Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 15:25
Static task
static1
Behavioral task
behavioral1
Sample
c917d45bd3114a39c97d1c027b91250c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c917d45bd3114a39c97d1c027b91250c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c917d45bd3114a39c97d1c027b91250c_JaffaCakes118.html
-
Size
73KB
-
MD5
c917d45bd3114a39c97d1c027b91250c
-
SHA1
80f45473a8d053d3cec45a43fbfd14664d66a9fb
-
SHA256
81b730abc0d683b9e1249dd2b0b2168b60eb8551fd44b8886982ed8734695a09
-
SHA512
e940ed00a5ff6375788e255115e7748d5b60bc998970f57be8e5cf451357c0e369dee0ceaf0e07ecaa0cd158986ec0890c4cc47f4580660f9ac8994e89d42bc9
-
SSDEEP
1536:5HxDER/t+tdjIJmzJrddCFnw6VE5xEUrNEouT5mCvJfF/vzRfxkARpDCt3Xalk61:rDEt+td31CvpF/vNxkODCt3XalV1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431106980" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000028f5b2e6b3373ae754969092f7ca727ceb0b3f404e22645dc7e1ba79ababccdb000000000e8000000002000020000000e112045b266a03aa4fb7fdd4e858f84eae3110845bc2c0a0b070968df5b6868820000000e3ca3d35c248e5b03c4a059f95106c4a4fa9671ec1753f9dceaef9fd87dfa4ec4000000092b9f9c56b3c07fd100ec19cc8a34704c30a27f9b772506bbdabbaebd4b28f8f34d8538890143eb1817121f5c7afefa71ddecbf2d4bdf65a64183f30499f9cef iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E24617D1-661A-11EF-B3C0-E6140BA5C80C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d029c7d127fada01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2596 IEXPLORE.EXE 2596 IEXPLORE.EXE 2596 IEXPLORE.EXE 2596 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2596 2872 iexplore.exe 28 PID 2872 wrote to memory of 2596 2872 iexplore.exe 28 PID 2872 wrote to memory of 2596 2872 iexplore.exe 28 PID 2872 wrote to memory of 2596 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c917d45bd3114a39c97d1c027b91250c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bb56563b528d1df17e98d4942e9c92ec
SHA1f0804072aa704961273c10de23d8a865f0033a67
SHA256b2dbddd70edc624ae01c50749513d2fc12903feb4976a2344a8c5972d9279da9
SHA512f770f32444f7c21ca5481fd12bc314aeab0b1541c177f4c6035fa3c589660f36c369cadaed0128cf5470464694512ef278202d2dbf49ccb638fcbc047204436a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fa9bbd5e0a1520bd76b570f1515b8537
SHA1109792aa66a67414fcb0b98b9843f6c425b09cc7
SHA256f2df4f79c9a378a5676dbef39ace254707cf84330124f0bbb5a40e7bcc64cc6e
SHA512f9553c7827eebcac368a2a8795c46d70c89ede79c502f808817585f7ecf937a7c18dce6661b572a4cb5ebcda8aecb64d110e4ae7ed587fef9569197a8608686e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53a0dfb84c36f121c0b1594eed36b9c88
SHA1cfa59feb7c901b266476cd187a3903ffb5e7624f
SHA256221d8c29d552234a5a2a6933797f509268acaf497f49c312067bfe03c4c17a87
SHA512c05d02e4fbdaad0769a4d7f49d9497e1a4db0432c7d1a3a5732eabbf5f82d6f2326e8dcc65b1b3fe38787f1f9a5aefe572c372b6b68571adeed8e956d2391170
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e5c8eefdffebeccfa53ee97b7ca72d07
SHA1d035d4ed6d84ade3dc424b81b1f26e7d7f809f90
SHA256a3fb127570445686a081da0dad61d52f4f9499c76210715b35b15d1320d4c2ba
SHA512db1cc77f56a350d10e3028388c5d92aec8bf86e109812c6c1b799d32758b904a9eec04b7998dc7d77badf02a7dec30cc76c7689f4eb539bdb004bee791feb40e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e8ec66cd44c4b1f5126ff0c865b97dc7
SHA1ccf958558048235b9dd1c984a2a7fb99e8f75888
SHA25686844ffd7d70bf4358e37ceae82a8c89a8c74dd131d317ea8f5c76f6bb2fefc7
SHA51288a5b09826fad74e6df4565261ebea759c2e10aa2561c4e1ae1afbe1ebeb57d0d1ee626b852a66135cf8527c8e1e753d3eea38d79fbecc577126b1dea7abc0c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5496a033ad6aac7ad6d0d71063f8dd55a
SHA12b0a61ce2b3b540b19d83b63a62ba1c0bf75e86e
SHA256b94b7ffca092ea79969971c8d72012c1458b865c174e8467ddfc191b5979ba52
SHA512a6c72162a18f7844e215045453be2ac392974c66a2a485e743bd36c070739c3266634c986e3bd914bc7476f2703ead215d0247f98d19d7e4baf80c8828bcb54c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD547345d43d12bf66a62a355b7e581e1ec
SHA10698f64e4e7eacb6b168e0e6fcc5c55b13440580
SHA256ae02fe47d6ae0f60ac8b04e95bb02eb88fa958ecf0839574da3a105bd6ec6323
SHA512cd4a1d922916d6ad3ab0847fe25416a10f0b526424f362b0da1151317327e925b4668dac2644174468d5a4c8de75eaf2d942211f9cb892fc35745b0ff9e9981b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50b6a9069031971f2ba8919e12dbfe232
SHA194fc494d9c5dae01195098d5121420c3a301506e
SHA25637ff106769ca6ef7c8fa2ec5205e02699bc3951a9ac356944b6f49f83e3b1316
SHA512f9754537c4c0476979fb5371378722567e05374529d9f75725fcaf6de2dcc3a9089b44848a66c4eb5022d9cd0035cc3bcd70c244a16e4d6727e5e7ffd2f0a5d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58d8675b74da842d5832432f4a91c693a
SHA182c46151e43dfb9d4878225d8e315ba10172353e
SHA256548e9d1e9a8ca20df53fcddf4acaea080dae93e1dd30f8988956b3dbdf3e1f5c
SHA5128e241246f46d317c22c5f74f7615b17ca317b37556564cd15dcb0e827278fd79acfb0ddf4179bc734f8ad0bee3d8dadad421d6bc0f3549b801d8053b20e48ba5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5907c85ad22b36473a04e830c16b83e4d
SHA1ca91243be005f758b0b7e142c77264f180f87c0e
SHA25628acc5b0ebc59dd4d212ac41764eda0fabe289bf9278e0eb787ac3826ae4c566
SHA512907a1b68e5b0eca823bce2e7d986dbf7e7806403031058ca40805932398a9199e4c6c0a650cb377740fddb7e100e1920e4343d555448640f0149b4438e6ca9e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD527564196edd6d93b7b57d90606df0d75
SHA1db7635a73c9dbd10867ba5cfd58f8718dbd48174
SHA25643dad508775c8fe76d9c85982ea680f0e2f82305dee6ae84062de2be09238472
SHA51241a8f6704e5f568c2693ef3ede9812f7d3aa9fe8d4f22fb2515df6f38e124137e7c1275997c3f6390299584cb56a99ed2dee067bac374e68f2a6329282735d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cfef10b457b5fbc39a671e9f15045c09
SHA1e27a29d9eda4621fee98caf3587ae21dbd570a4c
SHA2560510c82a297bee480efbf45a00b5ea28c2c36e64d327c3865f62638376adfc63
SHA512dff7d1308763cf1f31c1acbd9b3d5145a8fd667a1fc51d702cd1ac8ef44e261880cfb1ee1743b7346107013496ec1bcd1f83b983b6f2c0e9411a63f310454f40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD583237dd5dd928bf5c70d6fc23ab37bf8
SHA11ef569a7216143eca8185863348ab11009ed953a
SHA2561fbf4be6c9c09888081004839ee3bb2d9a6d64cb762ad4ffdfd77b1fb2258206
SHA512dd92229bb1f805b0a8ceb4ebd39c7fe60b010cc1ed03d7fbeadd5dc1e48af2435b4e43f6e7c641ddfc7b9efc84898d8ee92cd29d7df50dfa9f1196bbbab8eb9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58485650ec8131f01da6f3dbdcf8b49fc
SHA137c58adf88a9c340b40296e58e28189116274504
SHA2565e327d5ee7679f8ce63577289b018aaede25aebfa4bda3dd7049d783b7b2bc0e
SHA512422ba60edc5c729bb1ffd01b2687510280d867f2eed0b81dd36bb7ed5840a0edfbdc477b1a81e2cf1c9ab925b360689bfa3eb396894fa1fc840327a6419ac1cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58efb7a06ddfcdc760426a9c997ca3390
SHA1ae8d4c466a865f984a2ed7c8df46a8dc44609a95
SHA256348e98f90db3843e11e40fc64da8b9452faecfbd389c052b6f178092a9b9b6eb
SHA5122d59802958ae86c43c46966dfd9ed651a53e0d89fb392352c2990b70513bd75804a0af239bde54507eb20a8953278257b7f18599a40d52a1c9e43c0fdd4c3d28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b474558f02e46d63ab9456276b9df5bc
SHA1f3fe61609b10cd71121920b9161e8bc691ef08cb
SHA2566a8219b568ccf19dd7afbd54e8021698330c425ba03068251ce9e41a9cbf7c48
SHA51237f08cd4b20de06b4f1e57e0639655b7aa92372f5f3874feb4d783bfa0721878496ab97bf5476fd8d98660b79575956f46647e9e7f76494a302e48948560a016
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58272f0895a2765c0fa90ca8dac38c681
SHA15288eb713e752bfb5928b79ea5315cd04f6fec1e
SHA256a33104d7ec650c01ce3bd410aff69e123579ad759a123d27ca2fec6b8f6b521b
SHA5120a2214aad77efb8b6334e7d3feb51fa46dab86fceee169bf2c88a08e22033d0b47f2402763d94b078b65f0f5230e596a4cd8d3901345482885599e5fa1d02463
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f5edc45b51e3a77fb8c952a11c50c60d
SHA16e894463dbb00bc72e559fe1d4b4721273a7ef4f
SHA256cd2504cbbfa586e1a7e4eec5bb1d400523c93d33d692896765eb3541f1c60eaa
SHA512a0ed4ad1e0dfcd23431a4c67b20f50d6d26dc97ddcaf6f7dd735541875db4c8dac9aa6d2a965e39e1fbb25d2c54e72e521e66f29943417689d7e39eae579d7ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55da5d416e8cbbe57494816879fbee12e
SHA18d8b35304417a06b5cb96534bc5cd1cc38b639a7
SHA25683e0c8aa32e1a40061fd0b8824317c2492926cc48863970c241a2f643352de91
SHA512e11cfce836d951af0452704e37595f4cd83924f368da4e0536618ffc176d929ccf12205aa59bbb6d8f75a3f09db1948782236fa199c7d481265a43bf3d1aac8b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b