Analysis
-
max time kernel
139s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 18:32
Static task
static1
Behavioral task
behavioral1
Sample
c9627dd929d593ba1bd20713c3f88169_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c9627dd929d593ba1bd20713c3f88169_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c9627dd929d593ba1bd20713c3f88169_JaffaCakes118.html
-
Size
158KB
-
MD5
c9627dd929d593ba1bd20713c3f88169
-
SHA1
d5157f37adc8f6d0cc0a170d587c93e87b2b152a
-
SHA256
b8394ca03feae78401313d02828ef32a83e908ded236403ae0d6ef4278e8c576
-
SHA512
f57996eee60864952f932167a108b9111926275dbf88e63d54c9bba9925fc78440ed2915e74b18f804d10ff5a363855dd5baf95856184a21f75f50875622c6cb
-
SSDEEP
3072:SiXb+MPBMaoyfkMY+BES09JXAnyrZalI+YQ:SirJBMalsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{044BA1A1-6635-11EF-B357-7AF2B84EB3D8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431118204" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 004f881942fada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000ea18b23b1076388e1b71d2b760384b7fa459a1870c7a276f624b9dd96c271ddc000000000e80000000020000200000001d6e6b1acc1ce490b513c1eac0f9793fe3163c8c28d109d4e7d2e6df7545b6de20000000fa51a9b3756d5af5a9d08850e7ca1259c7d68cf6db031a6510afcdc1a475161f40000000b6438ad11902c9388680e608ad00e7a11c4fe7b3b315a078b5ba1ca4111b2cc437274cfdc076bff9ea591d33ac7a2bc098c85f4e520efc38153b4510a7c1339a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2216 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2216 iexplore.exe 2216 iexplore.exe 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2108 2216 iexplore.exe 30 PID 2216 wrote to memory of 2108 2216 iexplore.exe 30 PID 2216 wrote to memory of 2108 2216 iexplore.exe 30 PID 2216 wrote to memory of 2108 2216 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c9627dd929d593ba1bd20713c3f88169_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2216 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD593bcd380d78d27d5b79de433cab8b27e
SHA11b4331c334f217cc1f38acc908e3126a1d1d0e1a
SHA256395251915d29ea711409743dcf2e01c9a9b77bf09fcd5a2cb30fc5a440dc15d8
SHA512a972e2f71b229c0259b7afd3b66c0a061080f711a197634fe6f41408ad1bc480422ff379d847341c8df9a7e184d1d2ce48d98ade66619b5967aa13f4eb2e2adf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52ce9ed4d42afddd8b7e0085c19f093e0
SHA1247319b11597231aa51817240e1e6f117becd84d
SHA256f466285b92d85b1cb5400b3c1dd6a38873057108bc154ec748ef559aa768f8c7
SHA51241a3800968dbdc494c9e62db5b8444821094853de3710cf91b8e9d4cd8eae0b62a425cad885f26c16750525ff2c3caa6c25910ab2d942c9802f485408987750b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD519b455097c6cec20281e0e9c5c40e143
SHA16ade969e7c2f3346b6b953956a0959a8e5246177
SHA25664be030a435a3dd55e908f8488eebf658aa6c2cc3ff9c914a95591341c4382f0
SHA512d6401bfaca1a550aa1598e26beb026c53d15b4eb462381973258715e198c381ea22230c0a1dc4512d21918063619f1a1249f45bcfb30915593ccef6af59ba677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b38fcb472d5b40c136a23f2ec9d705ac
SHA1c71d036e62d1d497d529d4fc9bb5d4556be99812
SHA25682e2fb9c5cb88568b043f5504a29da24176345ccbca8e369fa03560294777ef3
SHA5128d264e7df19f752c3674f8ee2cfde68208321e7ed070a3aff5c4d7340aa23852656082cdad6bb601fe0fcbe0ad5bf892ae84b4bfd2d46410027fd3a1ebcf98a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51587d5ac9fab6d2e130aaf51efcee2ca
SHA17258a20885ba7572e941d9de226e0c143079d64b
SHA256f4eeaec4f5f8f5426edb8dff23fe850c9626176a86c3322b7d3b0166429cb725
SHA512814dffe655850067592c7c67a3075adc3fdc3a473fc2e26e02d8bff884dcde40a4835ff5f616935ae64edd39c2e7eb6a61e4f9c345d23d85bef95680d0da7ce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55d2470893fc0c87ecdda695ad3864ee9
SHA1fd769eef1ab78b6f68f602fb6c2cc20bcfcf7440
SHA2560c5d4bcda2ffafce24b415b1a81d11ea12e70f2343ee0c5e72409916695df927
SHA5120a3ffea85dec23ce4b13b192f822d1cfe8fdfb9662613a8c8d57167b0e014ac2321a0a682dcf44775fe84d8455871884510ecd44d560c653a3243cf8652d9f5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5034dcf5d5a17b45bf585ad39605d95db
SHA10e930caab6ad7108d5d43759e346f16a1c4fe607
SHA25642af3c4185dfde7e5e2d64d34e70286ba2b809af2662d459b6626d58c28d6266
SHA512aa783b084d40510e3215a1cc0af00d7ff7fe8c76dfd90415ce2415656bb63cb3e69a611367796cb13e677840d3cbe7dd6ac75f20fe9a98260482c55725d14b93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f6fb47ae8128180f66c44d2ae7fb1157
SHA13a63c42fe03e42ee8dc3636567a8c3a38bf6a5ab
SHA2569a8c5e704efd1e2c5f23a31ca062e1a5ff1cf2f6490e9830dbb98907eb1644df
SHA512e5ab45f22cdec6807856cf9abb2bc52304a09b5cb7ade4eb9ad4f74bc8772bfd0714e48be165a6e6725be5919232fecaa82896180273d39d0736af986981cf6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a8104e1541505df7d1c2b9f1c6e503d8
SHA1dce719518d8edf3dc9e7c7535909267f60e13b15
SHA2560068e243a4fc1f1da19e004f28556639e1c34674e16d4467809391464f50e131
SHA512e1e78a9e311378e93f2ace2fc2a5777b8d986751c72906c79fa2725265bce087d7c5efc3d7563a70e2b693e319119184ac8282843ed6c6c727b4cc9c3f882aa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58fb59386cda2d44de7c961e35d8bd5d1
SHA1ad69df03876ad258231ca26dd15a7bd1a02a069a
SHA25627d3a9ef185fe8b8340fea7ba9c6237469a4f5a2a8b3199b56096e2fefe056a1
SHA512be48f02e920dc03dcf9be427101dd57f3d849828d078be8ad3c1fdc1fbeb79a46cb52e1621f8aae73a59acc62cc5ffa65e97ebcf5404088d735cf54a94022d9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5583458416f6f4cd6cd1673dcd36e1124
SHA1471d502c84605a7115577976526ae5b919796891
SHA2562e48d6d5c22dc0d0f3aaab2fe07d50e1b351f273436e01fdab053731f269abce
SHA512fa30bfd067eeaa07156f04954ae2071198b8d308a85a616b88954f7ef42d57ce1b55993f15c9db29889b3d6f9fb26e06984bc7b185ea55dae0f886ad02d88070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b9b44bb4005073135b778be8f3f8aacb
SHA135b1f52175b7c25efc5a7b128ed25f6a75815549
SHA2565a8fbb5694e4da2c7cdd58f50bb038f655f6634ec591fa213b236be5c28371ce
SHA5127369f22ba2eaffb9bf6847b444ac0978385c2c223a9b1687a27301bb9b931e6cb2cd148a11c3e14017f053b34c4c77942a825d08ab7af01445fba5ef0458a969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57190e72aaaa0964a56d6703d3046fe79
SHA1d452495b235bdf6f36207b7918688fdf03a1da0d
SHA256fa6c18c1b3a1522bade0d2acd80a976287d6da9409fcdfc969492861a49b7b01
SHA51294f615ac8587b858d79b085af143587e1280b20d12b2d8c77fea6d44190c20e68312d764d6c90809626021f25ffb37cbfb2e1d5c8ee9fe021625c11e7ca77fd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD549e675e9b9323c8e36f3aae9a9c62c05
SHA1281f4a01ae4cf48e95b04500ae3e21cbad96c3ca
SHA256507ea08a8b37eccf1cb8f0b22bc484a53c759fc8118c8cfdd85911a96b839a57
SHA51220890d8b2a880463f5670915b8b35626696e4220dbaf68bb9d7dac4e3633f7653f6907ef879576b8bb8a9c27d091614ce95889c2851d6e9dbd467c428d263b49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5996dd102293ac61360a79a513cb9b5c1
SHA115820c31ad2e17c3775e23c52f88bb429a309364
SHA256cc611ccddf3ddd725b035f30fb00aa3a44691f954d5d4bcf870d077ec2d343b7
SHA51206fe1cc33c5682ae1f7156cbb0e3374197cdce5aa9051d02a458b70b891deca51881fd115cfb9041d2c3e8bbdd5937cd9bbb8397a43e445df9da6d3caa60d46b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55b2b5799ca4acae3d90ac0a33f3d2039
SHA1f937ecf07437f54d32a23aee81476bb92847da40
SHA2564ef85c863513cedcfa2152584457ab035fd6f08954dfb8d20808ded4bbbe8f15
SHA512c63aea4413a8e38e40f93758e99375f6654482cdaf849b5e01c64559bd6fd91c90f738804dd350bf3f83b4e07269c51b3c79148b422dc96ec2b526ebb0b1eb7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57f19d95a5c381a702c73575d73b06372
SHA188826f64972451df3c957dd1570a84f550944eb8
SHA2561cc178d1d1dcc194e0fafb4afc4107bd149a7c48d8d243a97a92584a1d886188
SHA5125f53228ad78c22b657973ad449b30bcd5b78d14032fe26f3093d8f7980adcbb41f29dd668ed217f934a25623a0dba2ff9822eda5aa55c1b33a04ac8e676aa3d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fa307a62b96fbef9841c973cbf0cf8f6
SHA121d51d1730aff277e86bc5621ce93e9e26df435e
SHA25613e623db9816a5c1325434c5b033a9a59ebb4f0e5269a88a9fe281ba4fcbe52e
SHA512777e06120663b6f3501bf1051f659b280b2be795d4415f431fd29cf979d3ebbb2d07f95a0d9d8298230d5080247a12e34b36003c788e2ee53e0304febef72147
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b