Analysis
-
max time kernel
138s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 17:17
Static task
static1
Behavioral task
behavioral1
Sample
c9438df4fc3ae6dfed2a7e2baaf81218_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c9438df4fc3ae6dfed2a7e2baaf81218_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c9438df4fc3ae6dfed2a7e2baaf81218_JaffaCakes118.html
-
Size
29KB
-
MD5
c9438df4fc3ae6dfed2a7e2baaf81218
-
SHA1
d81d6b99b72991c16dad282f38798c9942ad43d0
-
SHA256
973e1a2efd335f6a5cf1170d7a58e53beab0c20cac7a350af220a1f6eabe7d89
-
SHA512
005b991091ab27f4692ccc9ff0a8cbe5e204a89ab950969ff01e42dfc472f30899b4c2b5389e0c3c15ded9352d198558195f8c9cdbc914450c0f0ff20b0a59f3
-
SSDEEP
768:CHt8ZKycCH5UjN/j6ceV/L0Av2SVz1TGPz:CN8MFK26X022SKPz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20f9a86137fada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431113710" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8B3F4DC1-662A-11EF-A173-7667FF076EE4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000002d6b44230f3460fcf7a0283bc4de2e1b81cb6f75b51a7c090897103dd66ccb54000000000e800000000200002000000040fdeb3217d4e1f9580bd5215d97dcbfdca5d77618a2d20f9492c06feb4c74c32000000011a3fda00d1f9b9d34ee5d3fb14d002dce7fdf795a641875911fdf12bf30361c40000000e6053e3b1b7adf50e2442081e321f00ca84d4eaec89326d0c724bdb2d2585ec80c264dfa557c66ccf0c271a6a37fc8811ebd99f7982510756f2e8e0f504ebe6d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2112 iexplore.exe 2112 iexplore.exe 1824 IEXPLORE.EXE 1824 IEXPLORE.EXE 1824 IEXPLORE.EXE 1824 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 1824 2112 iexplore.exe 30 PID 2112 wrote to memory of 1824 2112 iexplore.exe 30 PID 2112 wrote to memory of 1824 2112 iexplore.exe 30 PID 2112 wrote to memory of 1824 2112 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c9438df4fc3ae6dfed2a7e2baaf81218_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5e33a2549e0c826d9884beb69ceed4f8a
SHA12f73e303c9ef4e3c113db89e328dfe90135184da
SHA25688b227fa494e9956d9feef598153610a7a359dc1ffba442db67f293b96bd49c4
SHA512494ca2bd5f77ccfe540013065df6e3dcd8afc2e658058cbaf9be6e3b0dfa8b9b028953cefa050696b47698367c848b9f358ca5af82b96161596bfb4cce49409f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50c866536f31a5a46262680aa431077d6
SHA1850ef8c57c476664ddaf990f8e456ea10b809fdf
SHA2563610c3d43e162a8b61465b736adfe5f445f1085f9373df13a841064f7c3107b3
SHA512f130c83d312993ce9c36dc13557921e788f18de1c7d53e1ad786cdb17167a0146ead689804370054209dfe6cc6729d14775c0204262a2d115854d9fa1dfa28e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD532d165b08ad1b4de0a55f56213e05e79
SHA13f6db7c47cfc110b1561c1daee6181a3f0ec1074
SHA256036cdf8e7666b0c357fc283f188b52caa53133cae50cca6e68c9884ad1d7f272
SHA51233f0666a39007eb32619b22ae8e1ae6c7bd915b9ca1420876c22713ec6dbad1969e6aff01ab170256b936c03c388ba14068d01b226708f385b64c7971b73d46d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD556952b1579dd3a5497ab306e90e37a7f
SHA108781d092497211937f37a37ef7407509d1e209a
SHA2565d05e3db1431c210f30461e7fe729606abed90f9120ece5c825b6d6d18d24096
SHA512a62a115e8bf60f48970d0417ea51a4a65fe151e33425227ad55f5055f9616ee0355f5a7c29ca04493b68eeae0184eb124785e229300282d32560208608878cb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD527e6a78fa5e98afa39df18840bd4d9e0
SHA10f824881199379095676f5185137b449a289c3c3
SHA256f554d5791eb0fd5f62f26288d882295e42d30190b28f461cd18b106408064a52
SHA512f1a1c5af53d2967252309cdda7f63e262013151d2cafebe5285d9148b8af819f8e1a0cbe862c758bfc951d507dbd589e059d1bf8d6bb266114bbe18f8e09c96c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58f23fd8c90bf95696139995b1cda39cf
SHA13ce9490c882c28248866d5e8218bac176f90c119
SHA256cdfb55135495aed78d4b8da36beb5ea1ed4bc268e096950046379d0c168c602b
SHA512aa0f399bfc627bcadc3d049f91a0cb48be0ddfb4c76d6c53ff4f81f78e3e65169b72c3e36179990666a2cb43c2271433c11f258ae39fbae51dd3409ba67983e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58c2f42a5182505edbb65a7e374e81696
SHA1fe5fa98a24bc0df804443e9fa91e57f4f4c78b06
SHA256b4265ea6d008eb57774e6780974c13d6cee05c80d662d1a41fda4e4bf3788f7a
SHA512c11e03b7577736da7ada7246fc43899a2df62f4a5c42e2f99407052f98695ee1bda674399ff53956fd5ba59f26d82fbea07b2a05d2c8c5e63c767b7256e88d99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5483ba09dac3d5eb5c1d3cbc187fc2d25
SHA196ae185080489f2deaed4a218fa59821396e4e87
SHA256bd20d99df8a731678dd3a4f9146294332d6a3123d9e1900d845e4ae7cc5cf207
SHA51268f970ee4a78bb9d9c21c79f58a8e5e609109a7503e9b0f0409d8df082c7ae88a5a948c1bd16041ca6da2ce9b6ac24f7e0db80192e6d7c87a7bb9866e923c453
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58d671667cb73f76805e5c29d0cdbb74c
SHA1bd7171007995714baa59c7d38e01efb1d719452f
SHA2567e0ceb10a73c5973b846bef6c3a806221d3792b4ee0fce1d3a53603a2ee20667
SHA512f70ce9fec51b0131224c266813b4e788440d379f9ce17f60b108dcfe062e5561fbe5a1845ba54488cdeeef31ef97ab84d5c3a13a492179a6a0908508cbfae479
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD525579fc8ac9f1aa3b44e0c19a6c4b9e9
SHA1ee6b6458f9c68c804a214835b52dc3c9f0a86f3b
SHA256ed0d7d69e846a019842bb7df558406b03122257e7930bcff02e01d0deb706aca
SHA512468d60776da2de068d20f1fe02012e51804f75c5aa14092e6d41cd03e6c7722abfd5a9f1a5480a826f44dee0501052fefa567c2b737fe3edac595a67da49c2e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b961483bef274bbdb4f550fb2ce03932
SHA180e5501558e422133b6cf15aaa96aa4112969e7c
SHA256d5c731b6c29629777d13ca92f9010a44565fe2fbef8432381e77b13a91b1267b
SHA512c40f790217cab9dbc7ba73ac3fa0e7673ba188e0f36eb6ed42181c788df2afe7d1b1d90be5cd905e38f69d84cd89f22ff362353918f4c0b6b6ee1dc23c6517f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD531e8e8d066a5b455f12fddfdd2db27d1
SHA1b16855cedb8c3fd146ccbd618650ab6c919df6e8
SHA256a6121ee0cd879f00dd3a93f3be110c2500b3b59c3c2aca0b40e973e77cb11738
SHA512a1fefcf0b0e8073e180d150fdb746f19559b11a16d0c893c14ae3db8e320543f627473fd05d9ebbd48cc3038e305dac67590f2ea6ec3b4f5a9f37274a4493715
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ed23085439e7f5d7717a9c7845cfa03e
SHA1b94db3cca7d91e7e17f4c880cc2bef1b8f575e6e
SHA256a352a09b8f4c2ee644abd7037da42e5e50296b3a1a6d48de24cfeed65514f82e
SHA51252b3c4af132eeba3faff2f99402cd22176fcd9e4352c6e99bea1063f6787dfaed04aa6ee43278322182ad50a59811efe8bf3900afaf58b3648456d23199f70c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56d6082234dc8b945b2f460fdea1010d0
SHA179c754a968e0a2584f119da1614de849aa4a717e
SHA25663b39d42477a8af91405ee6f88088a4f91fc05cf9652731fa39a18035fc81c21
SHA512be483ce261c20ac1ae5955ccc1907aa4b85ad3d102a241c2275ea91a4b80edffbf0523c05fde59c84e3ce164b25de6e2551f4f6e97abee45a898a53685da1e37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD53c228f1b8e2f746a9eca4082dde29ce9
SHA1766be4e3b83caa6bdaf8f0f01f411a980e9cb9d4
SHA2567d9da6c3ebdf512799ac18f3b88266eddc49c6b65462289b0e114388a7268716
SHA5128396995713e903c2e8eacc5b68a06c3d1dc7541f763d737985a705c46424cbbe7a1fabe0e2216d64cb02e6a86c1f65295fe5bfd53735a44a2c13f4030ce825bf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b