Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 21:28
Static task
static1
Behavioral task
behavioral1
Sample
bd390cbbf5df1877f27f81fdf3f4b477_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bd390cbbf5df1877f27f81fdf3f4b477_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bd390cbbf5df1877f27f81fdf3f4b477_JaffaCakes118.html
-
Size
6KB
-
MD5
bd390cbbf5df1877f27f81fdf3f4b477
-
SHA1
78e59171909385a3a45f9fbf884a372663ea6cec
-
SHA256
2f3c9c08c409b438aef285b4b9988bf63f47cbf33815998114888409a17da2e7
-
SHA512
f9f022fab651975f88e4a454b7dda5f246c0c59b6eed13ab5d5f1c983de100c9d9a5357b4bbbb3263e8f3b134f383cdd5d073416527b86d9ac850faba4f8ed89
-
SSDEEP
96:uzVs+ux7zHLLY1k9o84d12ef7CSTU3wZcEZ7ru7f:csz7zHAYS/u0b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430610455" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D252A151-6196-11EF-9994-C278C12D1CB0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000d677b5c4eff51dc96553a64313db3e6ca75fb7f9cb95a458904e2079f29c2df7000000000e80000000020000200000003d94eb222d8816ccb42de65a444a45627e9ebae847febcec1c070195a21d472e90000000c62abf3fd0f507c6f76eac3281feb3ac256a2c008198b8388ef175b0f87ad37b464210abce1400377cb04b0481f16161e4f7ea38a4bc68c9d88bdc40ff6c41c0be44223249bccda99bc46006c32cff636c3c0e48854ac1e0bca93f5c86db13607d928a11312bc8c0b17023629a5ec50859570e2a8b379c927c528ad94cd15e0750c829d03dc41ddcb3e5aa438ae9f4b940000000699c3333461d13381d278b82c1fec9cae487474f03c8bbd5d924a62d76a0b8e1cf3a23b5a5ba47bfe90e27ff29bef1af90f797f68bb34f83274863c755419bc3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 900baba7a3f5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000b8d514a713ae45fc344dfeac99fa5e3276b8d76325f73be0ba6dcd12b45f6d66000000000e8000000002000020000000480436226d49c9f3ba63f8467a4f5e348bb71bd2faf15954594485e95879620320000000747408a411c274bdf9721bebae1c2722859d9e5cbe4e6965fa83f6dc57b4d5a040000000dfb8431cf4c49cbee8771038fc770829b7b32ea99785095e3851561527048df0eeee753c2405b3c1acf8920d3eadc239b7e05928e62bffdcc748d2cc0c087038 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2636 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2636 iexplore.exe 2636 iexplore.exe 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2888 2636 iexplore.exe 30 PID 2636 wrote to memory of 2888 2636 iexplore.exe 30 PID 2636 wrote to memory of 2888 2636 iexplore.exe 30 PID 2636 wrote to memory of 2888 2636 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bd390cbbf5df1877f27f81fdf3f4b477_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6f9b14a634e24474db743591e7967f3
SHA17129eda5a069d4347b63385fad46e4da83277b31
SHA2560da11fb210122624c0a8910995ef7be44b69f3f694c0921953a7d614d6313524
SHA512ac833acc8c631591d7319f7bb60d81d3ec284133d68f31692ed2fffddeb0ab6d1190bedd9f88b87cb4530833a437e70150d2bf13d236bed111e03923065243b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580dd4c1b5d29d4b1860dd95e168ab2ed
SHA14ce16b781cd75e57039dda68080284f9d6576622
SHA256dafaaa5ad8193e3167cca3a30844636b03b21c83fe8f66e0d3ebba75b6b8d47e
SHA512dd996bbe18af3e4e990c537e5eea9ced9c80d99754edfc4b4aa4a2a5e1484878ece1a1df18167cdaa4b38e75985e9495e39309f50955f948eee9c8ca3537aa3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5676468b76e00fe6d6f5a49e973110fb6
SHA124354da8f6789dd924446d6dd96465bbc301bbb2
SHA2569cfa424ea755908f1abd7be673ab01c6011547310df7e16017134694d8c4a688
SHA512cea0074b0e7e25e8f3fd16fb46a3394d18c7e51c419c43acf7e1aefdd03e63b5c8fbe04f2d9ec4970800ac6ff12d3795a324deab4d8fbb99e85f8813488b2fc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5079b0c8433aca5a2e6103d1095435c35
SHA1b482d02606c8e2841bdd26844327c0c24ce05695
SHA256984ad4a96aa71a470db1d03ddec30008e21d630d5e766547c8f39e1a66bdd892
SHA512f046b36e4dd97c6a68619c90bface5a950e22349956d798c97e501311c6d333d7f0ceaf730eea5596a5341c389e8715d7ab6fdda283095237a59ccc6f400e9a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9832ef5b8d44693e59d9b9f5bfc812f
SHA1175f68fe7342da3215ffe7e37cb407ad7415bf43
SHA256679cfa455d29ef338c8c85553681780c8a4125019b555bf4245bfd57ba30e88d
SHA51208718f431adbd4fe991f5b9f39a68889b7e05ad8f15a4915f53dd9eb97fe7ab78d12c5d20681dbb124b88dd85ad9859fb411022ebb2c87bac916f48361b9c32c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa530b372a13a98586acd9426e3c6882
SHA15088a48b1ef47ff24d71eb954790df084aa63bc8
SHA256237289b59316f54e706e29d4bcb7024b1ca58997b0d213333b5f085d86af59c6
SHA512a3248602488d4a1979395d7124461ff02501d17762ae4770dbcd73f1e428a0135b87fe20112709d792a4986efa2d061d1583d50c29779cfe0f609c58a6100711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e29562b54e6330ded55d0d7d51919b8
SHA1920ef366305563f2f36a499c6d159a6fe807ec1c
SHA2566c979d8a6e0cddbc5bb64ddf42397c22b0da5c7c5b046348e1fce8b772105b66
SHA5127e8741614c67d1a148e4ffd6c142346a4b7706024e8f3480fd88cbf76c08b6c9d2d3d1a65f3d94782b5df9675d949c75ed2f5486743c1b1aebbe6af55a65aafb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de47f7d06c9a78e4dea44c8235632bc9
SHA131360350b6c26b0b8676ca0f5f3519c121def30f
SHA256c71aba1b75b3a043a8708af1dea9c3b3b3deb6ca3e1425950fe070e675ffb378
SHA512b123ed21a536c69898fa349f48709f1d972a7c053510f7585cc15d41a8a4751beea98fef5af0879eca6b3c3676fc5772b89de465d6e16561cee4c75c520bb7c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586eededb4fc7899112a5e95d7e81cf45
SHA1811b49633926fec34a388764084463735f34550e
SHA256a01674b1cf252d77af8542038b38c64b3dc925c28d6371ce77751662f3c8e02d
SHA51207e351a858a9462fb186339b3234a0323c4aeee2066fee60d9fdecce44bcf10fd7335218abb06b9001ca766d3e365c535faf6eb95cd5de4b39cff7bb78e2ecdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb15499ab8e7addd66d709e7cfcdefb8
SHA1180a00caa6b84bd47f7e359c89ec6429fe4f8fdb
SHA256c780b98da2473a097bf00aec908a3d1e3d5b9f13fd644b184e79b10117451076
SHA512339b2824c54445897231e988c748ddcee1f52bedef49b3acc859ad6b4531c03c8ff7c0aa7e3ff4c7da9654cae3ca090ac0b2e5bbc8524f414cf24859f04388c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593a8f23c60c21665c960ef782ebf9210
SHA18ef2c3617132e2a85502ba41bbb7533f10f8d1fd
SHA256237fed1b6e5008632b5ace394e33413c8ac373d79745b2c8eccf276ef9757fb1
SHA5124d7ef536824c0cd36f673dade9eb902bd81ec0a8d37b8e94f483204b1a4c07d6fcb494ef9234b45f55746170d2ab79a5c6ab3d0ea5db2ed7e5f4204310ade591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5806e5d89400b9e673e10c6c8d5af961f
SHA135ddf28c2cf1f6897581ec6ccc47c0b63eb0035e
SHA256d7d21c72e39cfeefbacd5f04d4e539bd48116be8ec1087e8c50816b8329ad7f8
SHA512d1bfa1d319535172be3d0a2398ce8ddae4b91934df2d0fe02009c360ecf18c27af4cbcc50193dd8d5334aebdc6a0f01407f6135d242578d7de8e44a36a4e3924
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50955e296aa0e8513264e27b9e017e2d6
SHA190481c000156066f1ba03f25eb89b9c90fb27dc0
SHA256172a7b8f14ec5da5eeedf929346e7e6d92870292fb0bd1458aa0c89dc681744d
SHA512dd620ce622a8090010b0e44f04dadb105054eea4dd10de05c177841161e01beefb8604bd4332764e7758c8d0fe32dc3f0bc9a7eb30ec63387cc60191c4317530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a53e9a79f280639fc8ada7afa3ee361
SHA1791c45f6a77becf17baff5558a2a1f2b51eb955f
SHA25697b8ba103fe1af631fb73c5f35b8bfec097e419fce97c204c83c962eef26dee2
SHA5124dd2d97cb381951010cda5235f766595fd2e369c77331bb999d570a68e73290173a7e065fe68ba5f29f85efbb1b17b6cfbd9fd2c07a5676b690099165656afa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca55448590893ce0b324371e142ef767
SHA1d001a028bdb4780a6d0144c25b1312c6f095c8dc
SHA25651179e4726a727b9c80ec6b93e6a73d14edaa951f113c180471d776f7ce2b8fe
SHA512afda112667eec6dea289687b0e9da850f0416c76b6099daddcf03baf19b599e41b78f8455e76c846578cdd7247aa1cbff9c0e3f42da76c2badc3ccaa524e5c5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5735170d6ed4bd2f51d442af04a09b00a
SHA1254deb90544d67dd5154dc460386091b927c544f
SHA25688194c95c3dc98f56dba4309f40888b46cd2cc3a9a283d38bd5ab2dc8dedf2ff
SHA51274ac69893bb99de03bfda12cd9f0a346099fcd9b75a9af86c87959a1a3e9143a5e27209bf44daee1dc9e5c351f9455016b5b9848c95719f7b83628d4306f0c50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b07bffb3617e1d12736390282708f36
SHA18b4d0a8c7bee6545c23babc741e882ae157f1ee4
SHA25609078031e1c6a47c4de43d2783d2a0358d56cffad15dc167a28b63de4de696f3
SHA512e0e1a6fc757322bcbb7814247271b3994d9a36aa1623003084ca9ea9c369d06410ba291cc59f5151399f77372a4c457b979e6c3a4c112fa0b67081be8fb1d24a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b