Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 19:47
Static task
static1
Behavioral task
behavioral1
Sample
b0957c804905b179c4880d9f8a0798b8_JaffaCakes118.gif
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b0957c804905b179c4880d9f8a0798b8_JaffaCakes118.gif
Resource
win10v2004-20240802-en
General
-
Target
b0957c804905b179c4880d9f8a0798b8_JaffaCakes118.gif
-
Size
51KB
-
MD5
b0957c804905b179c4880d9f8a0798b8
-
SHA1
adeca39cbe6774e55a00592bd1b75b223222a15e
-
SHA256
dd71f42e338e8ccaa6991cf983c8f0209f5cf986c006e57defa9c9ffcc8bdb70
-
SHA512
eedb172795973e1e7d043ad1574a969f5c741096606165ee3a6daec82b3dcda7d96426b74802ffebe4352d23b04fa6f6cc1eb2b0382f76b8d2df5bb75d1ccb07
-
SSDEEP
768:5d1X4ZpatvaSslHVIMX35GKWiAJ7348cn7rMTuj/C2yncE44fWpggHs9M1Nip:31IzatSSsxTX3c1Ny7raS2c5HpxrDQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430345098" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FD2951B1-5F2C-11EF-946E-F64010A3169C} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000009d32891eb1b794c9db982ec0325d9e56c75e97a2894569b27762c816cbfa0549000000000e8000000002000020000000ef9bc21650daa6f9305e4d0301d74a9a0e53875ad913d936b142b9b5a49a69cb900000006d9ba8f5f97a8a67f5bf468ba0048abb0f811aeef0dce1945a262fc9b0d5527eb5c3b2e44b652245b67c55d37c778f0a65d182281db9aa40b00743d9a22da6c56e8f17f9229812414ea040a60cb7eeca0e64e655516e7020963e2e1ce00168424a5a7763de7796fd63d5d0bdf8145354eb3b1b3dc2f3cd1d059562d1019a187cbc1e4799be817982f8333ee372627d1d40000000ced921f4254e912e011704c74b8cecfabc51140cc906aef1edf01924bcf24fc29bef9c00d3f2f42f407b7196c676317273da97d2d56f71addfd497bec349cdde iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000e6ab753084b0c7430ce59043690ce2548af75f043cb9ba7ef2d3e5b37a14e615000000000e8000000002000020000000a412c6ff6c013af763324e6cb8f3788cc287a4643753cbfa67cc458fbcfc325020000000e0029315944e4c5f0845033f167a2e4a88a44db263d01674ed269ccff5a165b040000000392f1bcbfb8a7539dce1a1d35cc3691b108d5189075353639279256a04cc2e91f9f698384c329bb98cea0007bcc07c718b0b11a5af31bbeb7a803ede22cf68c6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70aabed139f3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 964 iexplore.exe 964 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 964 wrote to memory of 2372 964 iexplore.exe 30 PID 964 wrote to memory of 2372 964 iexplore.exe 30 PID 964 wrote to memory of 2372 964 iexplore.exe 30 PID 964 wrote to memory of 2372 964 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b0957c804905b179c4880d9f8a0798b8_JaffaCakes118.gif1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:964 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52682e1d9f0319148a77d5008346b9210
SHA19d30056d18406b75ce693454380a570d1d07c1d8
SHA256cac8a63c6ad2b544b6476999ca6a0e5156dbf816c949fe648640025a1429e2c1
SHA5129225e2dec1a9fdfaeb72b52768b855d285def1061c94e382cce83c69a659aa409240c87fb69545f7553dbc2380b4960ad822c14b916f58e3ff7992eb5476bcf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515ea0459afc250aa59a1a6abf5911140
SHA143ba81032487833784fb3e3b6b761157f21c6491
SHA256c5b4006e5dbf5c0c3d93fcf34e97eff2a5c8268a3836b5f1c6803efae2e8561a
SHA51273cdc57112be9779791b18a6cf04fc702d96ffa9dc3b86b9cab66d5c0b0c04a4507277dc6e418e240cec31b9aca1890b2c02b4d86a1d3c3a115a5ce7721fdbca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589528996591e0957d9a4616c27f8402b
SHA15790a959981bd869d2bf061bd8badcd626de0c6a
SHA256db27791a651b0b7c47e34420a25775899a59b6623c8c83ea1afcca0dcb82ca47
SHA512e2d895682966e9b9155a375c02b947c9b4006853a649e13397c703f6f169fc2b1580f0babcb6cfeb3755cd8a6919044b5e68cfcb789c3584f8af4f21eedc66a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5977af377f5f3c44bb25abaa6a132f270
SHA188131317df695e188bd515d0c5ebc0e859bfe70e
SHA2569f5b57ff9bf6b8b38409537901c2783ac4af13e8d90068f486de02ed74e1e801
SHA512143038d05354da78d0ea1707185f73963f505f7cde8fda42940437d7333e94e99717142e2f0c2e911534c9237287923790e6953f692330a600f8dac62b13ce76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bfe811aa6d90e28e7bf35467b771003
SHA13db9aa3a4dd89ef007e132fb9ee4921020736861
SHA2568ac6a1b83216314510f5e4a7a6eb23762a7a87daa07f649bb10c259b49f9b032
SHA512ba02cbe5a3f1fb7b14607198e2a6676964cb0ba99116908c4515b99276dc59dc13814fdd461aaf905b50544d2cb09e8b2274e5b3f41b15b43756f67643f9d055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca5f45fccde01bee9944c642777f9201
SHA1cd9452dab7a57331ac4b9f397a5f5486a9da6757
SHA2565d5557d239072ef501dee393edff7fd023f14017fd4dba8878aba3a1b3675703
SHA512ad333c6833f28ed9d0bd031701297dcd6e35b0c8335b296009a3d4c4776781d4e8c44ac167b4a8c43c69ad3e9a7d82f276a1951cb81b5d523efa95550504be68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a74ce5118fe01df3bf175692b684b42
SHA1020ed339932cc0cae9066b476087d5103f9873fc
SHA256f110ce4add33a29ba2b1364e82137b87d26e6aed62eab3cafbf80f7db486ae78
SHA512c6b5334420d7b7a37dd25f3a6f2b83a924a9b4fe6b1fadc491318819fefe8548ad38db28bb1776996fd2a9e332db4d3940f0235972d8722e6f8edebd54406a4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b0667d3cc2ac431176e8d3c1468f633
SHA1415820349210c84e64f903a2203469c1f52db694
SHA2560e55ecf5c55c4b72a70044727de4fd2009c3877a91048c32f2977916807a8023
SHA512c687265a6afea0bcc0ae60b773b9561e57e9923ed54bd1afb168054fbdd1eabb2de74c06527668e56f7fcee4539eff6cdbf1ac74ee475b3a08b74ce8a103ceeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561c1ffca8a5639f6f6bd72e507d5b2c8
SHA1c77e34a07406e69797fafc21d744ea44ef87447d
SHA25662f6cba9d056718d53284dc8eb3c549879cd69a4f03a6d50f68122b78ba913c1
SHA512481619290df681a506817ab440d74d3ef862fe4ecdc682b218019fecb486b62b23f9aab8c4169a77a8755cf04eda38283585321d26fd41499c7628f84d8c4185
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec20ad4781ff21cec1b897dc79ed8780
SHA1399089f7a5115b22eed2ac94175f6b2de9a6ef06
SHA25615b3c4313df459e4e82510cdbdb498b1fb58bc4e26109c785abe272c26b7f84f
SHA51205d20ea2ccf829ed54825b5eed6c6faea4b060941a722c579a4ca948e9924daf651f335741adae11ef99cf2d95477f8eeae73e6cd7c3fe086220617bafad8124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521a073a3028f80698addae1748a4f476
SHA167ee039edeec51495d7dce52d46b88f589e13f3f
SHA25631802daa63208e3a5d374a0dc5bbe8956b0ea48140c26a619b8ffce12f3a4c66
SHA5127410cf9ac5a5803dd394af6f896cfe24f054e826691cf8c8cd91ef879352258df49552e92f7690c8c46fa8201d439540fe184e8b89e20ec51652d1daa1763315
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525bfcc92d850ae516546f69a726c378e
SHA1230f7d99e23623b0887b0e622b5403a16994d8a5
SHA2560a08b4b9b60ff4f5cf4483bad18d93ae43528bd1a515a25aa069954b9167e8b5
SHA512edbad01945a9e6fead169f6527320add337056627e12bc11507fb102026a6c3dc8c66746acc7769ec44e8fd05c4a86a768a863ab7093ef5c177b9fa2a7f2942f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546ac586c2ae77fcd74f301b4332129f6
SHA1b500b9a5f877dfbed8291e6d7d00c3a1286062a6
SHA256ac7d8e864e364aa29b1e5a07cf74b96e0775e4115effce7fa8b3b889423e9a27
SHA5121876c154c897030cf11538d09ba4a48f2db97373d37887d2d0c1d3a5edcb9d0546c3bec2d955425fb059f40b84c15432d18652c1d991f736bf2278aa5c7ad43e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528cd4ae72d057b12d2fcc95fef9ab1ab
SHA199a2a2a3cffb39decaac9f006f3f0f2512e83bb9
SHA2567e2531f2db11ac101cc39d203f9edec65475e36c35517344e0abc7e3a1f8ed40
SHA5123cec16ca11bd69c2d49feef07d8a8d444eca4a94c78b7c9b9bd363a187b40db1ed2902f982b48ae9e4e5c78cd77fa842007d02bbdc88fee1981017abe75eb42a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ee6d3b2dddc087c89b130a402377d25
SHA1d75dbe2d98882edd1a8ac6cd081ca9ccdd12e4cf
SHA256db61b670d1415c53b8b778a80c86d11d60c28782ad97e7a0f79e8dc2e94fd659
SHA512752fef81898ee88c69f1585a49bd0cc5fc940450d9885e295829649ef0bbdb6c29ba9487ae9df1c03e5aad549e3814656a2707596db686ff7ced45e1c5a05a12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55283e4d4487a871e4c924a76aee9fe0f
SHA13d20939a6169359c1925c0a2e090f17589b28e62
SHA256fedcbf864e3c04f48dca7eb3252eb1ac42a53ece76306fa244521910cbe8c60f
SHA5122c23b210068956f80c5b15cdd070bc9a43c09d5ce745122cb20950c0c8e01e00e12a9eb51e4fb73f85b557238dd0681468bdad51d26d99d953a0248e8f5ec54b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510a42544ecc3a5bd5ba057c922e66c9a
SHA1e20c3b0911b903940c9a20054c3e378fc2878c9f
SHA256b327391485fb8c24b042c4406b50439f081096167e5273409d27844797a86edb
SHA512242efe4036784133cac65b35f3021b6330a1ed5f01455bfadecd84babe44503611a5e159fcd83416e3f809fa4ba2e20e16d462f5488a481568607bcac4725dd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5090e4e625efb2ce91f227ba1180877
SHA1c516979ae8469460fee8e5222f0884f841832f37
SHA25697969c38f536baa5e12f4af4ea25e649ab02524f474efc26e15953f87d9a086a
SHA512c16cfe41695b02e35a3a73fbb58b95d95b880d90a96de0ed53b44527b92ea680c89599d594657d3e01faa22ef4fca1cc93a4905f3d2ef07d7687738177504472
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b