Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 04:34
Static task
static1
Behavioral task
behavioral1
Sample
c83a7d7d5714e488c2d382d2f442be46_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c83a7d7d5714e488c2d382d2f442be46_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c83a7d7d5714e488c2d382d2f442be46_JaffaCakes118.html
-
Size
8KB
-
MD5
c83a7d7d5714e488c2d382d2f442be46
-
SHA1
2db2d0429f91f4b8f63e84a79082dfd29fe95e69
-
SHA256
8a7bf81ad46f8775b759483f20a46ef67434747d31d74c67cb6caf5f49bfc694
-
SHA512
b6e29659796799d0d2b60c5b1c2e2b19faf6e42a628ccf90c9b3c91dbc71d16b98f30dd831dd9893794829d930e4368e0887527c3b6b58d1bd46f4a29e5b9d14
-
SSDEEP
192:LOFOFBRpXP0xa6eqiXiLPEuJrBCrNblfUBsUXh1z0eu10jEuIOkf2tuAXCe2i0mR:qkFB9kcuJr0rZ0ipuZD8dpe1XusLWY//
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000d97602300abebff10b90b9c5ad0b51bc4db152055bc417a0b47ea33e1801c140000000000e8000000002000020000000837d44c18645b6d7eeebbbef0a5feae9b9bce767dac4ab78839b2dc65e04efb320000000ff91879bfb273a54ac0614c59d950452d8a78323c1158874262ca57aeef403f640000000748c3a491c4288cbdf202a87a62e689d51ca4327284467c930d33084ae8725da25982f68aa959f6accd2b0703045eab5455be74b6691b061d44b8f73a89f46c4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90a92ee0ccf9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431067961" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{09B71B81-65C0-11EF-8995-CA26F3F7E98A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2524 iexplore.exe 2524 iexplore.exe 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE 1940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 1940 2524 iexplore.exe 30 PID 2524 wrote to memory of 1940 2524 iexplore.exe 30 PID 2524 wrote to memory of 1940 2524 iexplore.exe 30 PID 2524 wrote to memory of 1940 2524 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c83a7d7d5714e488c2d382d2f442be46_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc2dbd886faf955ee3ce71b591852390
SHA1bd6f8ead8c183c5b33caf0ac72ad5d010454a7c7
SHA25639cfcb8175b0174093b4a6f1bd9a7749399b294a0514817ab5569c341c3bd429
SHA512fc74da397940f9b1a8b7928937f6ebd159e84d184fca4d85d1ffc97961f1a067bab964f332ba20c1f6033b73afccc1a9578c24fe068a79fb0167877de972c4c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5280fc3304a31a02a75b83a0843223d11
SHA17fd23168d8e4742bb145cb59ab6bbe98936e56ce
SHA256da9af26577b7dffec7b5e891e4713eb3809ef70c7775683dce5eaab5245127f6
SHA512f7c85663bbcebbb6f9d83e19942850c98034e5741ecf37a3ee1d6653f41f04b8382607a1fa22b8fc29d59b029e7349f73cf02f7ce8dbba45de3f8a811002c715
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c5828a6f77c77397540fe0edddfe180
SHA1ed3d3f562856b5f3762624c63c3292c70948789d
SHA25679c5e440314804b61985df74dc8a40895c2a7000a4b9b0d0579fb9d319c25879
SHA5123fc70b1d0978f34a6a791d10aa330233b76098dd2f17591445a9093d12b80ebec356976875989f3d1855cb84ce249a18f11c8396a6b2aba4c953e2957491c7b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5095c5b09e403a69cb74505b6dc0e0075
SHA1b63dca8d13a7c92d3171067c33ba2423e88c0922
SHA256b22c2a8085b2606b4bc9ce41a260572e7707e75df082c546a7c2741a8ef2c458
SHA5126a86094efdf10cd8a402e05c7e8fceeac3d4e8b79c45dbc5fe66c77708212abb9b88dcc9c00d66bdb0c24ad559d5f08413ecbc3f1c790eeddd14304f60f0bd04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa0ed72afd94754cbb77fa1961b91d0d
SHA1f5357c9023f62e5787e22e41c3b4cff6adafa7e0
SHA2562835ddf43e57d38886a862b4c70625f8d23db894cc6808b27b25d208c0829694
SHA512d01c08ca9fa1d7cc49e79f514ae080e3a860d4278cb0c5fb44464d94b93fac9e5ab40e682cc5fd38e9f89c2724a173be7bce53039da9ffb033d48d3593307e4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f3637a32e417c3178a79cf678602ce8
SHA1cb8dda81c800a76923cc613f49363a07965391ba
SHA25675682b52e347be309ec4035b525219bcef5ca270a7a63162b4f084afe4876448
SHA5120af45d71130e47e413b0b91821ca2b149cbfcb3ca0afebc3cb94afdee8970c2c50eed61fc95f39a8ad9475d1a0ed1f4a8ca931c98754372124e119a332cee802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51497ed99610b2e1b93e492450ce702bb
SHA1fde5e61ee1b990c4c2aa3f6996b087ed21e69297
SHA2562e2cb7f266d171f6a9ee051ad452ed0d57b55c7834b03335e59746bae49fd1f0
SHA512556a0b621b8f8898cf9d0fb9eb4721e615f380dfd63fa5fdbd3b96589af70f4466bab7ef1f724ca254520f750bf0fdd736059477851b4cc2d6a4d742cfdb4da4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc3aaeace7c34f86e050494d0cf5803d
SHA10d0b1b60c455251b3e7d80b3c44a5139914139b4
SHA25673d71e7ee5795afbc9a2cd58b2670247613d49d157334a26f1f6d098f0b28804
SHA512349c7ea0af58ca9c31334369c79605c3aed7db91bdbbf8745b7aabc800c9b3103355672ba168784f04df8b65ed7a2ea4c74e51bc4f582ff68e46b2f5c19adc41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5769d8a715bcceccc66519eb7636941d2
SHA15e4f2c95fa106a2d3d40df14bf7cdde4302f8230
SHA256da4297979719e3b9c5ebeee51e0ce277c4aa6014c8531fe60461a692f0f1794c
SHA512f25ba7ded587886d5418f46b4edac11441fb980625ddfe377e4354d3c81e4db371ac206f9aea7a06d5d01c8874fe68908fcbac0d9d1c312e6c41072fb841ffcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520473f92b550a6d5b539595fd20c7d79
SHA17d3336b9989c5867f1a85087f75d096303261932
SHA256ab145b666af3409ce89b819f359b167b6936b5932d636fc5c1c336fc5f410b4e
SHA512802988a52b1f87fbf8116a6b2b74e89a76a137d5b04136fb25583a412cb6410e6265dad88bda947d0dbcad4e054d9cffeaa086b4845e6e6fbc57cd533294932f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c717dd919b5b4b413f583f9e39f8429
SHA15fdfb16f2c0ba4f8f67ef2a5557537293862c689
SHA2567c9088a693426aaae4f8c5eab5c31c73a36b7fa33dc224372a2401ff3424477a
SHA512f28241e6a36a7b144377a13969aaa3a59bd0fd8a5f7c106e21e6671f98cf6d0adfed9ec4f24bb805e337942d9ffe3f7b7f7378321328be4fdf8adcc50e22e8ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5578c8ca41c049d2a06147622581e637d
SHA1dd6b091e6e6878a0ad67708e0ce112e019e460dc
SHA2566a8ccccda80111a8850d92c7dacad37456de962dfeda8bc39d8767ae75aa5866
SHA51288da9cbaa6002300ceaafccb6f9b44c5aa24ae2019bda13d28305e3886fec5e2aa3e51fb2bec1a8db1e3e31cf36035502c7aaccec66e7a1cb1effbf2667c5660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dbc011af93056d6721c8b17d5d4461b
SHA100c71037167b262323158c2f3d9a329a71eb3b90
SHA25676bdd72e618ddd10bd1ebe52e775c44c7aa448cd11613d5aecd465b41ed13424
SHA51270464555982c223d919c69f95698d9ec5fa18db118a2c4f27369361d485cfca516705c570f1f9752be3aec5b48c3c30731a4284981e9d9f868eb2672161452ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576cd4b7ffe74ee3bc78ae82b4038d915
SHA1d755cb0832fd13b7d967ec8b57f524392e684ddc
SHA256839d4df449f5103f1f21fb89df3b136180382b9ed377cc740b5f80b2804a82ea
SHA51210835dff71409d7269e9259512fa9b8880af7679a390d87e293f193b264440e12dbc6f08aa3b80e62edbe9addef49911b706461b4793d97d4cce8790a695477c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ec020eebfb45ca4371c337b235b6646
SHA1cfd1ad230f5e86aa9d7f0b0249ec1ac19f8057b8
SHA2563092f263f5a8cb46eba404f718f17f70cca690aa42efe86c474adcdd0376a3f0
SHA512f5dc400583bd3861ba1f779b1da20e44b5350f0fbf6f692842aa121bf0398f66271f2869dc4160aa7c5d9dcf31922a8e2eb5cd4dac335e35e61508f02a890581
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52642a7c1b68892363e8bb5283048d028
SHA11eb4b5db6a648f818b90d7283d11106f1b94d772
SHA256f26aa8c20d7b242b7b87eaf589d34db364d82c4e2f6ade0eacaae0607ce6d9a2
SHA5127764c61aec07cddb20dde13f570cbe865cfaba21b8062a2e230eee0c3c961d26fb884a4bff04a65721db0b13a21545a11dbeacfeea15844e2f8dd154352faf82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559ba497a78ae499002227cd4a0595817
SHA1b9286ae1c4e5c631585bfc57e88e7ec5a7c16926
SHA256067ef716827c28851b521b51761baa997b76b71d953080428124146c0770b498
SHA5120891d854788799100efcc57e52df064dc987021eb888580cdf1f922cc47e0a27093ea254cd615033dd2a1bb13b3bdaa7201be6cb055c8b14caa0a91605bc433c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5998d9fbecebb1680e5226e020cadee4e
SHA157010cfdb4fc0b3a9894012787413134d23ea746
SHA256274bd75a1627ed8d2d3519b802921a66c705b75aa27a486f99b062b693b98dd8
SHA5124ec0f93941e0670cfcc8eb8e9a2e5b857d89de3c4db4dc8a82fb2042bb5d665479ec0c8e2dc505cfbfbce6ab702e71efbeefdaff7e95bcadb6fe28133bacfcba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591bf3f37d2fb07ad4b6fe7bd67586b88
SHA12df9cfae19d127f81e2193cdb7d27f06aa6d945b
SHA25679fb66231f77fb4b599a1df3ac1038956d2a4ec1d98818ce490cfa771939bc52
SHA512d3f4f23dc9e0c148103309a05bd66eac83bea5deca76f84a84fe7f872c2114533932b631f1a5a0b8406d1ea400d2ab3a5edec0ea6c91acac3f6fd9befcdfeb42
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b