Analysis
-
max time kernel
135s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 07:07
Static task
static1
Behavioral task
behavioral1
Sample
bac5d5ef96a33949e42b9a1ebf07d76a_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bac5d5ef96a33949e42b9a1ebf07d76a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bac5d5ef96a33949e42b9a1ebf07d76a_JaffaCakes118.html
-
Size
26KB
-
MD5
bac5d5ef96a33949e42b9a1ebf07d76a
-
SHA1
3b4d78954f51964273f944c40946e12f51a14615
-
SHA256
d51f8524590b46e71a8fcd3f3024d2f09b52aa9c5765655b89c10f7559455d3d
-
SHA512
b6a0c437b278c538c21a22e83c4aba4f38d3b9d723eb4a39cead4fe3ff43fc9d655f7ec557a9bd4e14513bc5f841e8c9e0be69331c8ea745fe1c61193d314309
-
SSDEEP
384:4+QfPFd9QZBC7mOdM4gBKfpC5IgSnbmFe7AchE6okkJvAgo0iyANPd:Zcd9QZBC7mOdM4lpC5I9nC4uIP0iy+Pd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430558708" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{54E10181-611E-11EF-AC6A-FE7389BE724D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00c8972a2bf5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000046cc2ed4b3ccd4785d21d315bd597c028261ec5e5a591537e39c1f5124be34b000000000e80000000020000200000009c92eab277cbb1df3a60685fc1be706c2e85fb1f2afc8039be7ca344b3eabf6720000000f2ebf8f972c3a2bc7d737f1590e138d3738b6cbc376883bd1a39b9cc00ff3420400000003c9e49341a838ffbe71247c249d00d6f5bc560d872aa6ed48685e91ce8bed60cfb578083c4fe7b5133a6084c30f4a37bc0bf72bcb79936f2b1363b85c78c2f65 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2232 iexplore.exe 2232 iexplore.exe 744 IEXPLORE.EXE 744 IEXPLORE.EXE 744 IEXPLORE.EXE 744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 744 2232 iexplore.exe 30 PID 2232 wrote to memory of 744 2232 iexplore.exe 30 PID 2232 wrote to memory of 744 2232 iexplore.exe 30 PID 2232 wrote to memory of 744 2232 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bac5d5ef96a33949e42b9a1ebf07d76a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52741e88792015c101a0c6c48bbf0d072
SHA1420f779a02e93d1d913660d138eb62fd18c238a4
SHA25657b7b834fe34a9b980cff2d59961272a1cdc4a45eaec3a029cfd523d19171c21
SHA512bd7bd7ccec58ebdd840dc522b084ebc55775fa2a5a9f49b93bf6ff2775aa0b9935c88e68f62d0ba4d242a51d3a6392f68da650fd272313a7c6122effee72d43b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e66c73a2d759b7d143a81543dcb28761
SHA14014ba13c9668b635cfde504316f936729d775fc
SHA25677432b74fe01abb07ca9f6402dafc6e68d6cfdb43750c3fe287be2891abc23c2
SHA5124c150b12670abdda811962cd06f73babdbd1e8834a7ad6371eaa7a1dfedefd14e80a6fa02c4046ef080f6241546f9e95533e48c19c981311565ecd0c825aec79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5764abd5438a34157262fb38a26eaca49
SHA1acd65704903ba19afec7bf44388bde90e235d50c
SHA25650cebf5102d7d44b98c0b4c5b303d3d8ae7ac1cc23b574aba520b240758ae8a0
SHA51236dcb21e917c5d297d3dc016cf772314362edfc93a32b53a17da6a76edd0a7450397be212edd13df852a94dee28445b1c2829365db187569a522152dc4a35288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8f5864c3428c91a3d3e416a13091e4c
SHA1ac3cad93686c320f6e4cfa5bb08d083b91951019
SHA256658edb8dfb1eadbb5bc434a3e7ccb7cbf8d86fae4abda553d3f93c0ed18f437d
SHA512a83bd9622a5c46ecee4d9a304bd156f5a43989982cdf029ae946b23fa2eb5a420d2e6403ef99de95b3bf18fe929a75fb69356774fd2aba1fc919b774a125ceac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55efb296078b44c1d0fca6d9574dcd773
SHA19968a2104f06fa82cac3185faea7069eaa6a4a3e
SHA256bd2f6595f1aefc467bed7b9eeab9955ce12ba2c8f1eb2db35e7f3ad9d68f18fe
SHA51219720338015c9074e722a99ec73ddb41d3d70953ccfc27d5e1b6364992ef5872a61a09734b0b2d993550edb3ae75b7e71b720d3506d7e07371263106cf80a9d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ba38793c22c868f49965cf7e582e9db
SHA1b405c3d1d2f5da506179c43a9f7f775441f8218e
SHA25663b7ce2d460e46044cc6fb000d5ae8ef277266859c42fdaa2016e287255120ef
SHA51239dec646302349670be0dd614492bd2787de678798ccba5abe3610b4b1b9a2dacda70f0b1b35e01080645298ab279e0e39061742321bf33f2b581f778b3c5420
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e0da8e27955c856de99877f4622cc43
SHA1059b604195590c54fa40e3817e623e87a24ab32b
SHA256b155dbf9285c2752de922aa61dd0010006d90b56ff8e3800147df3a5a5cf8277
SHA51284a70790323a3f733130a0fdba225b0240e8bae136441e883c945a77124485b548bcb77b8acd3ca870c81b5b98e7eccfe9d1c541eb1cba1aa56e7f3aa7105ece
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3492c57a73fd72f44df7d9ff6d0e5cd
SHA102d4ff98e5953ae3f8d5f57ba01d41d206f01933
SHA256d21d4c9cb403fec2adae456cb41b88bfa570ecdc140cbdd6aea100c9713c552f
SHA512dd823b11e192842394d5a78c0724ee815ae09768fb620ed6aa23fa23edcdfc211e55af040de8d344797f544f95578a1a8aa6bcdb21487d7bbd56c89e9fe32938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f18abc21d2fb30b7d4483851ae3b2d4
SHA19a822f6313eeed385fd0d0883a3ee0474b4bdf4f
SHA2563cbbd31e77700d3a2517b26fcb2816669b52ed62210c207fe7b65c37d9d310a9
SHA512ace421b86bdee935e563ba644973856d76404ab9864cd16a88e3730b503d42bb8e7a1c3464d2316d87809edf04f1e96598a61375d620588564dcf0c7f3606bd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58593dfe02a05796b1d67bd840b91df2c
SHA19e7e8c9059fb726bdc972f74ec499443cfaa491c
SHA25680571883ed229f21764d16f252fd05158d4da70eba60416a198bd69a1478087b
SHA512b97cbcd445b7117fe24730204c5d8dd5ad662b9cf9b817dc657dc0754d673a81b21d0ce3013552c57d8e200d10b4a222cc2daecf643cd3396601e6b4d52ddb72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a0dffdb7f77c483a2bb1a50070df0f8
SHA12326368cddcea9c21d1620eb25b54c2bbd8e842d
SHA256b3fa71d1b95c2d4f5864d12944f4d31593e81b674774282ce3361be3682178ad
SHA512eef8b0a6ff0d610c1bfbd1dba5c4b9408416625530ecc2be373d18109cca119a6cd4fdb93cce191ac5f3f63f2183ca444a02c475a2a95d4704ce5d883511b62f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5969b2afe0a1ebefe7b27fbe6fe28784c
SHA15d2a1f3198848b98f29efb0fac1b431fb28f9bcd
SHA256c9dbcf83bffdbc1b666fb375a013d96087c1ebc36a93cf7da4a90d5d116f6330
SHA5123a25d88cb517225bcf9ec6ff441f448df28c374d592c9c57b1894ec2fc388c1d7c3f41087e771cf8f5564032da525e5339d68a31ba6d00000e10ee5002eaa8f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5664479e1e02570533a7c16e1a7ef5811
SHA16ad28c51eb28df9cf437ee64f3ff4014ff2058d3
SHA2562ffa5efe14481bf5c6ed44ca72101e51caefdf0999e55fde858541bdc0140479
SHA512a77995262324e241db2bb24690b094e1f9533056f13256602ddfcfa51dc4be3803f42bfb583d7654adbac5734386ee71200da5165e7d0b3ab8b52d3705fab451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c915ff06532adf563ec7dc03924d2e4
SHA155dbf0fd36bce5ae4d331a7aac7d23f632c6431d
SHA256ba6a8352519d1fe1eaaa6f599080d049b5939f62f60d2ad2316dbb3de0015452
SHA5125eb3d98eddd5c02a92c8c40d28220fccd81f602cdb0d99713e918c9d279ec33993a761bae931044925b0c890fe7563898447b4fd3e5d9ddb3ff3c386172b1ade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a79987535e585839e9dabba2adf91d5
SHA13d387d22b3576a4e49b64f44955cff2c5d277877
SHA25617867ab64a9c04ee8e00dc7c3feb83be25fecec0f4db9ab1a0757c061a664857
SHA51274ac40fac09fc8ed98cd9c338d78a729b4bbfc00e66b8abd849df6c97120316a2caeba74329884360ff65e92af14c92af611e37eeb8aab6fdeced76fe8a72ba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54715705814c7e03e557d3ed4ef9dad72
SHA19a1c6421eb0e68bfad35fdfc6a6c19d0c1816151
SHA256a3ecfde7b088369b9fe9a7ab2853c92d3e6752e4f41b9311861fd90883a7256b
SHA512f5a0d732b804766c525bdfe80ea458e428b62895bb4aecdf079c31e56b4573d7506cd75adc3340a4853cb64329b3cdcf25d08404aaa5d7fbd392a53963c3238c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba33be268bdfb7941a6c847c8c3da482
SHA19227fe04206413d2c5d46ab72327800448ade939
SHA256898954933d5723d630b410b6bf11161691bddc901be47057e2e33797a23fbea7
SHA512d9601b651851a589aee181da02e0501a981dfcefa832ebe95633141498611a96e3b5866eb2937dd7d6d4e26af9b8f53b08bbb32fe5f0faeb6a28f9fd6f1dc4e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0dc4866f863a8595fc0c2aef3c70220
SHA17e69fb297f559a639aa46954abc4cf7ea5686d12
SHA2561640cfe50752b06ced5c855257ff1025d53bfc5e3c33ceaa413f30800c106ebc
SHA512a6fcff829b816ceef9eaba36e4fb377f702cd6c332137ecb6d29afc376364cd03576e7ecd782e5ec4fc10ac7370a6e7ab5c8e660468e2801285a09b1f3b82102
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5088250a78f9e23fa7880d544da21b92c
SHA19b676f6b7052c0252d9bb45edc453498b5cc13bb
SHA25674189cb322096f4ecaa6d621b40818278cc4ba8ff2929b5d749c4d31829d4fcb
SHA51250f1c90f4a772fa481d87c69a7441a1aaf1460f3302d26a9b6de1f5b3fd29c6815a6a71807d149f987bfd842df625b2e6fef4305a877b5f784b721428fe53748
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b