Analysis
-
max time kernel
73s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 08:57
Static task
static1
Behavioral task
behavioral1
Sample
bb1600aacaf2974c9596669ba06f955f_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bb1600aacaf2974c9596669ba06f955f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bb1600aacaf2974c9596669ba06f955f_JaffaCakes118.html
-
Size
904KB
-
MD5
bb1600aacaf2974c9596669ba06f955f
-
SHA1
eebca2bb92bb5ad94ee3e981e03a708a3742e2b4
-
SHA256
23cfe561e035856dc5dd66a0b0011609de5d1d085d596316fe7da075467a55b8
-
SHA512
b026506ea0bf73c2ad9f856840d7e3608f48447b5e62889a07c2491f3ac52b1d73033eee587d2dfe77ba5698fc7d434b1586d25a157aaee4ecfa0cc346992543
-
SSDEEP
3072:xpT32szA0N/Gd7ZXtjgrJBdYPVeef0xOMQfw/k32szA0N/Gd7ZXtjgrJBdYPVee5:SsM2BdYPYQMzsM2BdYPYQMpo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AE0C0A71-612D-11EF-A429-7A64CBF9805C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000017054965e92a1d64fd6cb1cf3cea4aedc4c4122467497056efde057b46b15cd8000000000e8000000002000020000000f6f115a202e84926e367d65df8485428b6270eb07c0667351cc11a6a74a08a9a20000000c7a129f4a8f598d6803458af325e2db571a9725d66c58de98083575f974c734f40000000d931baf6f2bdccf90fa46283e0d50b30a8b75b4cc2d1988d6f72dfccdf138143ef2b09f966aa19e5858ac0063589189cc7a4077231e5366e4d4544dec11276b9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b087bd853af5da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430565304" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2776 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2776 iexplore.exe 2776 iexplore.exe 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE 1952 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2776 wrote to memory of 1952 2776 iexplore.exe 30 PID 2776 wrote to memory of 1952 2776 iexplore.exe 30 PID 2776 wrote to memory of 1952 2776 iexplore.exe 30 PID 2776 wrote to memory of 1952 2776 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bb1600aacaf2974c9596669ba06f955f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2776 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD58fc0faeb41e9a98cf5c09da1bce4fb29
SHA1c2a1d1603eda62585ed678f6bb2158500a662d58
SHA2560a9cd154249461c029f933b557a5bbe9a668efec2f4d7c77e4c4c74a112a1aa5
SHA512775e30bb1d9e4e25065bd1d1aa1ed2eb89c089ce99e45f1222d0f161f51caa5878bad2a44da6a9bf035d7cdba37b8a3d3e6666b9b2fb103ad2b82eea8a943ba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5117ce4666d42f25b0b22bfdd3572b4d0
SHA1208f5abf9cd6f2c6af2748901463bf75e4adc6ac
SHA256c98a8b4775e47fd528dc16d32704fbf801fd1ba308cb641eed6c81a7130db3c4
SHA512e31c809cb26f0fc175095b92b6126879525e1f7d361c6ff3bdd478e99368654ee9dca27bfc912cb9dd7a290737d47d68e6ee95f51aa714e455830612844a218f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e39b6d6a15cc3d58e8bb65f1c83db50
SHA1dea309354360834d58aa802615ffddc472ef32c6
SHA25669838354d0772338a005fecd0cd051124035debb6e5fd19aa9cecefbbbbb74e2
SHA51201260f8be3ed678cacac7a7c153ed22199c7551dc72b90d79dbffa5e6b7263b29f574f8477d220200cbbc984f470c4df3137494170f4003a32a0cc1b0c6cb01e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559d3f9e71fcf2a866c6f6a8f5f318056
SHA1be8e7173fd68163c73cd2a8c96a50e85217de474
SHA256fb885a21884b17e760e460b5bd6eb1fb55d8e6c83d9a58768ad9f5b18a692e90
SHA512179c52fe325b7f92fc4de209445d262e7e74611931672b19fad7966f933d90fd52b8f63f108d2a1e8beab295162276df73724b2f5bf47dc3151a34ccdc6f3f2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5186da9571a52368968d504c112bae4b4
SHA1efac72bd0c72e61e403240181ea33a2eb376c076
SHA256b8b1a0c264fc206ad2c6a05c53aed683a07e5a8283fd12781e5b4c12e50202b5
SHA5126f9a3418a900e3990d8b65334747784905b26bd539f1cdbd4d350ccd05d2ec55eb3ba35ae44fa909c25237ee14d72fb761f96cca673dc94dd98a94aca5553edb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4cad5bbecbf3a1376cec7ff758a54fb
SHA10604a64e6b236b3d2e0dd9d2f473f341306f7cf9
SHA256d321f8cbcc8ee2f4acab02544a0798abacca0068b5341a0e3b22e8a86a32e6d1
SHA5125eabe9f01c871432b505bf49a6a7ed0927522864ad2ff3875d80d05004f08d655f8418d69f6b64a00350ed2b1c40ad4c55358d63d19490749d6dd02d5ae12117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab8aa26ceeef1072412a7b1fb8a98007
SHA1929cbd8b355c957b2dba3c10976115b70d6c25b9
SHA256ac55cc5a63630b558608844b632f555f3559e21bc77733e2ce53c1ea3d2eca17
SHA512543cd977ec6e614cfe186dd57c839953cc0511bde609f83290b0065029fac99a0288abe13debdf72143b466b8cfae3a9cc8f4b70fb9e74dfff435933cfd0477f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5c93feec55457aa60188c2cb5ee5ec2
SHA1e08e237e6e0565327bb420bd3652cf756ef7ad6f
SHA2566a82bca64a2bb86728c2970315cb3ddd652e68468421687f071f31b8e98cb64d
SHA512772745682e8a1221435c56bae49cdca7ecea08a20478eed6f50fa21ce2004aac1441de40d82e47beafc4c3345a200a9ce15d241489b53e8be397e42106f8017d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fa8a023f30f6e5414bcf8d8a807f912
SHA103e3f0f87927231d95a01988bb14c4d76f7c4a97
SHA2560a7a8a2e4026ff4a5d1e63f53dbf4d7531d7dea7d120926f9ca3e28a321bf165
SHA512b676afc6ff2e7964389d1d344c6bd6c6cf74181861792e9017b8eafe26148191d81fe390cac6034f3418b33d771152a533dbe18442c7513791287dd3ac495c7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afbda72418f69934dcbd6126cf2af100
SHA1fd892d7f10fb43d6462b2cc042ce357191e9a76f
SHA256586f1b839eff73bee3a0483686ae7518d503f37570dd86b9d15df3e8af62f6a1
SHA5124658324e878bd7ba17de120d9d21de6efeea5f6a92130503a4aa788461fcb4fb63e50f505e1462be8cbc54cd53c7444ed6c593befbf8e1bb72843710e7c6514b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f491c5fc1d9a92130f4225a14cf797ae
SHA181f5259b97abb53811365113f82f57b1c558fa0e
SHA2566396ed15adc60afaddf0996662af8d2a9f1ad9c910ecec5917c0ee1f444fe810
SHA5121d6b011beee5f0339431a902e05b08332d4a46f0dbc0c2e57e241fad548cd69a8aabaef5340ba54eec8ec89caffbc5c575b5ff7968f41bcfb49c1b2a751ec429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b78955b814eb80d3e71bafe5237faa3
SHA15448728120880d95d9b4ff8bc2b71b7c4c897733
SHA256b25822f3beb97b7aeb0c5c8ff3a3c3326cb7b5e75be9c2a7733168d7a0f85810
SHA512a664b69f3bc02feef0fe63f8c8ede6412347b994f25e9fab51072b8e93ac1c6efc1c038d214cf644264a90a93a4bc18edb22327ee432f8901f27b4a23347ded6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e54437420e08f6898f8a54e65a2cd7f
SHA13b3522decaa5a881eea0a0cd86183cf887020cc1
SHA256cbb4e5782510abcb7ec2a6b028bedddd1b9b1fa12f6ccc8eee8bf0bade6b1ec2
SHA5126b8033376bf20019f622a0503cabdb0d004ef1eae9b3d6587b6c379def1970445aa33b43aee3d15df6d42574ab91f0faefa636144ea14b87d345b84790c0e700
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c9fbfa70e767ba0cccaaf93f3f1bc1e
SHA1a82f5365ea3bdfe78dc2da9f98968785f78a7dce
SHA256f55082616171d1414d8b0793ba2a9259e59b67470e4f4f143ba8f1637e60ee7c
SHA512598c071871c15cb4e1c23e08522c7d80c82b25818194e5dc8762f972e16ae369303e500bd378ceb05c5e7206e9aaafbe9ac5ccaf300eca14206e3bab0634f1e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcbcc25b8d626568b57e54f31037b20a
SHA1145034af7dfc4c4b7bc23fa2d0c49267c917872f
SHA25600cd38f2d46f55cb54c0d3831947fec962d5538c555d50ff21fc1d6a2ed35fd8
SHA512bca3e9f09c04676377457e6d32039565574089ac1c1631cb90fe22166f11099e1c5d17eb71123b64a15e0638b9dcda43cca17743fc7a54885fc2e0411e902204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea536f1986fc2bca1b4bca2762b6df22
SHA1d1151bb0a8a9b8b5ccfdbe34ad316d62a0e364b1
SHA2566f96c6093c0c531c77cc1129eb093dbb84d8fd5676654cfe90dcfbd8061e1891
SHA5120c8daf4edf6e6f0e3f90b1e5ac97124c8e253b78bae4d6ce4309bc8e5ed920259fec068e77c5dec5bdae6deda37db52d32957bd6ef0f88df382500f2c3c249b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e3af6a6b8247d99f3324caa52977c93
SHA136a68b22d194273f2e57268cae0e24a92401f9d6
SHA2564164f7254ea1cae6df19feb3e0d0ddcf31686c0ac5e93da9f51a99c950030156
SHA5123e55775a6dec98e6fda3295bb7866ecf4d3e9234a7686f75e614b041af5b39340dbdf9c447049df272d7bbb170708b0664fbcd221e586daa4f12cde5baccd1de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a0b4bcbebce62dcd7df814cece4dd17
SHA1ae1993c424561436405df1ca68e614d4aa33e7ec
SHA256e78944182212af6b75c7743b3ec323a72c4f00126dfad8c7f73340b4d4d5ecaa
SHA51216e20fbf0ffefde3af1a01e56bd9bf00957ef81a635953475722d6d7f140cb74dcc1330da4ba00a37026c2414ab74da2b562e3e7cae747e23cda68dc1b39fa28
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b