Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 08:33
Static task
static1
Behavioral task
behavioral1
Sample
c87cfe84147f635418e6798f54012370_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c87cfe84147f635418e6798f54012370_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c87cfe84147f635418e6798f54012370_JaffaCakes118.html
-
Size
53KB
-
MD5
c87cfe84147f635418e6798f54012370
-
SHA1
8cee5f15e97e7b509531150f37c85395bc0fb13e
-
SHA256
1d53a08c80b38f23d3a8a83adabc5709ec9ac60fe4e7f785dbfabd201208a49e
-
SHA512
e31fc2de6c1228cded0aa36673541ef13e7a2efb1ca5e61ec0de198e1007513f424f20d0c84cd6a0a41fac73eee69ce0569b3b688501385ab5c96afb690e4037
-
SSDEEP
1536:CkgUiIakTqGivi+PyU3runlYH63Nj+q5VyvR0w2AzTICbbbo0/t9M/dNwIUTDmD1:CkgUiIakTqGivi+PyU3runlYH63Nj+qb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{55319331-65E1-11EF-BF23-EE33E2B06AA8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000fb8cc5c657dc7209784c7da5b984c1c5d81ad012fe6d2dad239d290755acccb8000000000e800000000200002000000030df50dbf827805ab43a7c22971e78558e035c636a8c880e92485110eb5c26542000000094f506a1c2c82543e257c28bd92ddd20c4885caf1db9d32a796fd6b6532718d440000000e6b86f24f2309cf82553caec7e9c09cc17333448b846ed00930524e3bcf2abb67b4ad8259bad0ffe00aebe001c0454c710b4ad9064a7581a8d20a2e50346f3cb iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431082266" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0b06138eef9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2284 2368 iexplore.exe 30 PID 2368 wrote to memory of 2284 2368 iexplore.exe 30 PID 2368 wrote to memory of 2284 2368 iexplore.exe 30 PID 2368 wrote to memory of 2284 2368 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c87cfe84147f635418e6798f54012370_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edf2a65807ea4642e1896592d2e961ee
SHA1033bd720f9c48950941798fa5eeff82163a9f1ed
SHA256446fc5d4c33bd0895895a097a6cc163c077572e796b7f1116fce02e0e602cc04
SHA51203d897239f9743aaf88d11e176ec021a7943bd180b39d9fd3794459563730a933583e915d0ccd1d35d4a5aa2fe03c2a372844ef72169c5a8ee4e249fc7f0c5a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56317a91c8025309d7e227bd158615ace
SHA1a4f378d9e646adfb8bc349d2ec793e818b7a9a27
SHA2565812d700879797c845ededf15093db0e392f6d0c312a3629be3588933226583b
SHA512d689ffa3a4898953cb5ac90e69f2faa33e09c887aa536c1562b41d97a9024fc1e346e67b9be1b94e4959efeae5571f8fc5e533bdf026b2108a9bb526942bcc9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5020e6a5e8beecf5a802a6d09e4c125a5
SHA19f0d7fd31647985ed10b82d14fde661fe2685360
SHA2565d46cebc6f63cc1b822d67c04c8ab60bf06c9e0b3794bf9380d5c44c66c1136b
SHA51281c05e84da968ea5da2088fa436fc207533f22226cf611d8a3a7d7decad9b3b88291c37e3076d0726c9bf199ee49b3b318710b491d9a01f8ae867cc476b86af5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5704bcd23b1026db408c2d91601485ae4
SHA1c7c1b963fb286fbc575781d93f2b7e8737ecafc9
SHA25687b25bce7e37fd03a668e1ad3df7853084876bf4f17d1555baaab7a874f6c524
SHA512b3c409068231d9d28d989d2cfc0054fe16f4149889bb49bbf4f674777c145348b5e9a8c3ef20b9c17277c36586cd6a8681a0074f4dc427e5bd5e1ff43eaf5c99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7a22b3601c61be288a4992639d35a9e
SHA1d6fec4f28cf06402b614d0bd641ef954b9f63125
SHA2561f793497c380a81e5e4de2218f8ffa369aa7c130b9638fe2141e64dc88645abf
SHA512ec9d914bfc23973a2c8458cf8dbeb3e31b25dbad95ab11cac0f6175ccd31518a90c7277bc6db6579ea45e8589048dd7f4c3f3aba7393584c8a69be9c0f66fcb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570e9ae4ff76a016b9d66175787bbf4e5
SHA1854337a5a09d74b181e8b4917b1757a5a077f239
SHA256223a9dc9cc2c48e344f517e7ca73c4d0a79b24cd42c027423f2aa3c80c796a48
SHA51243165c33b8c18cd7d9c67b992075caa84802c25f8c5d54e13c75ae25d9ac822ac976ea5844f0b7b0f152989e1ea5d0b7e45e4908e5920f529c819d910ef045a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f126bc7b7e1d16d1dda7a830a290a129
SHA1e8d2f38d5e674c35dc9ee9e58a3facb82977f892
SHA256ddb47ef6c0993332a0ab288c675dec476db694f982acf31287ff97dfb7136c67
SHA51270d1128a394f6ac1d23deb54c711ed052579d406a56db0cd5b55c1d396809089d37602c0e855490d3acd80eee15cf9c65ca8c77339dbe3bb2c2e5712d1bd2ffc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c8cbce6d114d1eaa9effd8884bfb048
SHA1f9ad0d7a0eaf5722e431cc556b90ad8922426b75
SHA2563bdb9a5f364bef141771c0d46efb014b77f0070a9000fda36deb2d8f0931cf2e
SHA512323954f45965919c0c443afbd93b134767761a3dacdbd3b7f19f51608c5a12c6ba3c8e790df2bb2b0efdf0135a5e8f6b6ea390a6b64739637959e0d7f1c593bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f76783f28016d3101b4f221f2d260cc
SHA11c8d3b611b091c8445c4e6c77e3738d8d70482ff
SHA2567fcd809c47cbed50c310ddfc7a1606f7ad32057dde243d8f8117a4b52adfa876
SHA512f6d15a5dd6b2dcfa575f9068450fcc551d8f8f7b9cfc7b42820ed088c7c16f4d46e10052ebb9b63d90c797d9067fda14317585a7f544026bc60f90eade5b0890
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0c76b2df3f224c831a34df40c7d5c84
SHA1c91ef373f5e65b948c001a5635b12bb4cec81cee
SHA25652f1630e3148774fcdf6525b82a348ad225f4d6004e87b41946e3dda8a4708e7
SHA512db9d6d1419c890fcee4f092cdc486bf5ab3b051bc47db5bdcb7cccdbf11ac2662538d42e18ab0ec3dd857a733bbb87e408562b830f1ce9c96ca044de1fa32cbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a27ce6f7dfe2f8b76dc23ed51f112314
SHA19a0335bdb30013f5e26ae6b1135d2509b10aadbc
SHA2565b310c5155fd28a4efb4e5f41a5ddddf680d2f45843621c67ff06feb956e8a27
SHA512a253f2a44c909342ce940e338a57e03be4c4112a952a237c8cf01c4508ab8fbd8052e8f0ee1ea80323bd7e5d66e7993e1cb8d8fa0c1aed07020da6273a979e01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b7e0d44de39991c964519df98a4185b
SHA14ba45090c41215cc401fb4f3bea8a8e95e701c1c
SHA256ab5926e0a906ecbdf57629938116a2d921f87dfd0d42427626bcd5001ea5402a
SHA512ce487a9b757b4e24a785cfe6b0c8dc818d1b9fbb62c30d32bb3a6e2b4ea0f18fb4ac69618461c3e24bcf050d4782c83a5ce086fd59c42a376b84829a75346e66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582795389ef0ba83a97904e3b31eec1d1
SHA1c73d0fbe2c9ff98377318cb36a6f8d5a89bdb005
SHA256ce3e3ecf0bc6a0b5d25e7e6451edbdf2661b0ff8019916f9bbf1b3864790afb5
SHA512789a56e7f3c6b8ba70b3bc9b22eb5f9a7a7190babb0c79538908c2b5647971456b89b9941945dbbbc28cbe115a36e324141a33aef1bed3dfaa2ce2b19afb5b59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591117ac607f2e55e6f02127aa0a9f1f0
SHA190e01dc9b6da33b0a9a137bfdc17d106993c5ced
SHA256f21f2c917670df9653b35e0f56563cb91da8bbd16850b64725d01b86de0d8d2c
SHA5126bc138b6091a74c9a82d5974db7335953cda8d397ea4c24445f5dc10a88198e64e748af4eaca4a9eeb38d4282b8fd2bf7e9f9ca15e7d23a234501287ccf417f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dddcfa1940da9f4bb5f56942a013425f
SHA1dcd1993e76ee55365ad5ac8238af819291d21540
SHA25683d7c6080d35c0af73919d508898a6f502719c67e45549b66ee299fcf6564d3a
SHA512111b64129cc00fcac7e4695135692058bef248358bcf6b175d7b2ecd8f9465fcef4e5fa4deafddda76ad41822b9a4da976f51bea552d10816f3370d676140d53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55366ff00ca820bee06f11a96f3e36dc5
SHA1aff1fcbb42003968c53973330d9ccbc8cbdba591
SHA2561e6779a0fb39b11601af23901e3a5336740fba154b09181673eb8e4c532f00b8
SHA51268cc31cb1c7daa30271b83a723aa3387cddfe545c1fe1aa0d44723f0fb735cd90ba8cab6c2c06d22e5b27f4e3fe61e6e62a94e6e78868c0b99df3bd82f2ca5a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58343f935e344585ad5730cfbade1db77
SHA1f1dd42785cc80f30ec8792100af372a3d715f1fa
SHA2564e75700af9c01a7e888ee86db1cf4f5abb64d4daa91741810c1be1db2d006579
SHA5123d2ad9cf69671628738d4a44539da2e188ed3aee33ab62cfe63bb39f9e199d6324eae199544b456c5d701906ce2b7bcb87434e1dbdba1ca111cf6bfc46b6569f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de2cb2ce6aea6fe396718222c4e3fe66
SHA12ea5cf47e90a6f6245a744b05bb8aeee7858016b
SHA256d3eef13107cbf87a6cfc20a10bca58c6a63526224581902495820e1eae09c582
SHA5122d844f971399127f4e77f912713e272b6f0c16205a1a29ec1742fe3c56bf03a553ebc58b895ed5d8ba404db2f38913c4e0f79ee0a7f7480c117adadd04705a7d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UQFHO95Z\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b