Analysis
-
max time kernel
67s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 13:09
Static task
static1
Behavioral task
behavioral1
Sample
c8e0406185070f87ca309944b394d006_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c8e0406185070f87ca309944b394d006_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c8e0406185070f87ca309944b394d006_JaffaCakes118.html
-
Size
11KB
-
MD5
c8e0406185070f87ca309944b394d006
-
SHA1
ad02ecd58792e2f36dfd126afaf58991e4235349
-
SHA256
0634c87ba45b7b7335938e5a509326f3f3488e8b31fff1fbd5b0325566a72c49
-
SHA512
8b8d239897d1dacfa0b6152ac4ea843adb793002d692932999c797a4613ccde6b898f33e7b88959a25f8a35815c9e790077920d6c00bc7a11c90ef908b66c9ec
-
SSDEEP
192:PCnF2u1d4rPNo7M3QQ3CjVgaxeVNftU2C+MAk4sYRyvRpILDVi/R6/Tt:aFbDMoFW2gr1O2qAknXEDVAR6/Tt
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431098810" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0f893b314fada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000077f4cc74dd4858ab57ec8a06d2b623a63a8c9c2d3b98ef21814afbf2f0c4ffcf000000000e80000000020000200000001c9737104c0bbe8b176b425f33344a94ec8f8eb3b18c5db844b02e712f5e616c20000000e09eea1d86399567a647dc7208f19c90dcb2a5050a3fdbe3ad74d8d7698edf3f400000002ffe6b744e5525588fac76e75992574507203c06b16590c910044757aa2fa253907006ef21185c7d738aa467d434151531ea1a453b6f5fd9574071f6de49fb3c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DC842251-6607-11EF-A2BE-5E235017FF15} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2908 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2908 iexplore.exe 2908 iexplore.exe 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE 2592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2592 2908 iexplore.exe 30 PID 2908 wrote to memory of 2592 2908 iexplore.exe 30 PID 2908 wrote to memory of 2592 2908 iexplore.exe 30 PID 2908 wrote to memory of 2592 2908 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c8e0406185070f87ca309944b394d006_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2908 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD58633ed933b50e90a5d3359aa1898b89f
SHA18bc0311807ca8abec4e99cb6933988284aa52c87
SHA256e3fcdc0ef19508fc78f089146cc65563d1d99090e8b8c9fb4002c212d17ff652
SHA5125af9d00d2ad62e134aadda1a81ba20af378b42236f5ee326869f87b16b3dbdb072574de6376e31aa0d6307ed266c274662ebf3949e2f659b07032e218e95f011
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f83a01d417ac72eff9dadcd60c745ad5
SHA11ebecf30c8fe9db63e645e307d9871ff307c1560
SHA256e6808f784d822cfd299f142a42a68260e3714c1af7d604f4cdf3294b10fe2fcc
SHA5128564a9c74bd7286087d77d442e6f30ac7d4cce05fe1b936ca05aa6609ffb570b259067e67e343ff47396d74d5ffb8bb787e1f2a5e85e89225e2d073ebf91a65c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591c41c90e3dcf965b294bbe661390c72
SHA18f5ac7da0ac53405ff1aa3d4d633c530740830f4
SHA256e74ab9c505eb6fc155cdfcbcea868a1c825763c70b4c494a6b9445b4a1327c20
SHA512d096a1738e6e9f8df03d4642ed6f520d44afb8d9d75eeb2e6b874166736473a563f38ac8af3e504ee666630ec38f83185735631cf051a6977a9aae0c40dc3b8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac023246cdb0807f21e057e2175452a8
SHA1c5fee9bd5f775366e49acfdafd70525a646be78c
SHA256c5f255b0704d42f0058b7b5debaa36bbefa546c274601f8dc1415f2183077b9a
SHA512a79ddefe736fb864b2036ebdb81d123373f06904bb70cdfaa94047fb717b5dab7a1bd866ce028381bb1811c97d7e115046bb8e2bb00abe5e7a5a1c3b8df137e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5043ecac22f1d20e144ffeae2a2d2ea17
SHA103c9467005ed88adfdfd79fd3026c49f9d44c81a
SHA2562fcc66113f26000566f834b6fe0ba752f01580facac5e141c27e5764b8127a99
SHA512a9d96948ec027f4a4994aa6bae4be8e0bda72c32154c914dbd39b857321499bd1469f884bf3866c8470e917672f174a6611d032ada971aeae0b592016d2b5332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5797fee1ddcee6e95bad5953ddd424709
SHA1b14c72832098b5c64bb86e87110155e4e2567193
SHA2568f95c85e709a179e06a6454f27b080eef845e434c6ae0858f30a18d14976c33e
SHA512186916d40356728f66da4767cb7c8277637922631a7273786a87cdb6d510a695b9eac75c3a9a5dbad1332330d7e44522f060e04baa4899f4fd0e9cebacc20b49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511f1e160f64ecba2843ea7ed11e8d9ca
SHA1d2d195427ff05b99f1546f7852651b8d8068bd69
SHA256cef87359245a85a1a3e7203f9479d4aceed1af098d4759ed1883eeb4455b2109
SHA51286fcb02452fda4c4ed3a553c377066d9a884d2aa6ec288323f8efcd5019db0cd1e2cf32cc91b1c0233affdd67c337370f012a3d59bf6a886cf4b9b1b808a5b0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e81b1ce628d2bb84f818d95ba26231df
SHA1c8ea9df8a2b58be201b295518fe946aa2d17dbf7
SHA256d10a03e56c79bf39572e587f938f839520cb6de0e6fe64cd038876562c5f0e77
SHA5120a706f6047de2e24fc1de198cdeae4b7b07f2ac0722022a1e229ef9d0eb5be4a376fe27ab589de2ba7ec80f30177642df398e1cc131d0a5e1da6bb8c96731688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c544de013e7daf047f7c6f221bdd3bd7
SHA1c68c02f714ad1e049798a00c7f51cd2df571b137
SHA2565f82d432c9035f1b4a718ba35cb1a8c071720a0f218180e4f90372974575635e
SHA512e5b99d2ba9f32ee9ec490063d9cc315cc53dcb5dfa0d184b84d2cf217c798477e84d4debb0176225fe2828cdf9703edb82a0ce4fc532e4f7ab35644826a79c18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d19e7beb75712385ef2bad408ee03ab5
SHA17ceb69d73380d2268db6597884cf860edce976ed
SHA2567f849137b0fc6c50e77e2ff2092a9d2fe2a04ab5fb4b2c77a9ed7c2169087738
SHA5120f8bbf9654360763cb290c8121725ca03dae97e4d2273f37d71639f4b94abcf2d3cbc23ceca6d47c5e4533ea450d2e5d80abd4c39d75309cb445c47b1be4ead9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5548e592cc6b83785c1ab454be031f987
SHA16cb74dd759af2c2ed84a32a0c4dfdb4b7ac5fcad
SHA25615906b2fb97f61ab7fd05621b75c7f8d11b0a0f664de5836b12d56d3680701b8
SHA51286c596d2fb50f6b7e5ab12742dc54be70b08412aa81b713bf1af598bd7da393089660f279a81736428f5a0a930c5ec7ec27ceb9988d0e8de620f531853f8859b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53af5e97ef8b8a1707902ab52c61876c7
SHA1a6b480cb70cceaf4edefa341e9a768905b6d8d5c
SHA256eb660079b477b0153b21dec210883fedc4c66a7e6fcdbc457c206d9dc6d81b2a
SHA512103aa7e2c7ba20fdf5c79bd6bb2920ba664384d04d2582fa9d5e7848bbb00dcc4b65e68f9021fea04201d027f4d9772655bc7a483e36c7951d20d207e895d975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5138cefc44ba6fe4972efa7ffc0409342
SHA18cfc2c031c3c821092f1cd2991a81ba68b82dcdb
SHA256113926cbf311c118380edf00fbbf9f34b1daaf8cebeb644cd12ed5200928beee
SHA512163f4cc13caa5d9a44a2d173d1ea4a921e96b2f947c6a105d1e5658b5365c7e6bac2d0a575d6b3850459464b7321b0eabf0b1ce0ea73afc0ff597c0ae87c5e89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d384c542bbfd7b8aebd034803fbbd47f
SHA103896cd540473c8b962bc64e1d8da1bc19290504
SHA2565376b6d25fd36a7bcb508a89d1c89cae62c261353e856e7075e978267b6dac89
SHA512454f56b007ba38012bde458120088936ef573bc7e672e78c5f21b9343c9ccdf9848e3d33070e4a64e361be107d78b4ca252561bee942f399825c89dbb7d1f63b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f5eb7c2ab140c154a3743251ddc4e3f
SHA1ebb81bf4ee8e79d6759d2b58f1b6f8a0fd862056
SHA256fc958486f96f15f4a4423ce6703cf9db1fd377c5144b1d654d2d3fb1df1e87fa
SHA51219048fb87355e1d209e907eaa322d8f217dc16a4c8830a5da098b11fe2cc92a3f8e5bc676ff6691c4df51c6bc367d30a8b90f3a4d4f9ba59ee357f820a123cfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e0fedc5becece5797fa0d6d13eed076
SHA19403d19717fef36ef791bdf0d50d9ca3133beb6d
SHA2568e05b905058b953c34cd351b1b3292ce2acaf48f73e760636013ab3ec29872b5
SHA512eae49943003d26741dec688b2cd5f339b18d901460f3f29aacad85490eaadacb92e8ad0a416c4a096f8f91e0c02b2730dae7106091d2b31304260b2ebdc5149d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6b19c844b70b39f62b970668f1036e4
SHA10989914af296b8b5d56c624087af94518ac307e4
SHA256318d4ecdf3da4ceb7311e60b389a5253f0456635c92e886a4ad26f99206206cd
SHA512cdfc5830ca85ee11db1047b64cbeaad83790e6cd4e78ae3f11199ebcc5472b55a7f655d045945a3211ed22dfd1fb7e7c70f3a16a2ae390f7a5336df870cb4eb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5107eb016adcc94505e1e4fc89835f288
SHA1043e8022922b063cc19ac61825ec52e3712c9638
SHA256f45a57208aca9847f537db544bcc10534d53e2f4b53ed5465235c4c671b14000
SHA512f44e1f7c69125b4d04711082c7f9303525cbb7f05f4e9dc34c752ebf061e2b6e72288a49fb677d804eb1249f08580c9f1fcf914b2caba327f523f000dd49c71a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b