Analysis
-
max time kernel
136s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 18:36
Static task
static1
Behavioral task
behavioral1
Sample
c9644211d8ea41af3faba58b401cc9f0_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c9644211d8ea41af3faba58b401cc9f0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c9644211d8ea41af3faba58b401cc9f0_JaffaCakes118.html
-
Size
461KB
-
MD5
c9644211d8ea41af3faba58b401cc9f0
-
SHA1
f6cfd2ce1aae0eb282ada7a7815f4f08c7fbaf44
-
SHA256
da1e47ff2de5f7c602c63643da1e21b80bded5d2f72cc69d485f5caf93e23727
-
SHA512
bda33fb2a9d360d1ab29445eafeb5dd2d70c3a2276c33d2ded78f326de6ed4e5baf99841bdef790f8a557dab93b1359a9af68e0a94528b203b6f5c7bcf755b8c
-
SSDEEP
6144:SSsMYod+X3oI+Y9sMYod+X3oI+YIsMYod+X3oI+YLsMYod+X3oI+YQ:H5d+X3D5d+X385d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40f9757d42fada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A477A111-6635-11EF-A76F-5AE8573B0ABD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000651399437e91c9d1aeea8e0b20c7f0b782469fd2707036eb58ff4eaaa430ff5c000000000e8000000002000020000000efb55462c1ebdd17e8b4cc050aa61c65ac6bda7e639b4a6e3e9c28a233e957772000000057bdcdf56e9156362a38363d18dfbc01184b3ce189c1f66313b594ef1674b0a440000000ab1a083595d63514723ab61eb62a20882d0edfd72939a8ccd6e7e9150b92f180d0114355271ec586917799c9f17cb1599061eaa0e9e99bdbc62f73673b7fe242 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431118475" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2452 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2452 iexplore.exe 2452 iexplore.exe 1336 IEXPLORE.EXE 1336 IEXPLORE.EXE 1336 IEXPLORE.EXE 1336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2452 wrote to memory of 1336 2452 iexplore.exe 29 PID 2452 wrote to memory of 1336 2452 iexplore.exe 29 PID 2452 wrote to memory of 1336 2452 iexplore.exe 29 PID 2452 wrote to memory of 1336 2452 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c9644211d8ea41af3faba58b401cc9f0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2452 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6163d735f9c4e5eb8af3a2b45d941c8
SHA151f4ab792315e6ce5bb9b87c86a1eb13e43c9ccb
SHA2561b7b088d09458f35884bd133227aa0c947dd07e76c5bf42bf6b97f5880bf3480
SHA512ef84aecae9dc7c5fc0b9333b6688575b5f289d52ffb46525b3337df6a2cb112b7feb031556786bb526c50b7411ce3bfd53851d5375b444ff5ed3c23bd7845cbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4dff092f60da522c792b46940147784
SHA1c376f4a773345fa960602959b88f362485d68382
SHA256ab0b2ed079021d6bcb976757b0e3c8fa46486c06b1a08011560ea152cc7c9c3a
SHA51254d4cca4af4e36f060ec34b346cadee1ec04613934d36a9de133537afc4a2b87ef8dadb2efc87a16e11b918141f6a4497eb160818a7f0d37801b8c82677291c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e7d1c7d4cce8db5efb3094a6b08821f
SHA1c9abb3b92d877397b148cc55eff1ccab65779ac8
SHA25602bb96cbbf61060a222c2a10577adb91ae8a98a7167b173975b292932d67b4d4
SHA5125228bb4ffc60034845385f247405c34709d8221fc37ab8379549e59df2e8aafe9c7fe6d80c09d0b0c8baf53d6ad44d508da5dcffb86ba0d9c6dbc045de529400
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6e9ef803a5912f40b7daaa70a13baf3
SHA106a38b562e6740484d53996de3f4dc7575bec2b6
SHA256fe20aa9e3924fb48109432d15aa0422af210cfc7e8713a0513cd72eccaf907ec
SHA5125fe3984fd1974cced00019226d0c44214732c460392e79e9b43084ba0795c308041031bdef2581738492d93bf5839e9103c739f4277068575086eb61b57cbeec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5553166ebde4110e70945fed6063fdaa6
SHA1a1bfd9ffe062bade5eab7faf52d5570fd3924f0a
SHA256ba9a158ceb0de2af0af784bde10ed19614410795ac5e6d13f44f68e02bb9f41f
SHA5122891c91da05124397b007f44874abf45d45aa3a7017d68b85a681bc5b39dbd4d70ec72fbff8222b6ceaa90c696241cdb4d3ece4167726f4b60664dabc14b4593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527736e1fa24d5804bf1b459ff064d0c5
SHA181698ae40c811b4896d748e86a818fb28a165195
SHA25667d890693f5ff5f0d8a70483561d0af83946f30e3db1f6bdcc253145f6063211
SHA512a1f83aa83a29ea485a92cf5ede925aa3a35f774acab9e5cfddeb3e6fc1ac142cab2ed19a13601eabda44842ce126656a2ec3697d90d6d4a9829bcfc25aa3f899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597b1f8772aa30443c3bcfafd5ed39d16
SHA17e435f0fa5c08b2957129623615cd8c1ea257643
SHA256d569d0258eb198d33265cb306a57773d32cda0dfbd5cc95b4ede63ba0a35e1dd
SHA5121f29430555220f011d3d6df63fd317a2097ce83a434f2345c1c5c0a53ac3aefc5d774af4d6fc262cdbdc72019cde57f31f54ba06884be123b215e8a076d49d28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a13473004b028344e284ec6dcb3d2d8
SHA1bcd5c8a0e6393e1f6bee73cf008500aff5c8bc4e
SHA2561ea66fd6912ee53c009a44af43fd3f682b5c10c3a1fab5e6545431fc0546d139
SHA512dd38153afaad0f00524fe50bada42b82a1047b96c2ee5386095dc2a035a76952dd4193febc6c8fa1ad5a6c0c3ef95283cbf065bbc0438300502022d747278cb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a192a71b673aed78d3f5784f0acde4f2
SHA13d835e22f4e1a334b4f257661db5e1541ea8350f
SHA256e49d2be78d7ec2620c12b47111922e49e6b6937d9836d34d781d2bda38b73f9a
SHA51290e6862b36576fa70d31673125796535458cb6f770e29cece50f9069d9f8d8a716632db47598418486bf33a0faf6b7ab8d7f9a89683b3c4fa03df03d4847c2db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad5fb45a38d194e3e02d29dddc6c80fa
SHA1945084268d47e2de86243a5ed0e8da4d36d9bbe6
SHA256018c9ef89e6c5eca31dceb7d5cfe8d5232558570fc1f5ae4207ce2c22e81db3d
SHA5124264439061d9b5d16348596c0d90f98cbccc51551d94f80db8bebb098b19f6b636368fc39fd5c2a34af5ecec326852cf979c5e8cd782ebe9ec3102c9f4a78ce7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb47b3176e50ca5f5ebb1a3b4824b0e2
SHA11e4314ec2c37d20a9321b2fa4467bc72760e1440
SHA256328349b435675b5c6dfbe72533c5bdf841ef7124bcda0d63f8874e8c983341c3
SHA51289392845f94dd324fce3fff0199982bf57cb20c5e772ddb4e92eb7b1c615135e1377b159c3650a9dd36595fa8f57270fd8c3230ba89c90fd3be7983dce02fe33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b18d610646dce485d3bbf31e878b3e2a
SHA1fb59569584789fd55fe406c57c1ff75ae2d8d608
SHA256f08308bbd76428e8a26e9b09289b904d3e2ec784ad25d7c6c10bf997b8da3ea7
SHA512bb977ce32715224c5bce8aa9f88e755f28f11f98adf2a86901d2bd741ed092d69c42ee2f28b6d4cb042be9d3d199598ed1f2731e2fb6e1f2cbf57a37323afce8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510adcdb922cd3297fb06b858340558c5
SHA1ee05d33a9de9c85b663c6135664c347da94ca57f
SHA256cdaedac697609fee772c5b7e368ace68d96f49fa6a0d4765d95e72a44c3dc577
SHA512afa6bbe3cdf051d0899ae12cb5e8b97c8ab048eb9707a8ad17e1708007225e847a19388e9639009a276f6c4d186ca24e4898f28f229ad89642812ade8be9e5d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54030adaf8de4275e7c33ba1e02336d64
SHA1ddbe770dabe12290b78132aa2e1426eed9641fab
SHA256f6d2b98a65fe4d269116075800e04f8ddbd01804fbc7b877969f526f71154edc
SHA51227264a86175fc1aafb4cb8b5ccdcb74e93ee73673940cef8c80b3fa7aa7636c019e797cc26f7d27939967790a2833f27e7299704964b8ec6636e3e5276aff891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c82fecd54e9267973db2b2b8d162e51
SHA1636f01628b959cd8f7dda494eac99b5b678a2180
SHA25689ad9d346f59634bbd10edc688b42657e82fdccadc876cdad459d2353c3c987b
SHA5127f5c9d321154d591f54774f06bae40591d434fac65e947aae969fab1dda6d950ce8470dc423a041231022da448992b2eb16ee22bb66f4c0878046c4b648d289b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580eb898e6a7ec991a6ec681f849578b8
SHA1040a5ccbefdc35b7355d9a91e24d4a46ab2cef9a
SHA2569d7e94dc720f6ddf688a1fc1b79f0f0805cb3341453ca91f6cd957e7634bce46
SHA512f90e68d0bbc85a088f5a5e43b48392b3717c850f6987ed872402e65e34b0ad78908b14a215de4741ab9939d8b35a9d141e20f673baeaf17d51eac362c9872665
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f63f5fe1437070747b44f37be16c8972
SHA10cebe91181e8813507c6dc5da7986a32ef362f0c
SHA25624c8dc6c2769533429a82cc8f7ecb8f826f35f62b14faa984d9829eaa5a928cd
SHA5124ccc0e9e2247be4a55f23cdffebb114a606599967bde6e78301d7cc94b75a0ea450ec70539f40680ee8ba9773cae8cf8ec25af81ac5e714d81108bf77be1e010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0aa15448cae5ba52aa5dddb97099a50
SHA18d38867f93c26b3dbfc2b6dcaed8383eccd9e04f
SHA256dc27b846f3814bfb7c3fcfbca11397bbea862c1b3578eaa1212d113b12508472
SHA512f05783c292705f784963182be4ae15f9b0b9c25044b2603878df6092d63ea61472cc61b3b3211dcb0335d1b04b5cf0f213a03a55e20fefe6dfe81b7e5ffe139d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d70e4199b0f588310363914ef77aaa9d
SHA11e1284b2f8fae0a38172867abf3676473eb67cfb
SHA2569564f5cf111020852d8665ec27ba1ab7eaf71e97877e63a52bdfcdef20477e68
SHA512af0493ab6176f0c4a598ff987e85c33b0c6d060a1de2e02e54a5a672ae32a46f413e1bf382b04e537fc9dca1a2a8447915c77cb408f5b3754d55fb8dad1225b4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b