Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 19:16
Static task
static1
Behavioral task
behavioral1
Sample
c975988da56120e107cbec691dfd38a2_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c975988da56120e107cbec691dfd38a2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c975988da56120e107cbec691dfd38a2_JaffaCakes118.html
-
Size
11KB
-
MD5
c975988da56120e107cbec691dfd38a2
-
SHA1
a6ae263b041520b85ae63afaa1669c71002babec
-
SHA256
24891099216439b522cdd39c34c0e7799836e0acd9fb2eceb1f7d15807a078f7
-
SHA512
5fe211f2b62cd208036c9411d157109e78641f859bbd29bb566c95f62fc02010b629bf8a37e31d649d680f58f8d75bbb61d7a39de50dc230df3774e4244a56d5
-
SSDEEP
96:Lm/C6V+ZZqacS1vFvhJCaDJyjXIRKDeWo/nym3rVof6ym1QnQvlZ5hQnQvHDaPD1:SxVA2SvuaDJyjXIRKDvo/nymbhymFGhl
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000b6ac6f67e685a80aca146ee5fa7d462b179aad726347ca30480677c3607fc69a000000000e800000000200002000000021a97041a21c6f6acc91937f1a2609a3a9b68252bfaca9bb52a030d6f1686ba7200000009a6ee6d73c424a9424969dfcfdf8ff04ab8d3f7f7b643f1850b5a3cdf4d21d6d400000006bd486fa7d845202d282f8734645a0f7fa6786b57f66f30a8abb89ea1db8e5a16887f51a7faa7789c3ba7b590635a6f584246e4a629e52ea07bba7c03f6093aa iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70c3091248fada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3D85DF71-663B-11EF-A1F7-DA486F9A72E4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431120877" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2764 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2764 iexplore.exe 2764 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2368 2764 iexplore.exe 31 PID 2764 wrote to memory of 2368 2764 iexplore.exe 31 PID 2764 wrote to memory of 2368 2764 iexplore.exe 31 PID 2764 wrote to memory of 2368 2764 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c975988da56120e107cbec691dfd38a2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2764 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57df8031cb80752079cdcecbc348150ec
SHA135879350b10005784fe464b1adff8a8815a176ab
SHA25612890635c4ea06c8821fd0da23d5b10cca14f0798773b28ab5b62a5ffece0b69
SHA51261144851b6990f904381aad439245af2bb8c0b6bcee79e2fed2685be5aaca860c477d372b0146a9dbdd60277fa724d812136f81190bb150887ec1807769f958f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b77ee95892e7d4dff681b628f7c00b0
SHA1110c3ce268024ff490470792c8799839664fb441
SHA2564b858646b79b5566fb26e9f3bfeef6d171840a53e57e02081638fd87c1843f2a
SHA5123bf23f3e396f4e1ab44aeaad70b5f40b9631081464469e9267bfb0a8560350a55da4b5f4c85dfaea6f878a21d5f6658feaaf8085cb723a289dfe0f18af339399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5888e3eede43220af0dedf65540c18cff
SHA1dc79f5886ef64c47efc0a8d17d58925ba7b955cb
SHA25676db1f9738b5e13087f20565bd93a603ac406d0dc2f705aa6361aa03f69fa64d
SHA512335f90e2ce919b5ceeee86cfb89e6c392e5b6b9bf4b14dd8792e1c649a234f55a7be274d582d732f1ff4264150af210fecc2814458bf3d74e34611ca34d15c95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545cd660b20d81fca421e83418887106c
SHA1abcaea61c778d5ef584ec202043107ab4344c697
SHA25645102d68a60bcb40ca9c0b13b2a922c7bbbcb00c70004254f87f6d08bca85c94
SHA51271b9e04d145e9596d3482f0a132790b151be7d06217d8a4be62160b4ecdb1736d0e6a8caee47fa0a6a5b8636a7d20ba0bebf7c0a532b6abd2f3808bf37761738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5280e363fa24704df3c37acbf6b8e3214
SHA1e43b40bc68b494837621d1ae14e47a915ce7d231
SHA256e05031dba1c88f611fd81c2a6137784b3ceb24cad7a05f9d86eb03e359269299
SHA5122daaee9c202f9c2f80328441858e68b705719e11867e2a3f390123b480d058f2535bb2e19dcd91b355f581b8de3e633e9afcb1fe9f14fcdcabd676882fbff538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5742a189fff8fccf2574f46e2feceed2c
SHA17190cd66825520330f97d910dd4422d291c24bab
SHA2567bafe2e1c96a2e42123f2f8f1a4f49754b009473154837a8fff12053e59c0c84
SHA51226407946cf2f2d00653aa7f26e304d6265fa451099904a71cc1833e5e2dec30eace68bfcdb97f53a17226b657c81600d28420e222ec1fb418959ec3c595bef32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5802a745af5b9423f2512e350732f4b13
SHA18b02e621e22220f59db4852cc7b10db5b950cfb4
SHA256edfd9d055c74416c0cf81a988eefbcac7f9de8e91fe7b473041c372687aac73b
SHA51250bf0271a2110b47ebee826fc8c59816938e7f2074fe1846ec1908603f6e6c00006b5e528fca664f9b2a56f3961c2fd1a39a02b15bc682abd008cc1353138fd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a4c94d356e09118a057282efd7b3f1c
SHA18e112c23fc4fc6d659aa29d61966112b7fb7d177
SHA256b7b96c823407dc5b0b80f8538cb363209e278636a953fd3647289055ea8905ee
SHA51250f9adc57f31da8aa6528c3894de1d3ee231a028dab007446bcfe855eb990b662a80816c58395e8badb071704ae3c33be33d64424c9cafaff1497e2ae1c757e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568d05d4b74461038c6c54b4e07543a47
SHA1c7f745d8a0df720320ed1a0b490db72bd8c2df2b
SHA2565e70612f12eb09d14d50358595a81f601e267efb8f8d5ce4a5fb0131a2683a05
SHA512885aab294eb55688ced61f0fe5c0b9a9c5d982eda5d8ae41a20e5c176d4624e9fef4c05eef58d5e8c340199ae931124b1a94e69625c91a185fbca69c50c206a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568cdd2f342231d5829f672e93480a6e0
SHA1436e77fbb3e4e4bfefa2084e75cd7d901bc28aa7
SHA256d4bb15a72a6aa855ba309ea3298aa31b9a22c6e010b960d71dd7490ab899a1e9
SHA51258475240e3fa018c429d35128aba19ee000bd0299e8d1c6a3e68949458ff0c3e1093016be29c869a6979176680ef6579d86a36202361bc3021ff0e11dbf3dc11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e9d66c1e9ac014bf11151e4b1ec81b8
SHA1a578252afcea32ffdf177cd62c827578241980a5
SHA2569e150a98b232cb253bbe100e4e8b241a73b222702ae77365996dfa1572d8cf36
SHA51230c2668a47f611625c66bcd7cdb5aa13ace6a3610565c0e7df8f34143f69ae651ba883e88d798c4e694c5f25e01058d915975980d2aac4e9a2c4851c8baf4df7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ace7e0f8a4f16497e91ade7e54386fdf
SHA1a1b15f0aa1ea606dce7b3fad3d82eb8ce0de2512
SHA2560bace84d2df963aed71366d69706eb2324a3ec0b98bb7437b5cc9651a94158db
SHA512d63577b4f1fc316f69ea03e0032f8f8e86c07bf0f7e0abd84b018f7ebf7fd4201141cf27a58330df548fa2c36635a282565acbe95b10c977de96594ad1eafbf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e885bcccd38d61b4a47ef6df3e31438
SHA12fb41fb46d9e81e5bb899028c9cf2c7535f31ffb
SHA2566b673e7c099cb65ad22c5b76272ef424975396edbd2385c75f8be2e95cd3d534
SHA512a82b1cd42d3187d7c3bebe98616944e4cf74538b8b216c7147b9f5095a9fef2570dee2e68ca9a6c464b94826f6a287f6fac928cd64cf351b85d42304dcb127fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5910f8c5baa456de0e24599669eed921d
SHA1752b3785e3d7b5ff501b5eae9ede7e5e60160e20
SHA256e9d84720326ea4305d4bae69c35a5c25d446b6eb2fc91d2fe2c9fbbc2212055c
SHA512cf2389bc0d737daee1effd64aa4e559dced814a6e56665dbf32187eb5b9019d250a87395af071a55787545dea1205510847dfd538824d8de3924271f42a9abad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e20253d508484b4159c259b77522358c
SHA1d26b91ae34409e632b8d98771ef7611f47706e86
SHA2569dba44a6fa1ad08982a3f27843df56f143a0cc4992bab4bb7f59f9388b7bda33
SHA512003868bf5c2832d20c150bbc924213c8face15a0f4a48f34a45a5a99301fb7f181f3dd0744f0f31dfd831d99a874a283f52e4ad71da2d3b8795e77936a83fdfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5644b731fcecca19594284829135a023d
SHA1cd7e748ec19dfdcd3b2311bed79297d89600d315
SHA2566ecb02f809d479c0cde0a4c403bb87f5a715997aae80cea37a52aceb71f95025
SHA512315b364a70e0a2f45ca390709547dc5ba5e55cc4c4e7094bfb89d34743264da7ac568de605871c437fdeac0f9cb5aa10dce195c0be4b47b008c592a8e61681d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e545d00d9746f2e2c528d85c447afb77
SHA13ae483e10e22060f7ee1e560d1411a07193d5d5e
SHA256f9fa432bf674f9cb9cf4f4941448bb89ef822443b0351bb99d7dc53d1c2cbc04
SHA51265aeea296ca34d3c066ce28b3a84e5bf26ec272c4ebd1340a20f4fe372fde133387b113fe538fb915e76d5b1f67871dc4be392dd2408a86caf00de079b366a40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535c0f09e915824bcc93a8f11e06a9c21
SHA1e17953f49aef2c1b7dcb7a19b3950cefeada71c6
SHA2563f77efeb360521bc6a08379f42f92edcf38b1170f508d648952c100c7702ca3c
SHA512c148990a03087f56e8ee35f2838f72f38062da15906c7dde24128f471fbaf995e4eeab72f7199890b4b9330b9fc05f836952a37744e3edd08376cee5dd6ed152
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbd53c22121a0b030a85591229fe7aeb
SHA119de4fd924324e93ace7510339336e79af919d23
SHA256642ad0e6230fe278d28c09e9e52e716962e4f6db1cb14a693d834bb8087eb550
SHA512e64bf88762d428170f581ca2da3afe75d92c4f458092ea4c062b0f28597abe6d1c04bf3aa7b2c3258a31fe61d85ff0e586c5125a10893891b0b6649211dfd62d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e44cfff812bc98812a3679fd1986962
SHA1d074f3df184b7f4abc31a126be3f953f75dd4cfb
SHA2562109503ab2c19d1f1e337cb96d7d7464863b63425c04b6810353fa879ac6adfc
SHA512b261a9eaa5a3ee388be3f1a191cf3c269dcdb297e42267896ba2a6090f627a26a06b280a2df5fdce8d2bc143ea53e3deaebd9721085d36b6f4714d3e32af8f35
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b