Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 13:19
Static task
static1
Behavioral task
behavioral1
Sample
c8e4e4a5a72c76778432b2c08c40e55a_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c8e4e4a5a72c76778432b2c08c40e55a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c8e4e4a5a72c76778432b2c08c40e55a_JaffaCakes118.html
-
Size
6KB
-
MD5
c8e4e4a5a72c76778432b2c08c40e55a
-
SHA1
7def4289d7238f8feefc8172b44fa411000c393c
-
SHA256
2e0ba9ae099dfa6bf1a5e4e351b2dfcdb605e2b270610a82587c342466261056
-
SHA512
445b8c86189a1026454e87d0d4aa5a7fa44fc5e427bb1b5eb837e1f3d82f86b7e3a85e202f4a537007b043a3bf6923c6a549a9f8f3191b00651fbf9112ed11f7
-
SSDEEP
96:uzVs+ux7nPa0LLY1k9o84d12ef7CSTUI9/6/NcEZ7ru7f:csz7Pa0AYS/v4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20f9fa4916fada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000ac582c559c21051bd8c567e2a281e41640683d794e03f990954117db39b3296c000000000e8000000002000020000000316847d3f9eac41a639ebc9484557dcbb4b7a14c6e6c0f63c77ff31d1eb37c60200000007f68bbaee74ad9f7fc2fb1a1faaf713fc09d6886bfa7a50b44dceb1637e91a4640000000f6e1a24b77276ec7723527f68743d4369178eafd64b4df76f2a1e12857eed218da52d3ad770376e5f4b889668374a4848a972fa2e0ca279b42d3660184c7b159 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431099453" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5BD6E6E1-6609-11EF-B88D-EAA2AC88CDB5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2244 iexplore.exe 2244 iexplore.exe 1472 IEXPLORE.EXE 1472 IEXPLORE.EXE 1472 IEXPLORE.EXE 1472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 1472 2244 iexplore.exe 30 PID 2244 wrote to memory of 1472 2244 iexplore.exe 30 PID 2244 wrote to memory of 1472 2244 iexplore.exe 30 PID 2244 wrote to memory of 1472 2244 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c8e4e4a5a72c76778432b2c08c40e55a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599c403bee3c7e5a533ecfebde925c9af
SHA195bf4b07c4b3c747d2203c5819c6442c16eb3451
SHA2562f5e2559865f9cd104cd30869fdfc57cd92fe795d086dd1583804d8732546520
SHA512567351c8eaa9757800c632a1b0254284b1e416fac1b7fc58c0a4032b6535f3cdbe18e6b25d64610f3ecb63e95e0aa1c08ba49090e9d11a5df35d49699a2b15a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d67ab03d6618995d77200bf4ff6e0c75
SHA10bac7a704d1dc2258aede7445ea1dff4cd64ff86
SHA256d46c7f6ee59a8cadcb9e5ad6c3d3af9bbe3789c28b003d8b51d4043dc2c6b9ce
SHA5125b161647af37aca8f33176fec409552483c8f86114beb6be14b8538f5e25d8ebdc95180dfc78715118bd6bc824bbf76b19e632390d879ca84a7f920e5ab6aeee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552dbbc5835a9da60acdf5a5d007e3bd0
SHA1c5c029629693aa094bc33fac2bbaf7d9b9f9d747
SHA2563b47878bd49538fa299034858e1fcba34cb885f7cfd05e470b861dbc47235f45
SHA51236300095883773bccdd19895481233191d7a1f067dc8fb41c26e41dc8d1092e6bf27e92cacfd57042fd29a27e6ec285b31c3f843cf84543a95395d6d8fb8f59b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f87b47805081a3ef897df9c4373b33b0
SHA14cf5ba7c0f6f38ed43c2f2cbf1655a1d4a4ca18e
SHA2560dd3cb827b9c6825c64a7dddf341f548c40500aff3aa1db1aff4019907ab0029
SHA5126fd5c2c2e94bcbd5dc4e4e7011257a57a62a0f2991cfd0d21c16d3ae0a92d6a1b9eca9876d6613710ce0dfc9c94094d84f3a0948b456f8d2f77584f6d0cf6de8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a753077680c97b4a088ca7879e519942
SHA16980dd81222b78208c4400a4f5c9fcdc192c9ded
SHA25650a67e9dbff35b162d97ac7248041ca1c67c82148cf2c80b70d8a28744ca0049
SHA5120031c313f26d78d7777c92486e80002c54425cac4557b86cd458570ddcf8a1cdbb862f9d212ee83e1653417d12196ae6bebade4894e4a03a9bfcca2dd7f255d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b25b9dd45d5927f9771c2562d2c3f229
SHA1e9f8aefd878cfb9257da3c405369879ef19365d1
SHA256daebbff6d4298f4f6fb667db211d485f42f9242a530cac3adfc236e5fd0acf7e
SHA51241ad802c87a0d58107e2601129cb69573e04c8bbf9b1398db488971a4fe5ca2f68c9e762b75a5870ace862d99b0ff0ef69fb9bc57e2b3c724b684d997c51f118
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599dd56070a84ec30beb972d1216b485e
SHA1b100a83d7d429c5d31f88eec07188fa410964d78
SHA256a3b03cf4b378c3a26530b9d1ad245808a023f21c16e86e6d47de4877b46860ad
SHA5124296d4d812a45523af6e3e866e4e4991bae46f772f65fa581630b5e66bbd6617cd5ed5c64ecec798e75f9d7d69fd9e830f6d8b586459f23223951256fac0560e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af0a2e4f1a73e0c1362a3c9b81f31479
SHA1b42cd57e749136a9ddfc97489444081ecc3b3bdc
SHA256a221e44be2950fb5a65969bbc95d37a64fe04e36a24ece34ceee76328954c129
SHA512ec92a5c74d76993acd3ee6060f7f858630e9a83e292861dd4a4fa8fe701ad065ff060b25d101c8be564c6eb72660669993e8700955332b273deaf63b7b3c0c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557014ea43d3e2a668749812418b5c2c6
SHA18b4325ab5c1cea7aa5f87a015deb2fadcd97325f
SHA256389cb70b2b232c6f1a9568706205ad9e26d55543f34b6d78ce3060fb903bd153
SHA512888578680e6f33b831af6c047f9bf7ac80afb477df711a8e49af7a9985587908d522493b5ec3c1a0ddbf5ad8b930c72dc63edc0c816fa69f405a3ffe1805ae41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7a81e0f1f7b72317c04b17fdc7e2c9f
SHA17f70aeccc0f89423ae3f349d93b0547fd5f1767c
SHA256e3603f6222a7af32fff71d67d9e109d76295f8bf98fa66e900c8e87483852c3f
SHA512a95b64f4dfb5eeed14ae4410138758c2e7a30cadd61f90e40f20865f0e4e67adedf59ef6f88d80cbd9c61acf607774327136fb1ebc08bf3a444c8adae1a97d82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f60b5a87ba0e24948267505c2acf3170
SHA16d3483b0b7b2fb00d747b6e7d8f609d49cb5c4cb
SHA2566fc3929eee654db7f3de2e2769594ff3cd58f7889b061078a2db24e8a56c26f1
SHA512eced73a31e38f61cf8ea358602bf77587159abea7256fce94af7b424ad4a8493cfc585a5a0eff04775949107ece9e186641d9430f60754ca5b2e7d706836f02d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1f46d620d4c56d0fafb0cd6b15ec7e9
SHA1bf1a828243f3c5c709b717ed8d8d9c3dd6dc5f2e
SHA256eb6c8785d444585ecadc5b992269e6610cbfa3569cb5d31fa311e04dd07349e4
SHA5124a64de329bdb227f412b1900330984cdc450ce6b737ce256d8abf0b96f782aebfc6bdd8ddd872a126a75588ddd478f65939e964534b0e8a9db5981e189ac4117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54745ce459de40599e81b0face5d80d93
SHA194b5560bfad8fb51d8b81ecf9e0acd3177792ae3
SHA2567cb42d1e8b22ca9bd99bcc209733317d7778d59298f43f2efe4844b750a70d8c
SHA512bb4bb4156ad9b422e15f3eb4879dfd9104e4abd120e93a3b2725bf8e5ec20333c706bcb8c2e41edb81ac2d1e5f4f077e8699b97d8f36dacc0d3ae487471ca6bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c01805767f478dd59b0960c8eb71c2a2
SHA19cf7295353500568a0a3f21d574c23d3bb5e3233
SHA256a6c1d8d87445f08fc128f60a02d87f9629bf7e9c2119e09151d133220b574526
SHA512bad2ee8d8f54df4f893358df7616c77ab2b36c139ee85422904eb6afaf4b9970036f5541b298b3ffdae96bd276f1995b74bc4dede144d206df02d3480f9a0d3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a1850c7a4005e3479d91e0b8ff03331
SHA10695022c08fc78e93b04776b8586b2f2ca471b26
SHA25600ed9e817ae78a941562ee721a2336cf963f513dc864163418e4fc9289d32f0d
SHA512596f790a0c3869b740984c18f6bdee7967e36ebb8481a7e43512b670929d5a718228ffd264674fb69269bfc62a7599627e92182177c569d97ca798e81c7c1111
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dc33df035a7a7efff0b6bc25f6b28f7
SHA15dc4c8c57d242284189ca5f93bca314904fcf198
SHA2566cf416cb3c053b9651099eafd1b17b2bc90e5f67e6da1d6c912efb52b6b570b3
SHA512ce9387cb125faa0e3f6e379ca355c497b707e2ee53c588a8d67192e2888c583d7bbb538c0185fd7d625f6b094360471c4c6ed391f875d9f26929b3ffb031e53f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581e219f4f081459456a87b4d58b31cb3
SHA17eaa20684e76a1a19a1a70ef36808c11e7fd08f7
SHA256abefdf3e7a972c8e41527e614e20c0d20fa00035c7f7b17c4320af225a2866dc
SHA512b26b8f667e9b4ff520ffd05a3b5befa6627eaa84157fed56a8695f4df8db64a1d5e755860ea3668fe9976ab45a7df1e3ac3e2058b1e33d1e8a0f89f234e325aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b