Analysis
-
max time kernel
70s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 03:20
Static task
static1
Behavioral task
behavioral1
Sample
ba274545aabb5a7fdffe6d0c811239e5_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ba274545aabb5a7fdffe6d0c811239e5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ba274545aabb5a7fdffe6d0c811239e5_JaffaCakes118.html
-
Size
9KB
-
MD5
ba274545aabb5a7fdffe6d0c811239e5
-
SHA1
7100129f1c9ec43b7dc9ad50e5251f4bbfaf4aea
-
SHA256
1a3ddb6a152284fccea1a47ea451ba895ce67d27a2910be409a18c5a9bd144b9
-
SHA512
985cd787388ce66fc185087ef1e975dede1a98b9ecf556adf68081074002bf382018b15d1f2f1715aa8f8dff3f29277fa24bfba723a3892dc3c0bf859e8074b0
-
SSDEEP
96:uzVs+ux7qjLLY1k9o84d12ef7CSTUHzf7TDBEMFTQEM85T7+TKIT6+TEjhTCoqTe:csz7qjAYS/bMHMDJhb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e04d1b750bf5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430545077" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000278029dc6a0f4b80043315ed424067f2a743428946bd147e92c6e840d8d9073a000000000e800000000200002000000068deb1346d217e79fed3247620c7e2572278eba81e547b7d3ba6b6c2e59b9d96200000004fae0fa9825eefb4f969d7b922ba0cc4057f85f823a80ff7ded2cc1a0bed58ed40000000e00181a5758b5058d2bb1db5d7bed7bb706bbe4a9ced1cb1e712c69424e400b895b3a2c4b49ded119cf239aa3599096fe4f1ccfde004f30ad22e44663cdce9d9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{983D3AE1-60FE-11EF-A251-667598992E52} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000dc3367b2b8343dc0d047837fe415b7f201f7b43be33bc87ed37351905edf60cd000000000e8000000002000020000000e795aa9dfd53bfdbfdfffcdc9baa187e6679ddd14e2592317c5b206d4b094b9b900000000d6fd035e94782385768e54b11d9b10bf25844352c72c6b60ada7d7006354f311e8c85c15da38b2012aee99b22b7b7baf6f062f6efc2a615699ccdbd4987fe7d26f5580d4d63b08169b3fbca5cc739e78a7bf6bf77f2c509742f733c5d60937c9e20c4ae2af25a7d8d713844c685eda8c9ffd6129a2b073283f80d0c691fcc2c5a9ef01a596ee4198b461cda8700816f400000004d555626c6a6f5043a2d50a929c9e8045dc264896a7905b374566521ebb326f1b6355435783f00bf07dc0ec648d0ebf327dc54cd59df7acc3ae5d78ee1569d80 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1512 iexplore.exe 1512 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1512 wrote to memory of 2804 1512 iexplore.exe 30 PID 1512 wrote to memory of 2804 1512 iexplore.exe 30 PID 1512 wrote to memory of 2804 1512 iexplore.exe 30 PID 1512 wrote to memory of 2804 1512 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ba274545aabb5a7fdffe6d0c811239e5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1512 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5add87584dc15370308e3aaa68ef1a2d6
SHA11260dc3e1b71e79ff34634cde6ede93cf7e5606e
SHA25694ea009590aa622bbf33cf65f6be0d3252b5e4aa2d41c2da1da7ced1da1997e8
SHA512f1aa979c59ee92d29898831c4d53f1b6c34666053961a280e0c5e132f3734a12a28b927c8c78aa7c2e59fbb6fa44267f245f47e2cd2c3109e2e726c4797ec28e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e96af57ce8343e2faa346d89a98c960
SHA13b46da862de988b7601fecc2add2624924fa2ffd
SHA256f85d7296c47b909d34541fb0756087909a1d10c92736aaaf1f2f8b683665eb49
SHA512f8d6a56de63af721d1885e85a144b4cf050d457bf842d49d93fa6c1bd16571eaa0ca9e3a9c5ffc574477f5aaad7fe6eb795e13e1f0bf68909656a3661bd6a134
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bf49d22ad12a2c854a81b3de901ac21
SHA195c29e5d145cb250cbc04607dae9ec6d483ffd92
SHA2566fb5c919e41e7bf1d0835449fdf7f0b67b223e70f24648e443f32c17f0113713
SHA51231d6c4940e882bad5bb9bf26b6b9139438ad87e8cd0703e1767f870c6e1ebc26b8c0fccd0863e929fc4ca8a46fba5ac6374637ee6f99a951256e99c39d012372
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58196c5e476afbf39c310bf07c1a0522b
SHA1542f2f581a85ed8b8fff0bec8d495164c8042fb3
SHA2561146a1487a9089ad5b3e15f7c91f0b168a50bdcefa2a9951ced935be41144dcb
SHA512daa275da7899240e8e96299e75b32771092f2d78e0b61b4527fd287549e3350674e0fe537005078986d8464995b6a2a5889890de2bb65ed51265023dea3c0c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570b751ca871f8c8dfc853689caa9fad2
SHA1da38affa18e76905080bf0a835b7b8eac12c5a49
SHA256b7790ccfc709fb40220f1b4c736432001d89447dea5b7058682d0a50fe5f51f8
SHA512278d36d5101903dd7e54bbb4f1a1cf7049420d5f29e388683e5224ce7480aa98ad06a977f8c1bd724408f97bbc4654b0cff2f42372e5a8f8219abc14bf25695c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587f6f7213aad0fc5530fdbda08f8b443
SHA1735ef90efd492eec6b6635b21b146030223fb418
SHA2566f35edbfed5143184eb0f018824f8126df11d2c05f5169456c0789d8aa527cb0
SHA51234e03ffc9abd21eb61155ae23542a70188a2ef03c54eb01c40210dc0039a61d84bc690b8cfc236068e7149eafb3834b1747caa248ca11c300f4dd25696655279
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56960ca1406e6682485d3274302c60177
SHA1ceb2c2eb089e4de3aeb7bad863205ca1b9b05d58
SHA256ac37515fc7bb39e05349f979137d15ff70741a8a0b3d98ef744341dcaaad0ff2
SHA5129a82f240e6bf6394dfa39d1dbd4eab7c3fc6d4f676f8bc64dae8203ddabf79c1d4c9ce083a46502d6a3856e20f48558cb9ce187f518962f680441f9776145a31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed7f7758b67f6c39672f1d0fbd4d3257
SHA1ea3a06ebe0c7ccf04e0238cb6da14292ef3d4be1
SHA25652653652f2a5f17ec35abe555824eb2b9e63fb46aadb90de1e70ab503bfdabf8
SHA512628423b4f341dc45a7e8435a794431ba1d010de21ccd5097cd8c06036269172bb3bb180a39c2268fe93d770d05c5c5251bed2f1b24de83bc6a9aac4b82ffdb9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5940004783d35add469afb83cfb6196b2
SHA1dfc6ee9b4fa555b4118642f92fcac648057413e2
SHA2560261e7c2c8135a296b38ffbac50723a777b4ba29cbdbf42f33d34ff94b7a6b5c
SHA5121b9ecd7736e68f19c6bb23d1092e0fcf84b645be87dacb23d5a983ac3790059ca86f5bfe964fbbc6da53c12c62ad99520baeefba88fd0edc23b1f05cbf3e43db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0de3788c1ff9bf48a48f6c3931ec59d
SHA1e31cae053b84593b49eef47e04cae41e5e3d6d8a
SHA25636b89ac507f3f6bcbb6ae6d81fe32c657759c90d81f9406029ba6388c189e2e8
SHA51232416a7046cc4b4564635ddcaf035a1acfd46270fc84597b56d05d9f6b8bc7a75abbef8b1fe3feb782717f8be455459834e2f228ccfe43c078d6b4787e7a90ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfaec657dacdb47b6689e1ced33d66bd
SHA1caf9588683b04b55f4e0f89a462df71e0d27e703
SHA2567905ecaa3f88492de3e2a6f7313861a3b28358776b343aebad5c9074543d2da9
SHA512e13c2d546c6ca07c43c6c423f36bd636d713f6ad6d494698432535d1850024f132564766190516f00851a580e03ab8c1baa82ad4eabe3c7bc8bef70359ab9d70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a57ddd4b67ae298b4a208519bb72bfdb
SHA19df27ea528c74658b28f2de91708398f8b20576f
SHA256cad0bad1f827f8fee82ee88aefc5ff143d9cc1fb3b3c88c54c2e6067c417ae2c
SHA5122c535db1bc5c5b450691cca5529a622232c10e7cd2d2896c22b521acf9493ff933585d9819eb0c85352f6efd02410dd74b574da7a6ce8cdd17cf5a33e3b5d5ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df0b671efa89abeb4fdd5a25255eb1e0
SHA19a3a3d878068cfc98eed985a932332a239e80da9
SHA2564b7c8428aad7475815d9f83cbb63ae17047859b69cad4ea90433bd4b1d5bab8b
SHA512b1f5c3740c0e649805b8f7c73d348b65ff5e1851294a9f56aff526f03776e5b86abea31d639aa5dac02deb17a708ecb6a9d554134659c6bae0f11ab04f1129d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571724b1c0350e3c35ea2edebb7b06b5f
SHA15747e729ec68b848497356d69d583d5e22ed2e07
SHA2562836b83735200c9823c5106f6d7262fb67eeeb66fff1176cf46e3e40b5ac0b83
SHA5127315c69980c038e4c43e6012a89c1ecd3920bb09188b5e8b98c8b22329209f6a5e41934d8acde13398d46ac5b8914a106aef2c228e38c005aff99f6121618651
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d2df202d2383de25bd771eb13e8b1df
SHA105fa9beed9f04f0304071b07959c6cd1ec46e86e
SHA256accfd9305fa4ba7038b33f25f0f4922cda39f8e70fa05a72853643bb90a91fa1
SHA5128fa201713257eeff41bfafca902044831d19b1ddf875a74b23208b964b5bf2a8a2e2141f463a1cffaacc1423432e14186aa0c53da6128db63e4a6d655b61aaec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558cc55ea90f279297d7a74d8b9c9cb78
SHA11646c5936a129e461777baf003acfd671cbe2094
SHA256527520731bf3404f752cf79496e2bad587062b17c85af34315ffb9d69a8a3f7d
SHA512e7cfee8f4cfb2959c2c82ed0e1d6be9f429b2f1be2836a5c939ecfe58028aa883b9e27211a636d39a065b908cd914d05da9a2940f39ff4145395c1c1ad4176ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9804b8ada75380b086cbb12f1df1f8d
SHA1f0e54788defe25e0a3ca1c1ae217950f8071881a
SHA256915c78c4d27cfbc15adeebdc735c767534c8f1ff4032ce6e16af5b528ab6f585
SHA512110922568d07716f3faf3186259fe6992e69eab680fc1e7b7ecbf6aaaf1db00660a843e4eb33b1adc3fcadaf3c6dd84d256a106aa4b2fccf0db8fdc1ad0da36e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b