Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 08:52
Static task
static1
Behavioral task
behavioral1
Sample
bb11c2f356e9b3629a3889bc2325c979_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bb11c2f356e9b3629a3889bc2325c979_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bb11c2f356e9b3629a3889bc2325c979_JaffaCakes118.html
-
Size
24KB
-
MD5
bb11c2f356e9b3629a3889bc2325c979
-
SHA1
42dae06713796a64660be80871671c7433b4f59f
-
SHA256
c8c7392d35f1d1971a3b485bc2846c86896c615a0b3e22505bbe098dadcd8366
-
SHA512
1c27da60012df310313e714efcf3a020a48b9bc7ef02b90a931d93c735acdc3599e516bb7111f880112a51b5f8cf67407e6d8672a77adb696b2404233c70db8f
-
SSDEEP
768:yquoi/poMnflBmlTaAm6If0LwhybqRJXN:yquoi/poMnflBmlTaOMOwcbaXN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000c2fbe028566a91431a49fcc6306ea10e7d3d474359b6b5ddf2a02bb9d9b7b265000000000e80000000020000200000000c155ef5e065f1e6e309b235a4e0ce730d0fd428afd3af00fa97840c0a754c84200000007664d507a35fa2714f7651f732ad603f4d1266a36dfeb9164e8b58ebcdaf04334000000099b7b68392d7d7b60d62ecb3a29ec584dcdd3905ef013b244968cb1f7d32e34715e8f47c2570c9f5916070177ea53ecad8ca88f5f21055b00138b179df4963b7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430565005" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0091F9E1-612D-11EF-97E7-D22B03723C32} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80b783d939f5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1404 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1404 iexplore.exe 1404 iexplore.exe 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1404 wrote to memory of 1836 1404 iexplore.exe 30 PID 1404 wrote to memory of 1836 1404 iexplore.exe 30 PID 1404 wrote to memory of 1836 1404 iexplore.exe 30 PID 1404 wrote to memory of 1836 1404 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bb11c2f356e9b3629a3889bc2325c979_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1404 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb7d7bca26f2ae7d80830cf4f433e31d
SHA1c3fc3e0408271065b9b1fcda9995c2f45da152e3
SHA25669fd11dc2af1412ffcb0d78204d5c4c0007935f26b403ba6084bbc5f59eea67c
SHA512321bb7e56647cf31b66696cba1aa9c59cde8829f1f38cebb5724f73fe7cdf7357451267b0a870054b477ae7c12b1b3c9859a5a3b4f238752fd78f2075f59e29b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d696d0ef7f302362bfe088ed7e43cf5
SHA16f492c371711afd21e53fcd709cf81fb99fafd05
SHA256e38c9047f3158f730d3739cb969543c4100d2a16c712413b0f4d1406efe1b6c1
SHA5126fd9736fdc0ac0a70101e1c94d30544fdcba78b8c98b175dd1780daebb62fa67ce7a10b7bebc52938810b4907509dc09a1b4eff4fec24958c3f992cc77608abd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8e1d8b81cfc43a660fd2efbd3d223bb
SHA17befc86d4b43b1b70f6e58bf9b5ffc92c91eff3e
SHA2560b4d0adeb6c60c32fd26592bbf6db40786493c7852647046ad2f7273b8a695aa
SHA51276508fcde70e24f9ba100bce6f5a372c3d64ada56929d5d20f12a97ede806b1593156b396450e3d2796f2f26094eb4ff4fdd61296a302d74d132180dac90fbaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfc70571b1ce9151961019245300074c
SHA14428128904bb7d7e36403959c2dddb031fbf090d
SHA256fe2e62c1daec3dc59dc4d94d84b7a1e7363631c5c636f4a77db0c8e56157903d
SHA5125a929abe6fe3faf9e05dbe2e707c25c48e0299b80f7134564e5366cd03d035a0df03a2878a9238deaf40379b159c2d149e88cd98eed69b17720dd68bf7f9d75f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd24953e9fce57c6b2c9a4309d6af179
SHA1e336223676c221905d1f58cc749f770deebc0415
SHA256b59ef436406efef113555831bbd529d387302db9a5a7bdd8ad4746508c0726c1
SHA5120d11abdcdb5bd90a44b0fd0f2a70369d91beea1c79757385d4e29a297baf95406518fcc9f503fce6c1fe2a02a11ba7f52bc4e9865f2230b8cd8db95d699dba30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f81c74c0b469c1074aaedc0e9b95612
SHA1cb35cab18bff538e12eddea70034edaf328add30
SHA25648d33b93e82526939742315c581a381f2f8e57c19b941a835b0a4454f681e337
SHA512310e06912cce2299209c8d33eeedac1c8c256153cc9b8c5509dd7a8d90eb5af36ba500261529b7e48c3a6ce375796a9dad36d48e8c749685535602e70b3b1055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd2a52254c21902372a5f969ac02d733
SHA12a679637c42a4c6468fc13879229d526425159e3
SHA25647c1739f5a9846d84697fe947d43d72c9c774f48d9171ceb58865a49017e34ba
SHA5122a9e43a78ed3ea2d0fc3161381b036332f3e533c36008e53f329feaafb73dee9e13e2557a9ed39caa297dbd9dbf96feca2f9bddde63528c143a87ed72d3fac02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9e74e96a65ded26e5002f2bbc319568
SHA18596d58b3d5c7a0a1a42318f6ac16dd30a2fb07d
SHA2565b3e5a3d44bb4126f75711f8bd7517c230db66b2365d780978fbec3eea042953
SHA512c6fefe73a89a9a3c1067eed0e6604a8ecf957acbd65b24883abf09eab8be12a27539b22625165e08ba3e595c48098b0de3db70b7340b55c603fc5d9aef5776a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c2a06dae572e8d6f885d198c8797f22
SHA1c040bea2367312ac6d73f9a0166503891a3a10e2
SHA256ca1e9744860e72960fb3e434f087abf4bb6471d1fb01cc915475ad0f6d3345e8
SHA5122fea4304671019bf707163a953790a060a2c510bb8777ace13205bb7819ca7b7b904161a5ffd4c185347ccb1304be4752cfe3ff6dd6e460bdf12c672a0dd9ed9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597fb06500fb66e21aa44f9f2fc8281b0
SHA17a9fd655a198c37ea1b8930525c4736bc5d23573
SHA25620c243a90d43ba2b541264a6914a1f35f5595587b114f08521451673c5aa37ed
SHA512a6c2d7aab8958fe8d02b7c53ed1c744d5ab76b2d396279d53db40311532add926240a545e11cbb681aff9d0186971d50e42dc3ca1820239dc7b1231e246d3ef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f68e4144bc8e7d3f65c2ccb900063f37
SHA1ead511487d8d4a29dc3d5a5323aa92bf4600a159
SHA2561bb11207a61384ef185979c94e7b44c3927a2f7f4c8c8f1362b2c0f1c666895c
SHA5129f65bb9af7041dc794ac44149a1dbe5dd84bcb8b335bf07cbc3a172f72b86590423db9dad261230a06787203ad6060b4d57eedc03778d4b28ed58d4bbb7a2223
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5667a300dbf0bece940c1427fa8f4f339
SHA14d829df64d1fe6a26bb299acb65281ea45e9b8e4
SHA25695970a70a8105cb503adecf733e2e85868dc2e0cb2665442fc3958c9c3860cb2
SHA512192e10eb0df31052bdc2fe59940f7646defcdd49f0d8be5059753e72a0b701431a8d782b1880ba48f689c1f65850dbfc1271cd4b93cb4f1c2f3fef254fc6672b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5810ba5512e894458a905a5b59a5454ac
SHA1b33d4ae4325f26188b1dbb376f62070bbad2b6d1
SHA256c02626c90bf626c3addc9aa01954f535411831aceda3ced01d802dd233ecb20b
SHA512e26a34cadd89c470caf4eeb6cdef693e254673534a08caff31354750c3324f80b931e67ed657e59761b8d8eef170d48ebd33cab781b4b4913f34bc4c80cb4f5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6ec467ca2f3f90ae09c4f0db73b0200
SHA1439f011ee9cd06a49c4e760d40a700ad06d885c7
SHA2560f096b14c0b83c428ad8c6d42422d17d0c7433d20f9f92b1655116fadec761f6
SHA512f4eda37eb32f924c93247ca3a114093f1196270ff16fc6899cc1d25a9be6f293867e28ecf2df5cdf32b7172a7a157be114b77b00fcdd27388bc1e14fb238bdde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a01ebf4327415efcbb2b41593abf3d7b
SHA1b4a93276e5fb02c3bc49681546d26b5271b337a1
SHA2566add4495a9aaab8382b26c3fe0c9896057cf164b2f34c1c95687c0cc1bfe0030
SHA512e7846bc55cabe6a14b33cfa03d949b190f995a23a9fe075080539797574bb6882ede7ba4216ee8d7d15274ea53f238825a092f919dc159912fb6955fb93a4693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c118fa9d1f8e3c673ee8413ac9d9fef
SHA1bd6b7aa3df38ee5eb99e8651693b88ee53255b50
SHA25630e5d6ff6f170d4e7b335e9c0a405c96a8b404424a5a33d91dcaf9cb763ff2bf
SHA512344ba0da38c4698c2264014663ee95a788e9847c9f5e9aebb57edb14b538b4b68189aad82285c652936ecf45bfce0b2c00d4397260778d21803fb54bae85f9ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b1c1558762938247f09aca1febe3f39
SHA119059736be82bcae02b09a646de6db4f021d3609
SHA25674b20f8e5b7e5604f5f656e0489272c8c16cc5aab567841e7ecf1e7ba5d26fe8
SHA512de026d834f444a9e1d2a25a02261df9f795208f77a33951fb44eb0812d0766af7811e1393de7620415afacfe72bbd5b1c393299c131473428b8fd861a77bdc34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa27ff3ae8b4698bdcab05fd561d1fe8
SHA1bd0619dd5bf52ad82b158faab3c75925b4240152
SHA256fec3579d5ff7c758b53b026cbe8ff0fc7db94cc71b6bc844c394f7fb6e7944b3
SHA5122a867b18c98ec6c13885afb350d9fced0e9161b1baccebd07baf439a57d7248f35e5cc310f5ff898ceac1e0119f5c3f771ce2d4c863a1da7d1837eb4498f2f97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc1dd5fcda9292909995b758833c365d
SHA1abbca1e4739ade739eb2f39293ea350cbc31cb7c
SHA256998d51d534edb3d7a7a415b4cd6387e53adec624d756a3d06c6a076d7856204d
SHA512f50fece47deebe957414323a62f7854168c2f3539cb9db3a439709176b72f544b3adab4bfa31255b26ca27dfc4c376ec58552718522bfe71dadfdcb66b548f2f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b