Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 11:54
Static task
static1
Behavioral task
behavioral1
Sample
c8c55848b3d02d178a4aa886b5de95c6_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c8c55848b3d02d178a4aa886b5de95c6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c8c55848b3d02d178a4aa886b5de95c6_JaffaCakes118.html
-
Size
15KB
-
MD5
c8c55848b3d02d178a4aa886b5de95c6
-
SHA1
bdd5016e09d679acc22634b046368ef29417c1da
-
SHA256
46e3039787eaf897e00bd96186cb35e22e1264251b198d4e8a29f1cd73334c37
-
SHA512
59c5db54f6f22088a4e4335b7b591ae0e42cf2e695f50e18d5d6dff0a5a13e48da6b69bcdec8d8c1b27b339882d635f51d8eee1f651ea9c44a6da902b94afc82
-
SSDEEP
192:x60Ua1HCPpDrr8x3qgtvW/OrUjLsUCR/tm/G/ecaWxD6kDK1jsVNOkdzldlQi+UN:MJP58PlG9tjsN+AM/a8jkE+MAEM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7AC4C5B1-65FD-11EF-BD41-DEC97E11E4FF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431094350" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000a7f3d588917ba44e0a998137f522e053e91a96615c48d0e9c80d5da5b17cd452000000000e8000000002000020000000872f1dc6ff36e5a5b45ad11940ba72d902f5636578698af8ec8ba5c33a6a8d4f20000000e270e9d8d2f03231145e6a40244b9ac9f841543b3287e9486bf85a2e910b3012400000009da7a183a98a0255e159f8b1e1b17ee3f4a09421b7878b481d48fcf572e9c13ccc2309040918e1f5d8b121599286c8fbc1ad6fc3d0a3aec4871b946980f499b5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 608e1a520afada01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2432 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2432 iexplore.exe 2432 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2776 2432 iexplore.exe 30 PID 2432 wrote to memory of 2776 2432 iexplore.exe 30 PID 2432 wrote to memory of 2776 2432 iexplore.exe 30 PID 2432 wrote to memory of 2776 2432 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c8c55848b3d02d178a4aa886b5de95c6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2432 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a1e6e098de3f3cb91cf8af7a566220d
SHA16a96195a6590ae5d53b5315b5f1845429e7014a2
SHA256848f575216f472054486ec8dbdfe9c59d00a6e77d59c8450a074e5efd758fd1c
SHA5123d7626d443f66aea095f523f03efae114628c9aea1f80675eb73a92023c89d53c8abe8b683abd7a75fd81446069154f08311831249d1584793f2f88d7c140cc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c745ed6666fed4a771a848a5e975da84
SHA1dccc00fe031c07e7f9ad8965d92ae1fc10421fb0
SHA25629456e90c772f0a3b021f1f0044a316268c42379e0de60ac0f6948371d5908d0
SHA5127e089ee770be95857bbe7900d32e44083858124475600b3504fdc0fe07229c11e62a645b9c1a024a36563f8a1512b7e8f68221827538261bcdf6e08bc6d1c146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd3a1ef72d88de74a1ff25c65236daa8
SHA18a171f0f34c7dd768243017539f2b80664b0e794
SHA256ef4ecdf3c2c495d774767aa0fa64bb31abab3f649daa9ba9966a526c0e615dbb
SHA5129c5a94cbef22ddca527a3dc59f9090b6ab7902626af5095318d50a52b4f085214b526317e52bc2aff46c859453c3ed3fb276e634978029294ff30c16ce34440d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5298e364f9b82cc0fa2d6d2e58e007a33
SHA199acd64fc35705347923ece949c2f078019ddff4
SHA2562aac13a0cd2381e631cf0d0039b0295ecf598e901a7174df3eeb0d10384796fb
SHA512b0f3046f0a0be7edef18a612a65b42a3a61f4858f0ad067a263f0749cc6a63f6900aa10efdbd5bbc7c8d8afb948f79d3c54f43d6e499b3f6bc497d4d676bbd87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e1ca6e7353ad2e2fcc5b34a98079b21
SHA159c8f300c31e930d1c5ca8c5c6bdf2c4ad95b67f
SHA25678b92dd2127f0b77c9ec8701facbccc6985d32b92220d1c626cda8145f8daa28
SHA5128d060e8cd89fa46db99a435d762f0989aa8dd453c81f34f187d9a6f633c0399fe6ab57641dd09d30169cd0eb8f4ae12d6c9b1cd603adb42fb4e165cfc951ae13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598fe5ae269947baa4e796f85aec802b8
SHA12bb7e08321604da02275971f1f22972c07d43946
SHA2565cdfef89df00ec91ae082116d1851421da593e981adf1f475d72fd4f70f48d43
SHA512f2173c3f97fce4f0fe05dbec084221e05d44edb43056e2f712295acdd4701b1af889ad4447b7beb303441f2e30bd522b4cd9b8106bb4addf25cb7a77ca751c94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5578400bf6e19764e87d60f8ea3ed4837
SHA114a2c883ce792c71790b7a37735235fae41810d5
SHA25612b5cc8037b3d20417ffab39397fcbf8cfb7676d931ffb431a4a29a7bb73d967
SHA512805d64ae902b52f81b26717223934ba654bef594320f5c71aca74b04c474bc0e8355c6277d93708c9aebf884e6b34b3290f4a9de621cd7922abe7a910ef93349
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5383a95c6868b1d4b517be92383f1bc62
SHA19a2ea95559a3ec605dca2a82f75707e30f63259e
SHA256fa8c6bbd0abf846446fe359c6cd87320a054b095cb96ed88706b27bc08414d56
SHA5122ce9599fad5017fc9a6fa56a7ad6f2032132efff3497da93aed03481eaa975dea63a24dab046d8d1181a86da15122cfb16c26c1ceeb5e3fef908aec449fb4ef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539b1c4428323de4c821e4d3c5ba60bd3
SHA16ac3961313ec7be0ce9fe02e8284e4bda04779b1
SHA2564a44409435a663bfc0c1a6ae2c894bc3862e37041bb7d1595ab1ba122e664031
SHA5128eaa2960d93d652ddccadc2f60e31402464f3a1440ce79cf46cc8e6fd41ae67802acb3d382a7bae31e0b4a2111081ad0c2c4a077a3bdd1333d65590f220fbcd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520eababac6ce7f794cffb57a8c47fabc
SHA106e7570e091dd709f88c0b242d0b9f84bfec89fe
SHA256c2ecb24fd6a97d1542bcd0182f8f889a07e663653ac6d4f5bab7d7ab38eb3d5e
SHA5122ad1c040d0647dd8bafd745bd53e1914683eb5d70f3ac6fb874157b0def512d941f23692300e84c484597b6fab39e5b995278ea71f20da4e9f065735205f1ae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be1192d93af7f6c71bc4f0b0bffe3f37
SHA102ba4b3bdbb483eb66e1d378f677b86e00e9a6d4
SHA256174c6ca2a4ab4a371e5a1efa30481007b00f3e7378ccf0422a1b47969b11ff30
SHA512aaad516ff7616ca01026b6870bd95844ab8656b0002bf616530220b4caee8c79fcbcc9e2757da13f2f18f83af810dd1ff3d192ee94df517e90110cb40fd395aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b