff7d62f0480304d27
SHA1830aa70c790339c93435ef6ab702bdc2814c9bb3
SHA2560bf7b115a4ad8ec41e62ea600c8062e13413fa1da94e570d3b2cf524df23f833
SHA512277fb25057cdfabb677a9d6549c145b93aa0fb20e52b421324dc41adaa73a79e944bbdc34034c8fa0f99e654560f786a2444733b2b69c9dc8fd89b2ecc3914a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50058756f85fb0178eb5794f773535028
SHA169d776775fc8d22ee41c1d968604b9cbb9d320c7
SHA25610346d1b1e9ef94d1d5659dbbabf1a85efdbe811ff3429fc10f38a2a90a5121e
SHA51290f4f2ffbb6bb04c119214b6b149846ced32505fbd670373ade50ab79ca9b585741396b6fee7ef6ba25c597b4c2df1307668a01f978a89410dbfb0dab96ce35d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b