Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 19:54
Static task
static1
Behavioral task
behavioral1
Sample
c9859998d69f978c797c7285944dc133_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c9859998d69f978c797c7285944dc133_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c9859998d69f978c797c7285944dc133_JaffaCakes118.html
-
Size
4KB
-
MD5
c9859998d69f978c797c7285944dc133
-
SHA1
8ef09a5ea3496e1a39937417bab16f65a2455392
-
SHA256
1f54afc25ff01d40801d7999b7717517295c4cbe07e21164588fa11237f807bf
-
SHA512
598b2bb0224eed289d13dd87ff49e51c0bfb9b2ffcb791f0cd9002d99a80b479796899fb0e720d1b9b74f07545e165c45171f6ebedfe95f36d871746c37554fc
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8owVQnZd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431123136" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8001EA61-6640-11EF-8E00-526249468C57} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000475a6d86011d700d18fe743831f4cbf4b24c2814dc08b74b57415dec1a1ec26a000000000e8000000002000020000000914ac0d579748246a7aaa527726c0a6bcce606766d5773a1e4218a79d5d3fc912000000031549e1ff775571da2e1d0ffe8e72c8d219ad3e4fa0f7d2c4694a5a16abbac97400000006c919121305ff9f50291e74f9dbb3a889043de1e07902f8e8a2798f70e8f215bf245d1e38dad51ff3f76f79cb1dca65e7d40a3aa0fa5027c37c3dbb44ad78032 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 700e6d544dfada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1976 iexplore.exe 1976 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2428 1976 iexplore.exe 30 PID 1976 wrote to memory of 2428 1976 iexplore.exe 30 PID 1976 wrote to memory of 2428 1976 iexplore.exe 30 PID 1976 wrote to memory of 2428 1976 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c9859998d69f978c797c7285944dc133_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1976 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ccbae5a9fd27cea699e5001ea6361a1c
SHA124d5fd51b5b77b2f21a9ebfa7854016c4be8f638
SHA256b1f649a56c4152c884448165e4eec9dd79c9ae424995186f73538d7c2808106b
SHA5121a657aeec588a995e3891220a8e7b1eaa6ad2cd8827337a2087c5b775e958d781da2923b3b9229fd0a74c2a1fab51ad07bb6642435e7d65f8b1a84810561e1fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53fe24235a07eec91e22c2ea6943636b2
SHA1d82c6e07654ee310e2196bf83c7f79784345b393
SHA256763511d9cea4cb7fe27e6d43836e332f4691fc54a88ffcae4fcd556bd50d0924
SHA5120910886003fabd5a991604caa74092a92573c1c074ea0147125de458aa1d71e45ab0105e0ac4af362a9963694b39fc3771b7664237e476392adf4288915ac61e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54b715fff24cd15f15e956c2e0edca1ce
SHA14ecf702e62baf829a97e2571546687f9882271d2
SHA256b14bcf1c7bae65a19c4b5de824563de563c43dff788be9dc8ee78522f567bcd8
SHA51221158ebf6733c47da2c33efa1e10680e9f02568661a21c6e5e8a04e1e199a4722fe1ae9513382c69f9449380853de9dfc3cee84a535ad903753604a9198544a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59f2fa5a1b24b6c95ec128172dfe9b9a0
SHA13862b2b0dabb13089889d775569ac48304cff13c
SHA2562c9bb2e5d216a4161a6a0226e25b179532ee4b717039732796a4bfc82c006323
SHA512370e9370e29c6a50d8fc26ece8066e5968a0436c20ed071664457c896cd702d0ae9c9cdb8dbc33c38fe262c9e839e0d8fe4c94d8dbea1cdd2009d1fa84dc4b14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52b8a2681bb308e2d07e056d18bffb130
SHA1a0cd8dd9120342c2e7a6fa89b515420fc8cb650d
SHA2563ae50f99eb2e5b6845532db812891699a2920058a9c90e6c4ccbcf496a74ae16
SHA512caa723b92ac646fe989b7bb638a32c1769aca85c69b61f491f481e5c5e6e7dedb5fa33b19e2958eed3f7087c53e4aac7fe2b80ff0ca73f8ddceb59d8ae51b3cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ba2f9a468cd2609ef71332f4c888d041
SHA1b6d51c195ce6013ae1ac623773072d3e9d14acf4
SHA256e25305c517431815a4a880521cd5c7619f66d2ac4882b693637d87f7cb046185
SHA512276bb6679403a985754f1c088811a9fd44b0a5f37adeb18a909449dd3b18e393a79b0a0b0bc61ab3e81fb8eaddb142e1db772034cd0ee3df7a6bb8f27475746a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d587566475bcd64d854da0c1d4a27a36
SHA1df4d840fbe6fce0f9b0206a3a8344646945ce688
SHA2569cf30cf57edf396b870589132d31ff91d79214289b74b3e7690208333256fc3e
SHA512db967a96b67bcd76ccb7b810b514dd5f8bbd3dc91de77173cabb8aa09dd90133b26fde262d5e8f864320537a6c31da019d6817152e16cf47eae9e962eb9f12d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a238d6261261d62788dd65d588c14580
SHA1bcea0bd164d63e9b4a2634d8bab50660d9fec785
SHA25675b8afc579dc608df35166307c0ac8a41ac123d31daae855604483eae41fe915
SHA51280b885d55dc1d6af4e7d3082569d73ae43d08b4b3b555f84ec63bf58add3a2452eef261652521607a9c6091a95ac76a02a8d18fdb1735b60c9b3eed97087c9d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dbd15cacd51f8b216d30f055a5b5a252
SHA146fac09848f47b425c1802ae8a8cd08f3b659a8f
SHA25603fcaa6660f8f6a491e4f607bbb70edb87e4fe0441162d9db930422dccb2ed37
SHA512f669988c8e144c41632d8279206e977654856da9e93be33a018e7e46ad8bf8fc9f1497cda95fdc3545dc9518c00bdcab68258b913795f084bc9cbdd487824f77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55b9ba5b61c78ba9acd389c6a62a4e01e
SHA1ed3369e00477cdac237f370dbe6bbdbcd10e27f3
SHA2562629995be871141cc025408d25e84a0486b62edc2642c3b9594ba733739b26d5
SHA512373576fcae6a0fd9e29dd06e599843dce8bbce045ac0696796025a1370f0ea6462a4fcbba07bcab5373a21728d4780a780a029e7c676816d5755c7fd9793b8eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD508b8e5767aa25016d2d5fdbf8a6935a2
SHA13e4b852abd0a40482eeb9169fdac7b3077aeafb9
SHA256daa4dbfe0a7fc84c9b4d00e06bbfbecea1177e47867084640e3d36f3886a88d1
SHA512765c4f9022b4f54450c9f672c43ae22821969e751090139e54509601da138edbaaf4a7bdd4e0d4b4763491b59fec7ac0741d8b9b08cc5eec26f962ee5d2fe16c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53879e7933379519851d39e2cf8dddefd
SHA10cf6de2907e14fc6f7a6e6addfa512f6c5911b13
SHA256cca9df51c396851ab6678fc172f441b9c7ad9489d223e540445c662d5d6df03b
SHA5123a339fa575e600f48501f1b0b982583f854252950785219345fe00e5816bad4bcb531586d027a9544a4d0a879f24f020be6098af6cc67495a3a8e4e8346bdc0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51823d713b09bcbf75d5c3086441c3de9
SHA14459c27f473ebed03d9a1377f076b7e336c3ca07
SHA2560176be8b7d80d1ffbcb5eb011d2db29ec90a012e00b29a8039572f8dc9ef1779
SHA512669448be27e93b313bfca273d9b184d45a6437fd08ec51360f91abe7b295d5daf01e53434e6b1a110cdd65665fe133b43e9bcb6b1604a55c8809796c87e1abd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52b6d4fae7a28bd47e4acb712d24b3e6f
SHA137c16e19bb8653e3a46096c4f9c3c4865f0973a8
SHA2563c61ec8c62044f8e019d2c49fb2b7abdc77d8612acf89db92425de21656bbb37
SHA51294b001830c76c0ab8531033cfb92ef391b0961ecadcef293fe923401f0b3da6a98c6c4c286ac62e36bff4b809bc5eefccf855b7d3dc8e67045bf35d105c578f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5aa68837724433d00164b001865897374
SHA1419a0cf5c08ce59f2fba1d13734ae8bd9d523dbc
SHA2564bab2a8770ca6bed59b3fb4f1060279a95efc2a324b16671171841d78d512a4d
SHA5126fdefc465586511ec93efb4f59fc1913106d8c6b9ee4bf70d81f49e23fac7c3221bb72153d3303d2d038d02d1afc11fe182788d3e44867ff7f1d447c423d663d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50c4ccf6fb617cdb90123e658454b462d
SHA1bb7f72d1840caf8f93d32a794a7c5583799e0b44
SHA2562c6cad713a236db66e796b5739869b42ca255df24ee4702809de4389b4858716
SHA51298f6f423cfe0275e76a0aa5cb2d8ea9d724d194480a91381bc9e946c68c3be9240035b4ce79ceead7b5e05051d8126da649662fa1b2b648c8abad68b3d29b153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD516ca5181ae356e97f4f50e400069962b
SHA1b1eb0bab88e03ea01a4e99de47562565011724ba
SHA25607d285f32764489edbb0ee927438f8320a63c9d562c560400aeb307f1f39aacd
SHA5125ca7b9a7b727587cdf13400cefc681ae76a7ccefd96aa1c212f5cb0935ad7a99e07bda442cb1cbf33ed43db7c5a96ce8d78718aefaa26770b6496abfb77d9ec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50e53937f90be7a8fecee1512dec1347f
SHA1b0f3adc0ca7cfce746f8bebee10f9ea8ce4efd87
SHA256d02f0aee13caa5ae6f1ea1cbc76cd30269c7274cb4805090c0ed80e826583e14
SHA512434a1df2c95f9f7d9cd9446b02c81ab398f0afdb6c8236f9ea5f5153f8e1d5968c7557136a95ea9a0ea675a19b20ee76a10df95865ae824547dfda2dbe6019b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c0838c4ce74f93a7b3982c7d76623bfd
SHA141dfab7572b353c0cb0cef9deabf7bc1cfafd912
SHA2560e7db8658be0fbba4fb1665eea49654bbf4ea3cdf95fffbab68476b4b3d0eaeb
SHA5123e3f3d1bdbdd0a119ed8660543239e9ca01dcb16a910697bc60614b940ea3c1a63a47d8426fc679396b89588b8f5c409e4c55c59bc9f747bcfacb98091afee52
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b