Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 19:48
Static task
static1
Behavioral task
behavioral1
Sample
c9835a1903a95bc72facab9014a366bb_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c9835a1903a95bc72facab9014a366bb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c9835a1903a95bc72facab9014a366bb_JaffaCakes118.html
-
Size
53KB
-
MD5
c9835a1903a95bc72facab9014a366bb
-
SHA1
f25889095660ba5c011ce49fb83b3fe36bbca97b
-
SHA256
ca782191a223f6c23e2bd81bc0cbe74b225953a5f66d8467b1967f787a3ba2cb
-
SHA512
43116cf0b36bca86a18f2c9a15bbd2a215c47fa4961edda57d6067baee4ea6d8bb17bb5f861f48a06e90a9d918b6a6f104177d97a1707303c562dbae46b5dc88
-
SSDEEP
1536:CkgUiIakTqGivi+PyU9runlYs63Nj+q5VyvR0w2AzTICbbioJ/t9M/dNwIUTDmDa:CkgUiIakTqGivi+PyU9runlYs63Nj+qY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ACFBF931-663F-11EF-B81F-6A951C293183} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000098a18286d491219c17fbf4fc4a9073f759627203d954ff5eed6be93ed77538bf000000000e800000000200002000000071d3401eba700b56e9d37d90888565208d8ab2e92f6d039604d10b3f094e59e9200000006b151740a7b0ce666ab4e97a7fe56dc7e9ccbee8eebb0eac049327b4779c090c40000000a55dd7394cc14cb7ad2ae5dd77752758a627e89b068c66a07aaf7695f528e85b6caedfb8e171ce885a4aa7bd4a65964627430962977e667c02561d23df9ce60f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00e0dc834cfada01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431122781" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2076 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2076 iexplore.exe 2076 iexplore.exe 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE 2332 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2332 2076 iexplore.exe 30 PID 2076 wrote to memory of 2332 2076 iexplore.exe 30 PID 2076 wrote to memory of 2332 2076 iexplore.exe 30 PID 2076 wrote to memory of 2332 2076 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c9835a1903a95bc72facab9014a366bb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2076 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5964ceb8aae3244d822d3312e78e41c4b
SHA164d2b360cda210733bea4011e66f38835adf3511
SHA256c8b0577a59016a8a765c905e7f839a6993d551dcf991c5a94e35746bc14d08bc
SHA51282b18243a368513af0d2e5427525fc496ae71d285798d030cf3608dc918c389659977487c24937becddbe046e91e694064b684191c3a56f46aba7ae7217083b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564f734a69cd1ad81dd4c032b5e51e95b
SHA1ad7037dcab914d4223872e116354bd1faaa8b323
SHA2561346bfa30bf364032113fcc43530b09eb37d1c25e422caeed837be23fc7ad72c
SHA512b52a913a24ab4c6edfa79bb477ea964e7b97196a418f9619b5ae681cd6d4970c45314d76f50eb70c04d61eb3cd470c762dac870ac54e9bb610d219aa863709b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5516f9dc1025eeb1f73b1a9900925c0bf
SHA17934cd10bde79a808cd7bb546320969cf4da61c7
SHA25648fdf8a4d013d2ecc6c5d1dce5fe510813ca138a01e23f828feac454e6341802
SHA51247f8b1faf9ef5fe65961cfd4577fa6e157a7146bded3913f5728b2f43839ef66f35eacd81207b1778f84f0d5bbd7702231d5b5f949c22727c327ca611b9113ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baf71f07ee82eaa599e8575eaf725c3d
SHA1322fee2f5e0903ae9e71c05dee3f93a4037284f1
SHA25636f14aa71138dec8e2a04803bbbd62347810c7a9afc5e6cd082c46debc3b9f37
SHA51287d4f7584cca30da8a071da969c549b985729ff91182f60def0d4adf5033ca61987dd08614a48b6a030b76580dad99c1a058a1374aa9875b07aa4952abee6a92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567ab755c1ab24ec05d70a41f02f84737
SHA1bf6a8ea8e0268ae646d517e7dc5c1c199ecd5167
SHA256424ca66d9a78a6dd703a620a461f714ef8f8463ed2872b98c98dd8e6a5426399
SHA51249ca42503fd12067d364f10507de5cde73e379db3a961546cffaca499bbfff8aab78251129593e3874eaad2ecd4daa34ba11f031ae7f270e34dc7eaa0ea95f1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5950c185ae9997711098a03dc70c6ea2e
SHA1fa6fefe5a69071c817e92cf492e48a69c8db655a
SHA256eeec530c0137f9ac0c01489de8794dd3a693a8642988cc2e4a68f0259a5465fd
SHA512a5dbe74f47118878747301615e3b1f69d50d15e7f056646eb277bf09b1c055daf5bb163b3ba03ba3bb571fe36f56c9c6a984d53567218b7b5eb85da1bf04526d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a54dd7c4884af9b0136b53eff0b5e10f
SHA1a421dc857dfbf7216e341b9adde15c049dde4f2d
SHA2560e9082fe41b7e57e051442ad480c88092a9f0e69b898b0ff532387a267e6b409
SHA5129167e64255eab21d0d11f0b3867ed0793bc2cc4198e39a3bddd0df2ffd965c3d7bec635f46167bd058a0a958accc3e5c384b817ecf1058507b568cd07c7dbf2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b8cbc2e0caf70878d3e4469e8f745cd
SHA1c69aa3c8cef951fcb190541afc6f5d1e37e4d994
SHA25620634abe5f5a0e99dc5aa50e2f272e61105494f7aa3a6009ba82116e4d76a7b0
SHA512f892f8e97a19271fdd8fdf76cf7f7eafc5f000feb745b499e81d736802e1111dcb92e0170bad53baa2471ed8418cfed779cde5ebe9b253dbb2132ad51e23fe5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaaec284ab01b43b64b5247b58cde23a
SHA176d465159091af95c7e3cdb481616d6049c23c0d
SHA256caaad745b9102d2bc0dc7cf6438bfe1aff06f31f40353b4a3844dd7c48a5a753
SHA5124cf933086306db4f2cc3d3df167221814f643d748f169c9732d976b39c18164e299b00eea7eb7845e5496c90267767b5c047b4ca79b9a6bc063dff7fa5c0f4e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2f004a4039ae3a0ee2eabe89ae6ab1f
SHA1b4778b1a6b4ad9ee3041aaf07cf6b1241cf93de3
SHA256f1e03bc88294ee906b9529873e444d01d7d163a9931dac16cadee8d69bee7d84
SHA512eacc2ffa50c711581474181bdc3a48a34119e95956291e57c16d9b4e8cf29d03d6379c869465cc4d4c34a31ab500f85b7d680c60a9a4e86df216af2540e8c3eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523dbbb68e8548b0deec24c9e640253a6
SHA1c1b994c8dee034004c46a6b7e594388d50aa9d63
SHA25610c25f85961a8031be1d75ac47b0b29429ea9ef281a512e05e8ea5dbba3b0722
SHA5122f19952734da855cf879c6205b9ca6035fc88e50513c6480b420a4e1a33dbe41f2e379fbac88f431da0390787f74361c2df5200201e44e100f4e7b4d25356170
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516ad491b381c544f8ba4d9418377acd8
SHA19cbb84568f41e8efc29fc0ec0892cc6fc6d0ba6f
SHA256b4b9f7e5999f91a9f9a1e6288fd9c548c95123be31493bcf4cac0df9de2e7e54
SHA5128024d4cb24cc037ed5ddd0cb7519c1046e8ccdf5a8c72fc92a5ac66a57102885136c8cbd9683934f5b9589e8cc13316f9e7a94ef7ff9b024a40923a791aff645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f910abe06871c20be527f34163a2dc5
SHA1f5a84885f07d85a5add9b801f067f7b47c4f4cdf
SHA256ca897c75c56567a06e1e3e62e94b464265b03419f2ea66c0c2220b2c5769ea73
SHA512e8a613dd60317a8a6bf701145a6ee53ff9f3c898a00fa9978ad85e642402a2cf5437ad822b0cd8654ccc4a269789a954e1c46d3f5b0775e168da125064b2fbe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57723827aac639d06c0baf71c7b341a44
SHA10e94393dddaddd03442159c9f2bf1e8a15c30eb9
SHA2560b1c45f87d1c7a3b326f8a525dfcae9d587dbd4b9a8b712e887ff5d25f9135da
SHA512b7e6aa7803f3c0bb5b49fdffe1e21454e4ede073faf6a05dfe7e8dc0140402377ce5c473437b00e239835560cca03eae285bc8b4ba084b6234457cf46a422622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5480aea7bd01a227b69de5013f5717b68
SHA1d359878769be37ec46aee08b016c12b26ac141dd
SHA256f297f36a3df0fa24e627ed001598387787dbaf3d12186958ea0c893b3c90a59d
SHA512286b850d4c2b460a11f455f5cf8a113ecda7d606bcfff660f4dccad503097715c88bc0b1ea8f47d63889d3ff061b641eaa0f06cad26c9b5fe99c3c6060d6cad4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdac7c47686897ae5fd8da3d51e9a284
SHA1a1807a03b79cee099fb66f9abb40faed25db0238
SHA2566ffc1146a81dfb110a558d2e720c986d87bd102ed614cfd1bdfa4cf7501e7a6f
SHA5127218ec7bdfe80d8affcc0772fa6ebcbe0496ab78031a0528162072a8b2f1ede96274b54702f85eed5bc371bd9108b3c123fdd8ad10f2925f764bb1d6581cb85a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f1dbc82b1563bc66ea4de05b43b4174
SHA14513e92886b96e7785cb3f6e6c9442668628946f
SHA256aa56623e187d9ec5cb36d4aa31d469d5d7989656000fd526d1fe4096f8813295
SHA5126289e3d6918809ebdf9be29f17264890de74f66fcb26ad30e8d44f248583792aeee3ebea860942957b1173b22d22999442bfe43688d2ed6636ac6e62b188d88a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5070e7cdfc835d84deb932377376a4189
SHA1b429b2ce18c96ce8d2ab10b88b560395397064e6
SHA256d3fa92a8430110cb405b92507f904d4bcb9430f9aa2cdf9bd2f059f3b6feecaf
SHA5121e2f7913f8881eec24388135479767595ea530244774f645ebad3c0c8fb3e275b57181f32c059e82ae617bb1395b106cdc1d178c8a683a00d9b75819fb68df92
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\40WV1DY9\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b