Analysis
-
max time kernel
143s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 18:53
Static task
static1
Behavioral task
behavioral1
Sample
c96c16ccf88e31f148b677eeaba214a4_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c96c16ccf88e31f148b677eeaba214a4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c96c16ccf88e31f148b677eeaba214a4_JaffaCakes118.html
-
Size
139KB
-
MD5
c96c16ccf88e31f148b677eeaba214a4
-
SHA1
02c064319dcdd3f388c7022c5d2ea0bed2d49310
-
SHA256
c2d4682dff2dc5511fe7c366551a6367abf1ba296144f5af4f1240f0283297e0
-
SHA512
20ff984552db1802cba3102df3d3e215b51ddb92d870e244458f87eebbc28db0bc5b5a886f6131bf228bb93a1906c2a5a124b3e9c3a90e066a98fa239e2e3f5a
-
SSDEEP
1536:SuTNC7XYnNloAyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:SuTpZyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431119495" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000a98f98107252d06fb4970c7d3b51d0d6c20bece1faf02598bb88ecdaaa357f6e000000000e80000000020000200000005b83dbae09f83b381a61fd76c554d0dc1a2ef0ae82a82ee4b383c22e5e7c77562000000047e4690b07c552d0fae443eff1fe36f2f47254516f7a8a11c1c91dda795f021e40000000c4a1f652dd7261f721a4abe2599648977af5bf48eefbc92e43e5e655be55995fa82c34032287b6e42e46daa838f96c2526ec6fefac0a1b587a7ac94b035ba1c9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4022641d45fada01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{05CA4331-6638-11EF-93C1-E2BC28E7E786} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2292 iexplore.exe 2292 iexplore.exe 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2612 2292 iexplore.exe 30 PID 2292 wrote to memory of 2612 2292 iexplore.exe 30 PID 2292 wrote to memory of 2612 2292 iexplore.exe 30 PID 2292 wrote to memory of 2612 2292 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c96c16ccf88e31f148b677eeaba214a4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56efcceb2f7e3b93747fc64c8e40d9ccb
SHA1869a0a559ebe3061365e8253e4d85d98e25b894f
SHA25614404c2cbb91366894ad4d6633cc3e68f3ec291f6416a76b8420acdcbad4007d
SHA512d2ba7ea1367f1372409dbb26e1b49b2b6d1e02b4be2738e65da37221dd8df1624c3086ee2d3a877cd0f261ca4b4cd1d76a381cb219fddb1d1217037d3366c2d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586036f221e1403895698b7d6cbce93ce
SHA1c404c8d1767fd9d325b7686870f924dd2ddb5213
SHA25668bc58e39c35a09f52de3f237e9b82dec50775056c5cabaa31a3a8be554aa513
SHA51257ffaa8b3511948fff1f63882c4ac10ff3f95763e07c32a72e4d22e5fc695899e863f56b3ff6ea9f668789136085fbab4ec63655a806c8791247c3a9bc613e52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5155a08d2998ca51ca0412fe4968e9de7
SHA155503f387a79dcc0d1dc715121babd933f670c59
SHA256d3127e39ec3bd4d4ad444a9c9f4442741bd72e7063de19ad1033292afc27f07c
SHA512cb0ebbed3e8153e27273f4069d14a0b0429dc22d578d2a2e495d806988f214ca0d600e4529adbed7cd282c18804263357af4db3351d5aba5295a2b0b66999131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572cc7ea839d1f67cb24ad602ffca03bc
SHA1fa70a0f85a101a57f06cec94c44986c8858e0d38
SHA256054de5004b95fe75ef96449925517258085a54cc3bee4d761a09fd5484b2c7f9
SHA512ec624e6a4f050ad6c53ae1b6f34e3a6f8c79ccd0b5d639605da5f20e06717cfb9f3b97a887d190b2963867028b5d71c9c5150c9fefd3e35b4e32ddf4810a31eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c88aafffe969c8a59508dd0692a87cc
SHA1ecbcd59fe8574a878dbc8c0a2bc67d528a827d4d
SHA256b375a933f5c3813e1294c9ef7b733f577b28e48e9a79f34610e7b408c46dc23f
SHA512a663e5a932bb60496bd1acf6fa189495faf0ffa45e4ebe5c1190122b547371245962866646531887283495302797d1f357eaba71604deeeed0ca50440bd97413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57338b16ca4e7adfe97cc4ff3aa3c3988
SHA18156b832cb28013815df2772ce7283bc37a760dd
SHA256c94544417a985b94e2bdd005f5083369d12a60c09c0f0e2f54838ecfc8f31020
SHA512bfc08b36e1af03e233f0d961474ac3636c6aed6dc3f855229576a2341c1a0089cc4656eb10168863c3eb329db41e35c126fd7b33b061ff34b68983eea812af4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52671bd57b8f9e6b17c1141ef1a462359
SHA1fa979ff98d99d2214d6489ac435ee9a3641d97cb
SHA2565f738c5a9c41d26946bb951078ae4f0904d4f554f30b073a3d733cd4d82a41e2
SHA512a8d3aa209fd8a0329770cbf0f3a6e720f8e485c446725fc7c981788ab49acfc5b17b67b0f1517d05c2839f6a6c01daca41bf63a142af4251bd450ff2438819ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5501618815e1dad330582c7abf21cb156
SHA1d7386e7b4089880909f6e1fae20c656f38aedbf2
SHA2561ddb005870e493b6ca348b037510e7449c124ebefe49f687ca302de748ce920b
SHA512503ca3ef25fbaf6b2c6637aaba809f8168b2b285226d4baea53e140391a988d00d562e3c16063d72e3eb6dccb0d7846375bac37080b9a2db7c08f96e31e23893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef8fa416121f9c70888b4bea6a30270f
SHA1101534d2ed94aa164e3503e8cf0bc3916a2ed497
SHA256aa99abd41440e0eaa017a8472ebb47f2d56f1e3ab3bde2698eb1f8534b3b817f
SHA512bfa5aa889457fd1daa826c265908afe5524b7968a959bf4619a63222b94fa0ce57c49756c993568f7bc534eef7b61d7c1afe643359e90d44710f8ecb8874475c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584562fa4af9d73d2c80ad95c441cb7a9
SHA1496c84d975cbeae16ece7ec4e19c5603291a6746
SHA256a9e850d23de67d73c887c73cb5ac1826af1000530141719a2cc039f9c7d41d66
SHA5121ba723ae2e3b58f75f9530c22884c21ef318b744371c962ea6e57475990501750c314b6d750a71ebd1f170a3e5a35c4b335f947f8c8eadca7f4977743e58df2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5654a74c7348622a8f60059cb06964550
SHA1abc01d4f9199796c7fe96fd6544db670ec0f9dfc
SHA25639ba91f2fae40fa3185abb2bddce572fa140659cf3d710fb8dce77205e33e3c1
SHA512bad4c12f202c8fc4d2ca7667dfbac67c167204df9359b2b598d211a29eba5f52faf47ea027c0890ce2e57d69b15314edbbb41cb1666cfc47d215e5fc0194ae92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5863d98d7b8c431dd856b5e0d6df8cd54
SHA120909ad076dba3720da750b41dcab3a7b2555421
SHA25681dbad19273d5758be67d74318b7e1c7e5282f77bdf795066e7fc501735ed923
SHA512676bb1e573de580f24f4657a22766e9ad853f5be4a5b8a3b1c3806a61a24907efa27bac32800e9ebc9c103e646f30f378566556fba7c6d46a77e796fb43688ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579430acc22a5634ca5e7056d783990a4
SHA13ba1443cf9eaaf46af29de4634198eb45e0124e6
SHA25605669c3b289b8bfcb0458a263d8d30c2bbbe497c0e3443e6f17eaa5ce99ecbca
SHA5126ef4c9043a8b6ae9683df5caefd0c8449390e7c4071bec0433aed814ebe3580c5b659699c47b18182f58c7e851c331dc6066cd4c171478a609479804be7b095e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4a26a40536a22000d3343c9f17c6f76
SHA1163e087153a853d9721804ed029fc945f50ed5a5
SHA25658b12481d369a00229cad68671ec598070700ed189a7b28a2acc25bc1bc96246
SHA5127dba580ebea6f404625d10b34a550fabebc4ff5a59d24afa1b639e11fe690a03a7096b80944243e1f2ab0aeae33e116e2860a72b2381f67974758f36455831a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544bd908f72e8bac0d7ed92ddd5b9cace
SHA1e1f4525413c7627075f659a5c0fe9615a50448b0
SHA256f1988fdc791df692f6cce4166ddf44c0ef0f252c875ab85e21bf30fa6952ce2e
SHA5125b4cd2aa24fd7eda1ff65894a684945b63c442562d99e513686991fc33b0857ba42f43d75ffd6a51fd62edc298324af701121e0aa12ad296b94481371ce6b4f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f786f302d631ebbccc5384e3dcd24ac
SHA13828b1a9a2d9a3a945cabb5a5499c76fe0c3b273
SHA25620011908f57bb7ee557a654db23e44e7a6a6f056fcd0d3c2e5edb7e28f8b17e7
SHA5128aa96df8c47624c6b5da04d8460ad1ac909bd773b5275cbc58fe8b0367b500f9b99518f00fe2a28a1902c913fd5de020bf65d53e84d0a6ee8aefff8050b0b19b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5680be2940384f420c35353a3c14fad20
SHA137890d07999d1b41bb1608ddfa3a4215fa4478a4
SHA256e9f1f277e2f9c1ff7be26ff593c7634b1ac4164fdd3c4c0a276bfa3d6f3c0739
SHA512edff135356ff2d8c8dee7a4790a051ab60219065787db56f6cdf68bdaea59296c99f05e8b71eded514c6a0401a8a29374d01834e357a129480dbcaa640d59ed1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5131b685688444a06527d084d2ef7b08f
SHA1ee1a6c43d572b336aa49fc3ae83757e74531d8ed
SHA256a7e01a2bdf4caf92d0a7e85dd6bcd7a5e3f3eb843a358355c4e9253079b26d3f
SHA512d141e1d1d6941a6343293e656887433e01e58019595b60db6cd5ce5335623da3beb07f984bdf25d38384d5b31e16c64ad3063d35122fa26c3594627b217906cb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b