Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 08:53
Static task
static1
Behavioral task
behavioral1
Sample
bb13114272a4a4f500fef36073f66bfb_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bb13114272a4a4f500fef36073f66bfb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bb13114272a4a4f500fef36073f66bfb_JaffaCakes118.html
-
Size
6KB
-
MD5
bb13114272a4a4f500fef36073f66bfb
-
SHA1
7d1ef4c504b8462290833d078b533d8b77234622
-
SHA256
1739c6223379e1954599c40867e6fb8582631c6659a7551ca6a3fc653b4e0b14
-
SHA512
f4ca801227ab94875efdf59059cb95d120748b5f96f4b77e1749db775f8fd4b71741a31251044389db1e5898142eb7c6cf6566dbea494cbdc170b19cad20166b
-
SSDEEP
96:uzVs+ux7cvLLY1k9o84d12ef7CSTUFjZcEZ7ru7f:csz7cvAYS/Ab76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430565090" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000b8a811a50b5609feabff8f1e0db797e4154623cdf7f9c2f4faba9418d5a2323a000000000e80000000020000200000000e9897a5ecc375019c5880f27a5067701dc2915b7218a61d6da15c9b3b9e5a31200000007e81583d82c30ec8f731586a1fe1b4a7900a1efed60aea63728eb39093e358844000000071bd5fcf5f0b2203e9873ecfd7a74e1dadcb7e077af9dc9c58931d80b34ab3fb895d1efdea40499da7f0605ecc5b00487e5433f4c02ef7aaf1edf4e461842bbd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e06e2e083af5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{333E3C51-612D-11EF-B254-46D787DB8171} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2316 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2316 iexplore.exe 2316 iexplore.exe 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2784 2316 iexplore.exe 30 PID 2316 wrote to memory of 2784 2316 iexplore.exe 30 PID 2316 wrote to memory of 2784 2316 iexplore.exe 30 PID 2316 wrote to memory of 2784 2316 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bb13114272a4a4f500fef36073f66bfb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2316 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb517998a2db23900665138cd14e1273
SHA13d6f7a20b82821498e504f427270f88ee57d2b80
SHA2566b42b105cdaaab6213813108a2d9fc99c825ec640502e0e1c6fd58d0794a838f
SHA5124e6424a4662f05bfdd02dc3ac924c5bf8883d0315704d128707a088a58089fc0b64c4950d573dfabced51d37e783cd3ff022a52657dd2afd27589297bcfdf7b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cf404d5d2ab3c4af246dac51defa638
SHA1b7ee735e2374e0ec1f92790af858fc37d98a0fac
SHA256c48c05867a31993c529363ad91ef271cdbd16a475fcb50f701b0b8250c96c22a
SHA512277c89d8fa1b13683ff75e4cb9a1f3a599ef693fb252c50cf14f27947d1b21bedff03e6b845a80dca9c5445bf88c2faee771b064658cbcb5b15f8ee1dfdb3a14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c026e26e6cf908775ec054c7553fe517
SHA11874cd2be3d3d80c9af7f2472f9561f0c717444b
SHA256eac3009ed47535d681d8228cb85595426c1202c40930850f3909fdce9a6f73eb
SHA512f516fce8133878dc02869d198b99688140fc0c6240ced5ceeaa9d116f2971e58b9dc5b5e80b4954358c8c37f26f6bc9af9135ac760a95f0790d2c969a3c6007e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50958c81ef9c07ac216ca4639e7ff4c17
SHA140205bce859ec966e51474109e61896eb824e032
SHA256130ef4665f2784130b220925ad6c5a74ca46956d6486cb55502db89c71e95634
SHA51268120ea4f7cd4f6645f76975a577d9bee5aab4d617dd3c0883a1bcc7fdb27d5d385eba2fde01ddc83b7dd1bc60f6a162960d4a60799a5699df8542384b6af903
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d13e8b081057e87607274e908295de4
SHA192236ac0da6e893b77af3b8caa9cbba46ed5a069
SHA2564492f441cb9d3db42cfd237fc55c08526e7c559ab755c86b5f3c8a7146cfd441
SHA512ff9814bdbda13e099877f8740a9bd4ada2d5c0358c5203db58ab52b9ad305dae18df4498f178015f6dafc1e044fc8dcf2aba28a39a34795a42240c59b6320e33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5470d529f6d89f9ec3d31bd87f66fec27
SHA1a9dbc9cfe17e0aa44fbf79dc15599484701c997d
SHA256bd73b4600641352d335d21aef4670f6779d7d81a727b3a2c8ffe8b07f9ecf31b
SHA5122c9dc75833e005fde529c46a9212059c986ee8ee7e53ebb792f46a0e1b1db68716b09b29ddba963a6209a3d85ecab2cf9dacdd13deac092f7002c3d568d108d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d5d553e10fb8f8c44c463e5ca749ff3
SHA1ef08b22e2561c10593f9496c69f0b3022022f615
SHA25682bfc32bc860d880bffbaf1e959d72b7f1044b8aeaeb9881968657ab11e1f3ce
SHA51248f3c1fb2a45ba2462159806b0fd1d605f9f1f1c76d2a1db87c05aee286a25e8e7c7d17cdbf4e2000f002cd0e51f6701b030428cc1cec49068dcbdc23c2f49de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1a27b62913b15a5f97386d52b2ecde5
SHA1d71f08fce9d880f0863110b149ecc868468719e7
SHA256dc926970a68d598f26088576d58c747ba8599f7c07a6e87e5276808b2496e0db
SHA5120766bcdefcf5522bf3f6d96cd7509a3f2388447c30dfdee6567c45b11edface018202fa524ca46457e2c96a690106222f6833943f4d743ab810418a40cf7b055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537b9df479f9496fde40097a7f4848035
SHA1bdf90ce322109e52b7cb5ad571fad2b0e49fb032
SHA256be143fbf41826204c30d7c4100a1090beda3783ee1bfe006eb0e38af90a2d3f1
SHA51294adef0e3b14cf90eaa0f9ed4b04a6bdd4bf7309543729d369e89c2935c45784416c48ae87dfd68099f928d6180d87af02840f5c3f5b7a544462cd9bb26d3119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e08aafd5eaf57f0aba77eeff44ae94d
SHA10ae8f1fb912c962cd329ec04853a071e8175871e
SHA25614865d7afbd1f9a166ea13778ee719735b80ad79161297a7f920304dbdfc2526
SHA512526c80fd3f4e1f43bfc2ce761a879c2780234780e4253a67168e7b8afce8b287bc43d5371a61399eb4a932e159335d7c788fa39ec74cee5adb516922f59d68f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c59f362a2c31c2be1cb3825a917d6ca
SHA1ab4f25bb8ff3974fcb768076f1635492dad67bbd
SHA256bb484306540a48f0605657ddd39fcae404442f32647585f03a432a6469042437
SHA512ac4ba0646fe2c5a960f02fed35cdbef3cc35354119834085469653fdcb992abd5da6504438b247fb7905209729f34f53a77583e3341e21c3f66d7f8a782fbb7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598aa32c8078bc3cd321a2b086da26443
SHA15f4cbe13c43c234f3a9abe8fcf4198b9b43105b4
SHA256a98a0737e451ed3ad5afd228398d6951ed1119184dd445997d291bd998f02a32
SHA5122f566214a322076cbed0fd569c60d91aade0d3834c7c9f6e815b9cc8225ade22f68e4f69820fa00667f5856b3055ff79b9692e3487c3328eeef37d1e6624440b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523ad352e5f00de228c3a2c76d017fdb2
SHA10995646746952d8657b05430c1c4aa6cf115ed7a
SHA2566f4402686662d318c5a1848d659c23764c5557e5f8d5d8074576c89ad6e63796
SHA512f643ca73eb488c4bae439b719e4a7b593ea71d50d4b81afccc289221ab8905094d864217776cbdc5e9ea6768a091e21e84be1fe021bce291e6a8f8b4e5fe53e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec91ea221078b082477d153db533cf10
SHA10ca6c2531120b8a5a33e31ecea5318286a3aa0f9
SHA2564450ff676d1edba1c4ec7933966701f22d3de8dfe3435941f28025101863ebc1
SHA512dbf3447dc03c504be53641c516d7fe1f182147767c028ee64c68616834ecb90dbab21799d28e569b0c7e5122ba9ed6ab65830f004ab076c4ca5d54dd896775c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e28eb93613785c610e605380b2b7ecc
SHA118a5265a3337f5cda394b6c78b842fa341c5ea2a
SHA256755e1c9a912200c3f7a6d22469478eee0629959b36c7047ceb659b2037a882e5
SHA512a48e9524c15de24f74e1ae9942f0c515a9e9724b895a860e54fe1f62ab42bc668f7cb2b929a9751612b1c20f6b0e9b3204c174347b691d9741b9be6730a169bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acc4eb47c6deca7cc7ddbee31907cf17
SHA1175c1ec8c690ad6000942702232d651fa5c87e1a
SHA256df2737eebf13c14297989179a2b31feff53f064575231cb352c8f24e2148f2cf
SHA5127b5fddd46104e7cd9795b082d67c5d419c0b0124863cad59e96edbc86cb704141d082544ea580fc9a6b77e77b4775c2d4fdd432d1883cbe6b3453039e45a7fbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7131dc3bfc2d62f318918d6b4a6b6cb
SHA14e0b12e7215188cff8f8aaa083b3963a0b9cf9b8
SHA256d01066fa3f15c60b4c37f4dab9c9a62bdb2a23f561ba01f7a58cb9cd3302c21b
SHA512d77bf567d9f9c5e39e05fbd8d9fcea37e83e8b14f386bc13475fe1dfb88b467d6e971bed7d0ddc1f98ac0cb15a974776c72349b8a4c7eff78b0665ab74c3e384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6badfb3f83f4834bc3a896544847f48
SHA1f12543747ca157c38f69a4e0acd8a1d7ebbf983a
SHA256f168fef9559c262846a1753ae941f812ae5ccf65f8c0c3a5160eb2173dd04c33
SHA5128ebf67746f3c305a269ad2968a8bba0fc9346b9cb8ce2beb7163056f7b63a1f05a144361823aabe9b7fa9495873c234400d7987a1ed01294f9166ed7a6e96353
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7d1ff7de05e283ed04995cff16cd126
SHA183ef4001e8b21d39413e62d65c38a6cbaf408628
SHA2565bc8d4228f8bf393e0a4b4deb3c91b7bcf752130c7a66162e942485e3e0ba890
SHA5129e384103aeda53cb1be92ece11bcdec22fd570611064fd3cc70176b38e969197ed2ece94e452adbcdd5706087f663bcfc6c79ae83b462a576f6b5cff35dbaa9d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b