Analysis
-
max time kernel
133s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 07:08
Static task
static1
Behavioral task
behavioral1
Sample
c868950ad62c8d2abdcce0d801b1902e_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c868950ad62c8d2abdcce0d801b1902e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c868950ad62c8d2abdcce0d801b1902e_JaffaCakes118.html
-
Size
2KB
-
MD5
c868950ad62c8d2abdcce0d801b1902e
-
SHA1
2efc0a256258258bf95f4b7be952044257de662b
-
SHA256
40d5c60e79ab6e6b9089eab47cc09b4d1c740de57ded8e5ff0ce725267627f4a
-
SHA512
35fe60f9e697e1152e3f745bb7a19b5a1bbbb980a1cba265e4ae050285d00a9e3a0febf5f7d2f4f8b9df363f6e5525f2c58109857b8c8b84cf522e2a10f58354
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000fbcff98680d44292ea0d8847e99874335ce26c26fc59518f5bbd9ae72a60c91c000000000e80000000020000200000004b48dd569da39cd324ec3bd542ba62f40139adc1b2ef29c2cb8c1aa234f597252000000049a404a996b1e4b97d6eb9acb65f5fe919caa4222eb6eb3606bc93f4f05c23c04000000055d1fae9cc747de460aa13933cc35336dd192a997b675c5e1a5a6405fa7e6b2019077edcc7e1d2832989a08f7c7f174d645a1f1705186b09fd7d710b26f5c59c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 807daa44e2f9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7000C9D1-65D5-11EF-95E0-F67F0CB12BFA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431077152" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1940 iexplore.exe 1940 iexplore.exe 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2108 1940 iexplore.exe 30 PID 1940 wrote to memory of 2108 1940 iexplore.exe 30 PID 1940 wrote to memory of 2108 1940 iexplore.exe 30 PID 1940 wrote to memory of 2108 1940 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c868950ad62c8d2abdcce0d801b1902e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1940 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8661365e7df84b6435442e3f20d8696
SHA1d0a682bda071ad2bccf4924f34167b11828b8738
SHA2562f77ce1b014c556ef0b364f3ce1df94f4260c4e921bcf7fc8325e6756466e97d
SHA512288b31b247555696d95e42612c2d776c9c44028a05d077917dce59474dc3d82e200f0b624b3dd6fb5bd19e252e92cf57730c37d2d89994933694a558aff8f757
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574ab222b6baa53d6c564ddfcd09c042e
SHA15c13630564ee3e1de0b732a414e27a992cde0911
SHA2569bbeb4dc5efb372014644f0bedf0fba6f5b7b8575eebf0628afe19dae5d38369
SHA5121848193c6eb953a3f26f7b0c3fafaf1d90e7a548e447d22742c0e923d7a3fe45ac955bbe2647919361bb142c1b26fcd669fd92c3f79f405c1b709c5b6e8d83f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bfe7bb69e91d4ffa9b53e3d94143e89
SHA1e12285db3be7e514f0c17ba257424f9018fb7f98
SHA2564edd565190cfa36dfdcd3891274389c8fb139421d2913878ccef62499eea8feb
SHA512783190a4a558a7ac2bbdcab06ee0dbc73c3b4502181e51123233d9e3a04e63ad6ae3754fbd01c366610e906c70d82212df7da48bad481a94d5109701a509a48c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5818396ac5edeb9e97b6a26079a6336ac
SHA10c75f6444b0c7cab58d6e7d6e8faaf3f78fbb959
SHA256027c572c8bb19c8f3819249c90f675db6549517cdeff8ed1993b55c1b6e9035f
SHA5121709aefbb0f3d832a0409739138866cef4c76e7201ab77fdd8fba1eed05677701f55f9826ba46cdd8571bf2d4e488264c0429f2cb0dfd60d08313d40b415de78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bdf7694f0a01be13c8d3f5a157b5e44
SHA16401d242ec6ac9698e0b53b7d9f86e59b776c2fe
SHA2568399f9f6e42f5ad31d838c65c0165d04c43665f9ed68dc36cf7c083b935e8913
SHA51249fe0768df66972156434650a1535c8725745204758a07acfdd0f9c201a9516614c1dd90f3b7ffeadb982c4a5cf449d45157c9ef133eb0c73cfecb60ddb392d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c40075f629b48bde51808d2c0c1d6f2
SHA15c167e2d4bbe8370dfcba078616fbc42197e6fe7
SHA256b60aab53fc697d1441cf655924ca072094433f977fe5867daa9141d636c06092
SHA512e344f6754f11beb58576196824dc6c24b7b84255a76aba79e9c9d69b986f59f7c86fe6254101392b1478e305d117077b9f45c1c17084af84c44413af51e515fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5321836df43652688bf4da526dd75417a
SHA1d96cf76b6d5e5872750e300a9b77348a81609d5e
SHA2561dd61d85eb4c6fe7739928a0031745a0496f29866f6aea5c970dbec244435f86
SHA512e2c1512c94a7cfc8315a424f273f1a1f89281db9d54ac03e16cf3b5e22a6152a94639b0ba4675ca07a3faeb3430c473b65951ba13ac239bcc808ecc056b4a1c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeb967b888584d862a353f3348a4a96f
SHA1c3597de8e1564e6de40282f66c40550a6073fb9c
SHA25659c47425aefda5dffa0a5b80ad4e91bfdfc963291e0be0b1658d87c337d2d919
SHA5128e39a5c5b8384e7b051f425485f88e4cc8c4c5f1f2c443dd6bb76b55514587c8dbf8dd4983475b4aa1899d9dc3d43dd07d965ff5fac7aef8fa0f6526af8e31f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57da271d3967c9c1139798f3436006cf9
SHA14f618a50b4a6c031228416f6d3ff37b408408d89
SHA2564eb4202306583273d86fd5bfa0db58a392df6df879c485bc7e0949a9e582ed41
SHA5128e64d78f4d25b70e170a54f1d80141517e5298f20c60ce748979c5a44bedf8d12bfe5e9b6d442e60b0b37a2783cd1ea97e71bd9ffcb42bbb758d6b254fe89d03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0245b90f76ce39cc68435b49bfb3e51
SHA13f0a2c214515f1864f116718e9af17b358f64518
SHA256fe5f6058e7d493d50686fbce07f4ae1cc6303e0b419d1a721a9b93b641696e6d
SHA5124bb83a1e883a59981400442f74508b78a5805c4fb077c96f09dc73abb6a54a70707e1cd3185c1903cc049cb764b50063b00212ca077d6fc4a5a2c7938ab9e79a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc6ff3d6db26c989fbb542eb975d386b
SHA16f5c9ee38aeb928580c9ab9f5325ad26a9de216f
SHA2560f7354c16e987210f82f59a3854b11c352eae3d38ef16fad8531b0f3bb1fa17a
SHA51246146e558231386269ca3b09924b0512cb987c9c37f495158be978403080819a0a66624bf4b7531d42ef2d17dacbbd5d8c7255175ec40731aa533736ae8f227e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561fe99d12920eef01a472f64c50fefbb
SHA1592c17cd1340fedc9db1af7d160db46dd411dbbe
SHA25680eca93ce8057dd013b38cfc558df75147c568ac307e4f128195606a14b5ea1b
SHA5125ccb769abefe832fa9bf34112209a18be1f79810d83491274096099003ac2c85e531e82faedf83260d361cf087e2a6e2b83824ce0a756b5dd2f38f944aff8095
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56108badaeed99efc64e4033b867b8280
SHA121dc532ff27771532649b3de7d5fa33f7804c49b
SHA256512f882fc5627d5c03a1595d608da53844b231c899cb8ed46171233630b2efa8
SHA5123f88b6d150188086dd85fa58bbae90f9b6fc5408a6f84fc246ccabf2f8bb77b5af0f5504010f92a6d1cf0a44a6efcbb47f07ec4f4c5f7b8053c488c47e2b8ca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aea27dbe8216b7570ed9cb755499176
SHA1a63c1ab9c030669e6802a4430f97937ad0b29db2
SHA256e7fc41daf9f0c221b5c92082f09ffa01e9e104e6e235fd615ad1b7d84643e123
SHA512c13cf86f696c4c0eda8da752031c3eff2705b2ed817e692bae35a371f15175336d55f4508be7c573452432767435b812f500de48bb27495cad68b42417d0ba71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1aeeb55ca13a7adac6b2a87955d98e3
SHA1840bccb010e58270cce5af4abe83ad7aec11ef36
SHA25691f0e7b5d3e8d19883b82ce84cf880eb6afe72adfecc9649bd22ecf42a4eba3e
SHA512bf67f6da396273319e85248427b274162f352ceef189c3d3c5608bc58baa414e077b59f02906892d09b30cc1aa2ae570eb902d4f807747715633659542c58805
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552037e7e12ad2c5e1b82a4cdf1724588
SHA154fda8cd217c738533d03243be35fe132d602dec
SHA25693a5f5e6ccbca7a3d0706cb4bc7be6346a6c30085a8b86a46c3399018606415b
SHA512c6d35b41a3d6df0d3ab13caa9a77d948111a267ab38cb8bbaee222f61fd2db8430525966a1278544721c91feaa085aa130007dcad7a44cbf7116883ba86b7bbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c028b1f74a3b1857aa09ffa8ca1d2eba
SHA1a0a719951f71c0227ec97e1224f9b5a9bc67d4c9
SHA256de9ce864eee4160eeee27f60c3e38b775ea7770a3cd2b41375b9f244a36f783a
SHA512a07fbaea1a1fe088e712e746a2d31deaa0116a1049320f68a934fbd1369863be5a9d0dd07bfc1f7e26c36491ad6d1170358d3acd156cc3f610a777644a4589c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524af54c8ad359da7b471f2a811575c57
SHA1a4e0a31f987f7ef5e879397be85d059a5d8d77ea
SHA256d55c1cfbb797b67c456647f77fe08101af6976263e689c0b8073a57ef456cca8
SHA512dd8db17bf47d180f03a05dd0f9787dcbd770814a69ff55cb0d1977da5f2dff68cf6b42d9224f3418bd7252aaf8d445930e474e3a6d05028dec7f66dec7ed9718
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef93fb28a91afa0d47f9f78fcfa2d464
SHA12812ab8ed8c85b67ffaeedcd7bdb5e65f29f09b1
SHA256fc8138fb2e96d8e5ee5b9ae44bfe4bc8db76b0be9f054077ec506befd8171163
SHA51213ba413cc82857cfe9ea6d2eec9e26a13d1bbcdcf7569786cbf93442d0db2b8631c928f69b959a660cadfc9bc38347a410b7c1326b727a9c342c27c7abce0eee
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b