Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 19:27
Static task
static1
Behavioral task
behavioral1
Sample
b4bcba3aeeae519a78e2a92e832db80f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b4bcba3aeeae519a78e2a92e832db80f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b4bcba3aeeae519a78e2a92e832db80f_JaffaCakes118.html
-
Size
288KB
-
MD5
b4bcba3aeeae519a78e2a92e832db80f
-
SHA1
74097093581b1c7117ad972b8564e1861435e361
-
SHA256
acb3f5c5b52229334d32ea85a392026fd0349d70cac7a90b2218f2729696537d
-
SHA512
bd6722b51f4819b2adfbf85f11f5d2484381abd3d0f2b14fd14a679b260fb0301974d8d6f01ce506f5b1379d7833c75ae484ba058bdc98326af332bbef3e5d72
-
SSDEEP
3072:n/Aiv3t4Ni/9deff65DfnL3/Aiv3t4Ni/9deff65DfnL6:n/d3t4NoDAyDfnL3/d3t4NoDAyDfnL6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430430323" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d06dde3f00f4da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6B40E751-5FF3-11EF-BDF4-FEF21B3B37D6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000009313d9c301131fdba8b1bbfb3dab001faa678c10a86d011d1ef7252b20173d43000000000e8000000002000020000000661832e46eddb2fea36e9b95be53abddb44d9a0b61c366cf058911d973cc0258200000007711315a738d9e7d455bc9cf4b92f7cd7e8a0e092b7500db49ec0c67da410f6d4000000061b357f3c768fe209c5ffb0b79bdbdd628b93e4b180c308137375ff870c7b8bcbc7bedc440e8595d6b0db9ab0e18536fc2cb2c67593c678f22350743e09ff52f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3028 iexplore.exe 3028 iexplore.exe 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2912 3028 iexplore.exe 30 PID 3028 wrote to memory of 2912 3028 iexplore.exe 30 PID 3028 wrote to memory of 2912 3028 iexplore.exe 30 PID 3028 wrote to memory of 2912 3028 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b4bcba3aeeae519a78e2a92e832db80f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d8a0f99278df75de1d14c5ba80f834a
SHA1642973e85b0d77f6b454afc243da004a8eb8c911
SHA256f7fc4bcedfe4f81314686875f5b50446284be8f7dd6dfae4a293383a420c250a
SHA512c37b9f17d18271b735646709076d4f761651ef5d431ff6353e63f491cc31f495d19bc3a4d228cf624f3b03701b1796c5ec4c6b2aaf192b982eb21ffdf0660855
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ae9e2333c51b58830c3c8db6252e59b
SHA1d818f2926eed47949fccaadc88f01a0dc6e285aa
SHA25636d7f555499cb72d0ec845f4cd7f31cd5e3f2d0b405611617eb439ddb75c2fd6
SHA512b5703c1fe32a21aa10db731ab56713686320044c459baa0c8ec9022d7115c4f81ab622c9793cc08d0bfc95bbc15fdf942144568fed46d919f01edc6da5a71a6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f28d7ebdc18e87856e2789b0325977c
SHA145a48f6ed9a224edacc0daead15364a90f09b4bd
SHA2563fe4741d480caaacaa49a4d147a087aed3b2d15eb9375c4b4447c27a2cf92461
SHA512ae0cad34122af5a5a4e523b5145982462930197021ad5a3a4eb8fdb506ed30019394057e093ad7e8a2bd457c548c6c0d21d5f5d725832479db36ceb07fee3f96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d61a8bfec62ef5f214e5207471a8d28
SHA15088a64a80b3e92ead6657b8edd321861afb78e5
SHA25603579399817a23a9573402b5f3cde235aa7fa1419f289d1b48ab785afaa560d0
SHA512a160d4fe197f0e93458e439f6fe4d625201fb14f9e1861bddd1e9b88783613824adfb4b5ecb62bea9a17a6b02d82d9ad6f28d8adc0b1526a0c2b25aa543e4c49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f03f7e5e2abdee58fba3b2c14f9e693b
SHA105ecc95ac15e99583a5fda6cc55a01b039301db0
SHA25632eb4532ba26faf4a890deba372489e918d22b409ab2305ac5c9874fce7a7a99
SHA5127ae398ed513c43081d79df65fde7b66dca6e385d3bd39a68c8b96f46d41c819fb5741a15b52ddb974e3df73eb9345370c2c9e5681d8cda03100f4aef2d771fb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ec47efffb879e78d4436a7cf95952a0
SHA13def391473942e10ba286c0512e2c2def99c8911
SHA256be32213df642930c9444dd2fc01b21d6048296cae70f0462c47975970009e2b1
SHA512423d4425540b0a8863bc831d71830519b666fb355d055f8073b0546dcc65468f3c487cb68f93d04dca9339538b3fec1e486eaf367fd307357ee14596dd027dc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e28d976cefc34ce41744f8e4069500ca
SHA14ccc7036d28d271a15f9a0152c23e5cb9f4d5312
SHA2564e2f539c3bdf3fb56e4eb994627792218a8511d27a508881da0b3ab9588557cc
SHA512521be329fdc02b962e48749660f9b42ca5f310294e0e681e6370308e8c31eb7a55c6ce8f0043c7c437197b55162a8f282d2812db005fb243830a24e0261707ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afdea5ffeb671b22ef37334a3f552988
SHA163142a999d4853178480bb9e5c7e2e3c4eaa9917
SHA256748f91a6835ecf023b5a6c2e940c001f8de7756632c23fbc42c5d5cb1df3ade5
SHA512925ac97eb22de89fca37fdf0cf1fb408c98d4a938030e6a31fe8cdca4e9f359e7796b9355b97e251406d595c0b5f5c950ec4913ac84c3278aed0c0b056680f23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eda23cf8646086499b1779798ba28c6
SHA10ff0ada577c08a609bb51ac5d5d9dbeb1b54efd4
SHA256a840da6b23f424ddcdd397bd712780aa2b5d800f0437451e707ed578caa68080
SHA5126b3f274a34699c08e03984061ae2f2a31e161895e6edd9d3858dfc9d9498671221720f3f318f38de03c9e74ed0e397f0ee1b6c43297f004a1bdbde299ad614ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe0933d1ce201eac02740a6b31332cec
SHA1f12b7c8c984ca12c407405a94ab113ca52be07b1
SHA256cf137719e69765d928268a52883168d19df69e78bbd818ab3c9cacffeb2516b4
SHA5123c370ed4d915b77fa47ae192eb17cb6443c04799f28a1504b2a5867310cb13503780215b326cad2744328b3c6c4a43006e6b01819825e90accba09d9020b9d7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b49bb796facb3b52a8c485dc72b09ad
SHA1fd1e00fd424c68d799ac3088eaf69108e424a637
SHA256ddb1926faeb39e38437dcfd6a4df0d810b00765520dbc9d65f7d22c7a54eb8dd
SHA512a76e483174253ba039b333dd8d1ce3d2cae7e9a1dfca3cc32d154c9014b0561d0cc8162e4ce979dfb8e0e0d37980027857dea65f3af924f010e4c236cfcb177b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5821064fbc5c88285d511a97cbcefc41e
SHA1ddb60c43ec8b9109290c02299e8452d8bc6da258
SHA25696ceb1f1fd8d5aff5b71363beecefcd4f3f305114b65cb6cf4240a2f56fb5081
SHA5120c00243daba1654a7add8eb5309701dc496cb18551c89e4180f78b93f59edc77ab2760cc31eeb9a1964848b82d47d7ea8890133be6cb0d2b139529e12274fd14
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b