Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 13:16
Static task
static1
Behavioral task
behavioral1
Sample
c8e39d5bce7d278c03e2f2174e571175_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c8e39d5bce7d278c03e2f2174e571175_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c8e39d5bce7d278c03e2f2174e571175_JaffaCakes118.html
-
Size
4KB
-
MD5
c8e39d5bce7d278c03e2f2174e571175
-
SHA1
ca1ba88e9b76be58719dc8c4a5e2866427cdb91a
-
SHA256
a17fe17f777ff3eb3d1c20c46aa55c77e2c91adcf87c011d228ebfd112e03b28
-
SHA512
5e3ec1643f3801c8552b5e75d65fa9c0132aaaaf7320403800d2d3842ba829394cdae18eebcd2c8a4d9327d9f031bcb72cfead751731e20b98bfc7dfa67c7ae1
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oiqHSHd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000c91816d87722344f1cc242e36d0682f50c7a8d760b9572a0add1280692944b36000000000e80000000020000200000000700dbd3c15f7afb57b5f2e5509cc38d2776f4246aca47d267cc48cd8e55081f2000000025ea00ace6ee1bb822c65a252af77dfac4a0f28ea9e486b24eb446475723af284000000066efad857b972edbb1a589ed2c7736bc4b18a211fa0f4c79597e2c98a990c76be25ead5754e648ef97785adcbaa07848de394d0ba581dd7b2270d414df35255f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431099240" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0474db115fada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DCDA1511-6608-11EF-A32C-7EC7239491A4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1008 iexplore.exe 1008 iexplore.exe 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE 2040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1008 wrote to memory of 2040 1008 iexplore.exe 30 PID 1008 wrote to memory of 2040 1008 iexplore.exe 30 PID 1008 wrote to memory of 2040 1008 iexplore.exe 30 PID 1008 wrote to memory of 2040 1008 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c8e39d5bce7d278c03e2f2174e571175_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1008 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ff7fe729778c2e98a5abc8041a8526c
SHA1fa368717441492ea12db99de6c6687a8b8ffbb3c
SHA256ecd6256077453f4d40d6c21b42c49fdb6c62dabd82f35b202f8a3d4e1f3f8118
SHA5122af152bedef8552dfcc208b29d0093e932b430b3ab26bc41c9b23627455bb4357059704eace5294d58d1df89865a5d494566841e8fdfe60162dfb6501d8a39cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552989913400dbb94f4e691f6620ae61d
SHA1a16790e79b95309b358f57ada9a2bbd6438a7344
SHA256ee88c4ad147d43bf36f4d3ce9b1ebf3828566ca128b76b55416237f5ad1ca59f
SHA512f8ff2fe3298b4354d7eaf6b451dc5f0323ad8736a2ad49756bbabf3e58525f7ebf5068b69fbe5d9957c97721784bf9106c43950c911e83279a5abbc219e6a6f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569a1411d321c9238cb58169e23ffd914
SHA1306eead8bb94adce741cfc37509b59b9692ed46e
SHA25687c32ce6b07b1d023abd13e819a4e04fae72041e61f061e94a4da15cecf9f50c
SHA512972a400bdc2f74fe223a888d6120dffb5a40d8a43e297667e88ba80075c916518fecaa611605f932bfe2cd71a74e8a3ad7589dc0ef7513a149d9a219781e2ddc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53765d6b44b393f772b30dc33a979291b
SHA10b7c1e37c1db4d01da1a7459e645815c9e6d24e0
SHA256a76d675afbd509bb30e2a92f19a0d0ea144302e2921d348baba1d685daa3c9b5
SHA512737786e4f4defe1f4f0f4d16caf98f2cc69912fe403b1e22fa2bf8e6bf81a59e5c74e2fafa36b0676f8bd61e4bf7ebe9dce9c1a40b0a6a80a8410af5f000d35f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5190bac32b1c6ad5fa2879bc34cefb0c0
SHA16ccc5b677497b9ff7641a38a79863e15d3e16615
SHA2561007d92cdfe86b298ca5577ded1b34b5dc97bab3c32c83f2c43a1f3eefd2b18a
SHA5128bb3dfdc2bb411eb0c5003cdb9eda28bf4638bc03193a8f85b82d76118a4eacffa25011d9837987bb354fd0c960289181ecd0e125e4d96e68393ebfbc139d762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c3c1cf84de56478458a52676592c13e
SHA1df9a2b95dbe68bc496eab3075b2ae5b3f7d3e60a
SHA256cfb9c01a741975da97cb1df931c7f38453be2fdf640a617dcc56c144700c68e0
SHA5127c3b8441f1f75161f9249a2a9ded623e87dd5fb3ac734e765c1af9a029fba37920d677ed0e2d68d444e43850ce1079c38ce55843359d0bf512e2a203e7381794
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b32aa100764403bc4169f469ed3e43a6
SHA1e2ad77d93102a1e6d42fc37095bb406c4a1805c0
SHA256a630400c18781ddba37dc9052b1cf0dc90a0b047eadc8020ea462e1ed73c5136
SHA5128d43f6e06e8574afced951d15935674a792dadc72095ceff0d08fdc6368d3c02e4a0020b0303a007da14d1119d98b5f0720c127caf2fe40088e542fcab18641f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4163b56988d5124691d7208a9590fd3
SHA10ddd05bb9ec9d976dfb883786071db64402c1b7d
SHA2566eaa53a4a804ebb4d18166f7965120a81a339226ddcc80e638a767543a264ce0
SHA512e9feb64c9071645935e65b92f80e2366095cf0482a067719db0d2e6b719fdb34b694719506197d5c87bca57fd13b3a91ed5dfd5dfab14dc4afe7afadfc06aa4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551bcfb0c3202e72ecb92249d79c555d2
SHA1d41b10146b6bc57298920999c6bdb5509a78b019
SHA25605bc86d64b5470e7ebd606931f809fc3e47e69d14484d6d107a8c3ab8655f593
SHA5120c56138c8b5ec29a6f6ad00177bd5a15f9b96f5b81e14804cf95030be0823f1d96533f93233a4b90cbd5a1d0f737680c706a70ebb04c9476ad9dc79825e39d3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e1502041fe1488c958e01b9e136f5ad
SHA13b521a0cc6a8ed82f01e1343ce12e27580518470
SHA25673675e400119d80e66689bd1abd979fa0924f4de6cc2519b684413dafe5a0bc6
SHA512e1b6ca304e64e2c97aac0e14dfa22a0d084667b8c306a56e34d5ce30342c66f0a8e5f129763766d3aa5cb4b130d59d10bed07aba6df54b302e383dd944d7e2ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c0ea96d5bbdd979e41f54315bd35579
SHA1ab98ccc8dd3f4da336bcb10e6a5320703886aa6d
SHA25641e0a338817859ed35d6fd1bcbab83ef9d3d632521d46d29832eacc49133ad97
SHA512f921185d987f2f1ebc2642a3c48bfa2cf4889700698fbfc17a680acaa9c4b240c058ffc23e888c5640baaed54d29bfc4060b3e7f363399e9e33721b8a2e11f65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577656c8fe6f0fa41b812e5cbe8a7514d
SHA1dc0624d833381fb20e5b2f35b069397c864b4dca
SHA25647b5c8c2b24119a3be40e0e0d52205fb2bcacc14b0e8d2b8673ac3e5198d1d12
SHA5125e23ec9562f1cc257c9767b996ec12543212e1fa4e4954212dc2080b7a9e5fbe3ac7e03fb75d731c7e192bfaec5136a6a88bfd3ef2381e49f9517f7f2fac7a7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9688aebd4c453106968c49e73774f7b
SHA1c95bd840780b4e76be8ef34b9dc6b61c7371958e
SHA256b35d3f07ac7c2c540b072ea7e9a67a61d0cf7aa665e91f1af040d6e17bb14263
SHA512d83dbfffe8c961c05490777765137a2987422ae2cbc7e92217adfde47a6d7cbd355c2c8ce4b7f7d5578149e11cd84ba47feb34a4d47ec739d520215e43c73c94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2bbeabc1b50c78ce6b89de34d9ea590
SHA19c01bd21d0994709b3992d22491dd0abb3025927
SHA256df44b9d3a78b81f49c98ed8c2eeb1e37acfc297eff7fcdfd5d8783efca4f1565
SHA5120eb9637af5df8766660d3bd8f3359f8c8f16d821fc75f4bd4051b167615659e40fc5c0ff4f427b1d3ada4b85b1554c50d2644ff8a697e15435ab9303426e385f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567b38fc5b2f45baead99d5553a02cb61
SHA10a2230e40ff41924cdcfee72804be66ed26392a1
SHA2561271040d95c89929cd1dba823646986dca34efe83632868127a51075f5541343
SHA5127992e84703479304ba85bedbda59311f0004b8372a24fe8fbe4bae386224a68d779ee110e7811aba4c80ea88c9dd464b862d6af5b828cd23400674c0d299d9ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516490ebb801abe58f04da4beb32f2c2b
SHA1fabc01786e6284757076b619cc22c8a37c5e1a08
SHA2567cd915dc2027f931b03f916601c22570d96b5128294b0c523ef7bbe81b2280a2
SHA51221e6cf575279b56952a783c8d65ca3cdc6bbb9834b38798a1ebbc116499ef4555f370ef4421c65c1381eac458c03f216fdcb49341dd564042370b301daa0aafa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534aa9d8e3ea5ee210be064d129e09ee5
SHA1c9a082ba160d56bde093f7913afab92b5a8e0144
SHA256da65980b497ec6f0043aac6d45c1f77fdbec50c4fdbfaec4893eca3f120734b1
SHA512f5b2d2e937054a6c88bf047f88789161dcc4b539c02bb7762c9a298331b55fbc8d005caa88312cfb9722b0825fd831b9a239f43dfce479f8c48a0860dc4dc14f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b