Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 12:23
Static task
static1
Behavioral task
behavioral1
Sample
efc92baa4a8245923054bff06c66edf0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
efc92baa4a8245923054bff06c66edf0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
efc92baa4a8245923054bff06c66edf0_JaffaCakes118.html
-
Size
52KB
-
MD5
efc92baa4a8245923054bff06c66edf0
-
SHA1
e78301e229ca3925d11e1762600a91b43660e20c
-
SHA256
19137f3a00943de26c166e9d7d16f6b682572b191a8fb60af4a8cf01dffe9d92
-
SHA512
429fd0ddef13a24e68aad5c6a8bbd3ee77bd5be1d86d00159953dc5433756c89a36992f524fe0af686fd1e7887f1747c8ceeed47c4cfa80217a4a91992b8aad5
-
SSDEEP
768:S5izyIWyUeuQQNWmLHtKENvEZmattO5XmSWUVa7UAZbAztobauyusD0D6xjyn:S5izyI2QobNSoa+5X/tuFwo
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 6 sites.google.com 11 sites.google.com 14 sites.google.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000b7e93af6970f2e0395749b0fd72c44bef4b271323a55b24c7e62b3c0e288e1d3000000000e8000000002000020000000d6c50281d364363f1cb7b2fae15c86028c7e57ae6b2b1389f676ead37c3f0489200000001581ebbcd6a2514d24b83b0b5569ad1ffe8b3832a842a76084cb2fd83da4fecd40000000bb5ac92a4a6c90907bd38b33352fea0d9a21c6f9cda43924a6a783e6ba7240bf4d7c902b31f544b93abef2fd82294b6248394230058dd8ba4136e4de1290742a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433083292" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c073012f210cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{564A1F41-7814-11EF-BBD1-D686196AC2C0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2384 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2384 iexplore.exe 2384 iexplore.exe 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE 2556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2556 2384 iexplore.exe 31 PID 2384 wrote to memory of 2556 2384 iexplore.exe 31 PID 2384 wrote to memory of 2556 2384 iexplore.exe 31 PID 2384 wrote to memory of 2556 2384 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\efc92baa4a8245923054bff06c66edf0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2384 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5998fbfdd18e3f93b8d40c37772742afd
SHA13df0efa26a60c9bfc1f2fc2f20f118991fd724d4
SHA256a0e1fda4ff8d91e385fd0cc62026893a33b72dca81fe4d486e6c1b26bf4f76d9
SHA51264f1d394fa36f3dd846331b51373ed98daddbd4098e814be6cc8f6f60f16f3cc42fa18ccd4ece10c0a6c3bffec229898b22d314ebf2cc815fc67e91fe40701d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562322edab6af72fac6d6d127b696cfc4
SHA1ad2de708ee644668f2510e54664360b6655bd054
SHA256b95440300ef2b533aa30842bb37ecb771a89ab79bd1f8642efcc60273b3c553b
SHA512ea9f16837891c7ccdd790d8a75a3edc4e66c88f401143ccaea2184bf00910a3c73871f51548f0fa2156142c8cff8587022a150d919292780135560d427972e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1218a20b9c1bc8a83ea6a7cd042c488
SHA110b135a1e615dbb4d8481cc8964aa1076e1a7499
SHA25617c7d15ed053b965bb487e4ee859dfe7590ea0a3f0bb6b8d16fed2dbcc20875d
SHA5122b2b7ed2f1fc36cf98592b31512ce994e9766a472635c39e03486322d0fa376806f6b94ec00414585ffaa2f49a8719e6ba260f339a6d89eeb319adbdaba6b387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d79a36727dc2fdc7f3579233df385c1
SHA13b68f987a9064899debfdedf046e4a9b8505bbe9
SHA256a97aa91a7c27ccfcdb0b2ca287d0f3dae1a38e072f67239f04e9b3a5525dfe50
SHA5125acb6f3e655a186ab73ee278f5c33e809587b96aaa0a12078e003755c3d45918a1567911db908a0c00daf9363e70dc8e60138b6fc872a442495b8b7f75e344d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53854e7b3ca9216da003407bb1af21b00
SHA1eae2dc9f1cbd453e40c2956bf3b85763860846be
SHA256677b90c2b3c43f2b5861adc7913e6a1275644bf67e756e5ffa69620575fd4dc4
SHA512a1ee82aaa5bc9a485882472ef3e2c60b950f572bcc18fb9f4ad0de3522ea0b95ca102905610971649744498c4497d48410131a62a218976dd5d96c96f6f44e1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5622c91b40a81496b9d8d45e7bd8067a0
SHA1400f59dbc645d3753116a117f755ca903bdda124
SHA256bf2a9869c050a5c38be66b6dc34c563cd7a5301165b28d26b1b1d0ffda3760b2
SHA5128c60cdc6d3dfb9ce692b00b592343a9287257d993c18c9343784bdd1c9804aa19e675f9ed819c66ac2a46a4c1625f2568fb493522fc32a528f004bc8e63e8c73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b83fdc07083f95d52cc856fe2c9700d
SHA1e24543db282a917dbea6be1e548712e5e4fed706
SHA25636017f087b2306447e9893c26336778fe592753003a2a2611e0b39abebd87bb4
SHA512dd477bddfb44111656c48fbbe6b9baa7a0307faf3eaf7f3dd71036eb4c4ffba3b80c6e788b83c685846b75721709ec3c9e189ac394128d7815c1a7929796d818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51517374505d4e2af04c0b769c85bd79f
SHA193b4bc1452f00bafd9f08bdb6054237c9689c64f
SHA2562b701db28f84a28515321cd78fc6abb61a14399c574d8bbd7b71943bf41c8e27
SHA5123b5d40a092e07ef2fe99ee83337a3ae1d0af786f617a744b19c287ff6510adba1bfa13b8ec7a7c2963a478da13b666af28b79ca5a09b2822df962a218492b51c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e862fd8637c7e70f9a0cc7555791bb8
SHA1e03818800d10b98da073e50771f788329f33f255
SHA2563a9cf82af63a3c1a0357c8d3b0531a28a6e8cc702dc735cd608ec54d3c7faee8
SHA5124889423380f01f7664cdfb7d2bda06813ed2004c0dfd07ec668418c3e209efe64ddb6074989870a36b9c9dd55ff18fa96323a802dc22b8514c8f6652e2b9a145
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501f369300f4b8528351c3e454ea62c19
SHA17e36ac94c8aced0ac0b6b689f3fb3407db35c747
SHA25619c972f279028176faad931917509bb60a522ab0bfcd378f9cf9fa1d87356bda
SHA5125680f255062da3aed60e4bf1b519ea2a0b08cb10cfa7bfb1c5a7d3ef67eeb711b4e9d216d50288a6da71dfe896d5dd555d4aeddbfbed4629bb3823013b0d9d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571c1cce0ceb7511336254358a559b5a8
SHA14e3b0855f3666d190ea17f0a4e0e1bd5af6ee904
SHA256c3e699ad4262818a9733f5ccfc96cc8679cf38987dc616ad54059c07e074e760
SHA512222e55c30969af422be9b574e861330c0bc9020e1d6e2c5a73c7bdc1141e27dbe71bb2d90f983f8d12641e60bd4bbdb583925f773b65cf2ade1030bc665cde02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538884e677ebcd1cf75d08ea651e34ac3
SHA13cf5a3490440b75511d361945312e27ddb82314c
SHA2561fb0c6e7c643baed88f9153b27c946d7a352a2d30d04cf8c8ffed0b2848be5de
SHA512d245082283e0b7855fdf3f72d9d32b6f874e4ec7d72ee125d63e359bfabd03fa7efd24ab46174c5a52d8f89bc7d6664abea01002364b08db7bd3c68a7933bc26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5916438fcbef52492eb53741f64929bb9
SHA10d5d048c39840edc40a431d4134f3095515a31e3
SHA256ba61a946e0e85f19bb55d989233b549b36eac3b4f536fe74b68af717b90859ac
SHA512cd91555276079c94894179c73b865f28f2cc9810b033bae37668982e7edd46f43e00aa3178a7d159e6a49f681dfce2a8fd1708c1f7db9a34c0adcd12eb8d93b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa31980785cc412289085f214074cdd3
SHA1768766818f4ffe71cfeeee85efed804b922417a7
SHA256a7e8459de65013b20e9e4f2ca4b3213fc6bf793e218a8c25b3483a60e95d8c9f
SHA5126fee999929322de70da655a7f8d8dc8ef7cec593b0ab200efcfc32c39c9c202ef4565a72166c578e8f67026be023a2585207cf0b1ed66c0286391a998dc06ce4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578b694e2d44d9ce2ac2251e206c4df4d
SHA1928bed90409a758767ba548c182fc307673770be
SHA256b710f17bf97c5df5c154ebb31eb6ce7734b5f48b4c704e8a373508e8108fd387
SHA5129ed89dc5695d2350be5a1ac8d5dd2355753c9436048e6e50c0b048f29bd102a9e22e05feee75da728db4d09e84b2cfffbce7d8f75fef686646dd2f0574ae4c0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e71558c9e14ebe8b7bd5e1daa28cee6a
SHA1ab592ddf6b09483c02895aa64effd3386bfc2e54
SHA2566dd6d94d4bd6201bf9e95161e51604fe1436af5ef0663b8228e2f9971dcb2f40
SHA512478f7e30c05d5abe846aac502b36eba33e91553be1d6f2f31e13794a8372f2b4826b2476bdb23c3a5bbc9b7e87a1cadfae2f543bd8c636c0f829d6f4c93735a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f61f50f4bde6c9c0e9c2b5f300fe6e5
SHA1f708e0866c1c77f4198c48e1a6f2c1f871d07b0d
SHA256b05bc3172b5d9aa960f4ae14055eebbfad521337c756d1d72cea6309490aa04c
SHA512a22a6d38cb80892bdd011fad8cc7a71e383551d19c9624a1a29d277b9db419a02836efa06476d615fb620d6d72cdb04eb34c3ac237bbd85a618643d517e3a694
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b