Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 12:48
Static task
static1
Behavioral task
behavioral1
Sample
c8d8f9da5cc473267f72e114f21fd081_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c8d8f9da5cc473267f72e114f21fd081_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c8d8f9da5cc473267f72e114f21fd081_JaffaCakes118.html
-
Size
18KB
-
MD5
c8d8f9da5cc473267f72e114f21fd081
-
SHA1
85e7568212819c2f1070a48b62242caaabff7de8
-
SHA256
8f020f8848b98c5f78846b66536704bf20c63b9ad8c4c54bee858804ecfecfb9
-
SHA512
b2d44f447c724dce521befe2403926726ed7f3005f1e1b4c307287db353b065d85f1a94d73f5e61698e77721504c64ff34bdc3a51a85c70ced17d9ece05b1c35
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAIY42zUnjBhy082qDB8:SIMd0I5nO9Hjsvy3xDB8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F8418301-6604-11EF-BCCD-5E235017FF15} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 603cff0c12fada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431097568" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000ecab4bdf4d2d48f364b42614b09b35943aed023692da08c03406e0ee3d343d4c000000000e8000000002000020000000bbdb9e6d49c1aceee8176f21ed23c4d6c6657e1a6d57c6d166cb076f6ac30e5c2000000073c9fff9e832942d4c39735c830c7ac6ceea2eff15dc834bfb97fef41dcabaee40000000cadf6f04725a5dc99e82da814b3b2d313572dfdf783c6c3fd629f63ca77b798beeea6b918c42bdcdef60219e89c631eadfeac56da446508788466d21df541f1b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2256 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2256 iexplore.exe 2256 iexplore.exe 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2364 2256 iexplore.exe 30 PID 2256 wrote to memory of 2364 2256 iexplore.exe 30 PID 2256 wrote to memory of 2364 2256 iexplore.exe 30 PID 2256 wrote to memory of 2364 2256 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c8d8f9da5cc473267f72e114f21fd081_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2256 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff511e7d499c9d58fc0df48d17cd730a
SHA1947075e2af162422016d0fa2753396b6f08317f6
SHA2565562d54409fd149542c0a7b5e8b10902eca9185f409814ecb2dbc1d094c0abab
SHA512c36afb641765c15db80a1ba8acfe3d1363202fd59569978fa849739b641486952f126004cf896bcf8bd9d18e6ef07d25b93303dd258c853463511dc850e879fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521c2bcc384eb1babbb45f0807075edb9
SHA1b6656b468730e56ca89433caeacc8d94630bcb8b
SHA25663fc68ac1f4902288247b1c5d731b8279733f1e0b53ce2098d869bb0ff012e4b
SHA512794ce5975578740103d772385a5b595ecfabe8d11c43309ab9279118caabe11f919d6af2670b50fab778a1de316f4681c1cf0cbbb29220de3b6dfb14bbddbe85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3da9b3c501d1178bebc7888544a1d9e
SHA13ee409735c7cc2cf27b5f6f5029749239ef854e7
SHA2568384edc33f3644e34d47fcd6ac82c9a30deaa800d987ad0325c855148c5ba2b6
SHA512ed4c15a7a858e90ec1927ad3bb1a59832fc3396202af22298d66716136fea0bdff2b6419886cd79d29ffceabfb5f42fd52023ac0b2d9fc9b4ed528750f46d999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f038820bad75b1ccaeb8e8987dbe7aa0
SHA1d8d96f2628f36c13b9373992892ae2a2ec820720
SHA256d1e85efd4ef99d10ddf1cde5a69fb53eaaa57bb70324e670ce2f87cfa7c168bf
SHA5124a05b314980538a6eadf32ae54a2881c7ffdd0bc0888d7895f6e7286c1a6dfbfd0cc824904a944e975459dd5d3fca179053b8b027e07cd206d8ff8637d1e3a48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5acbddca1400b2e32d4c81d4d7f7485
SHA17d3eb8fef5f21b7c452dfb3ad85755ad89b438ab
SHA2569944de2ab2eac755f635d5df76e9337a72e779cbb8b0b40a171a2db167ee37a1
SHA51239f20c634040255456dacf569f414d46495e0611b9ab8dfdf92847852509e387f2ef084d14cbfca88a8e13c7a4c2cae2266df320b3611a397a8232126c0a9996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f91ca15040c8fe4ada4ebf73840de92
SHA1147ac0f16dca6110a496b9039fcbb0199ef4501d
SHA256a0f89f0d513ea0c0904a5ac23c9c57232c7e36a63550a04362ad51c0aa96a8ea
SHA5124a1d026d40b0a1ec7421e2251a8a1ec87880b45294ec5841497cf24a1d8971faaa8487c43ccbe51a6e60c420117e8fb2d7a94ade552c94a4b0c238112d9bcd45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc182dd221d3aeb0fb4f8b50f9e75b1a
SHA1ba6420bfe2688af1c6fe9c045fcca4a1a44aad2a
SHA256fb5b271c2eb1a9c1b6f4a20f191a48e8ee2efeefa051e6814b2580a3b75b0a8d
SHA512d6b2067fb39b5310d0f545c100e475baa1c69ee4c6e765c17fc53185dcfbc807a99edee085fc123eac87e66f91b372f0892bb73f9a842f49970bee99595a9387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5414adcd391d68c460bcd79cb240ee1e4
SHA124d6d21bacadfa43971be6dc4a36a93acce9512f
SHA256d1552b7683509a3b592983314a83b4ed3d67b774ac67f9533162923038134acd
SHA5127cd09d42f21ae29a6678ac399205be75ee207926a7e1912abae8ac478b00b148a321dc0672ff64a07def4f1fd32fdf68f659ac793fc3cd3a993581a2b150f45a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecaafc3ed7e79fd7dd35d58f3b401259
SHA1c79684d48b44877ae260e3412d14657ccb397b2e
SHA256d682a229307bc13f10ded61b9282ade87ba0365202d12a85bb00fda27e0d8d53
SHA512e167438c0a3797e4525b443b64f484d2adf1db3e13e9cd95fb1201c8da53a535ce3034db08df967c5b217f3b9aeb08475217abe852bb971a4a183b4aac2167e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b32717d2ca24f0cef77c760fe9f7e84
SHA14a8add272408d17b338c02a770ac8028ccd8f1ca
SHA2566c9e6249e98cd1d91ba7dbb64a41fc74bf931f87308a3c2bb4e999833dd0c883
SHA512b991e8dc21f68a1aeca295e633dc553a21e93cd62b221fd62bb2b37da23b42d00ca5a28d6ca8d86bb07160bc507a2de15980e598c40818b0189a893501daed40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52669a1b77a5052ec2b5a96d4a104e9ab
SHA15304f3cad60f5da16b0410bcbeb273d4935b9c45
SHA256e187f780dd774cfac17e6be42d8e5317c3de0a10aa75f125585d1a7cc5b4e4eb
SHA51257af0f3102d674c085a7d40ba41942ee57dd5bb6efd17d5f07e38d1005d094278d4ebc56a184ca3aeede46f3b1232639e8f24951761772542c05d33492da7749
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dfe9b324cf0a09ec839cab4b5cd72a0
SHA1c33b84667bb320ffc0fba9a449b676294f87231e
SHA256657d5f1c3f494c6d3e35b034e151fc4b540f6d4921d404894528703b979b482b
SHA5127625c2b3f129bc4586de35dd3d6db37f5e1b16740c6a7b0042f21bf0f46ac4dd3f36c52b66ef6a514eb1d932a2b51991f5c83f35de4bfadb7d68994f11e6e773
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3e4c8c539f6f4a2810756a6e56711b0
SHA11e12a8f6c5c11ad0a40297e9901ece9eb8abf187
SHA2563e7d7053873a240443c1ee6b0df85e00bd960a17072142a0660be4de6fae2aa3
SHA512f3ecdf6e88ffd4c978aba7c97acc2c43a7d400f1cd9476431793ad759528051296e74a7b638e51f9780044c79628c944d3198461a28807092c99dc28c4369b00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550271c6041d395fd15d757aaf28f9f48
SHA10f511530ce5eab8b930880d6ac3d3151dc7e3063
SHA256e0d97ca392486bd621c9da98c386abe8c3805c1e521e4c82376c7183059d2233
SHA512c04b87ffdea9766b739c3d565642182a00934947811287e45f6b128a6a5e26eb23da24ed1c3843489091a17e5621cb8c1945b4b4f1043493300a67c2f7c42020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b35446a304e6939fd8db9bf0cec861be
SHA1206e3af9c755c4084f31ac0b0c576f9a2e77bffa
SHA2567ebe80c2fd00f89d8f57c22191cdcabec8f6e446d841d44a511b9b9d8220f951
SHA5125feb6d4bb50e426973f528f5358f869a80f92ad04c0ffa67813d7d73b7c713ace1386f05ce65330b5b931ca7194cd45e19eea23bbd5bf53eda87ba410a51f0ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530f074ceb03474aef5bc8bb102ca03d2
SHA150462ad83cc1c80498ba7ad3bf6470c4b2fec08e
SHA2569241774966ebc1aed55202107942168dd5d3456e7169570b746c66eb6ec88d75
SHA512b503f95aae5b09866f5eeda48da8de3c8831f51f5655462c9c5b6bbe911eb4f74417f62773ab01d52a16c383423edc7db0d4a58a147c11728fc106933e645d7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4ef5f6750484459fd63a6db4b7ea8b9
SHA1b800988ead75f4881d4f4e81eff046a959ec920b
SHA2565fb013f99756bf1d4ed7297b2bdf5cd0f903c33f448906081d33a6ff7d4b9ee9
SHA5120c11558a8b9ca228a16f533dd5d5066d430fc301b340275eddc059051222f98dba73d53925cc3d8f8209c32198dcdaca5bcdfd73b78c8a41863872ea4e882177
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587c1a6fad4dc35a3b11f2ae4c35de21c
SHA1ebcede222b7630b694ca66d9a9dfd8e90e4a9a3c
SHA256282fd7843e51b473788e6aa5b00035c0953f52673b883feedd051eebf45fae53
SHA5121053e92205dde76999aae02ba14ccc8a71c74c49baef5cbdf0d8d9f387dc794f80bdef39d9815d0c0177dc82a325278c4bb407d0f7eeccc38d1429c449b70f48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc6b2946f8838a33c51902ab9ffb4160
SHA1f3b9337dc7ab96ca8ed2260b9632f9e03a444548
SHA25651744ac9a1cc2788597f52c5a5e9b4ab7c55a324588cd6951b746fc4d40a1ae6
SHA512562e919481bf1b82179f787ffcaaf2166f8c7ade6aa7b9883744011986c623bf98cc3d9477c91039f1eb95523a938e3e6ba859fecb6bf5a94eeae164bce181d9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b