Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 10:13
Static task
static1
Behavioral task
behavioral1
Sample
bb508a5952345649e83e9be65e21f4f5_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bb508a5952345649e83e9be65e21f4f5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bb508a5952345649e83e9be65e21f4f5_JaffaCakes118.html
-
Size
103KB
-
MD5
bb508a5952345649e83e9be65e21f4f5
-
SHA1
7b379a4d441dfa28073d7c8a656b8c9ca3de9359
-
SHA256
cfaa5f37007b85bed1a8e09d8af14bcea47c9d9d37f2d8bee9e8464bcd8efb75
-
SHA512
bbaf6921dcc2c72612c88861b66fa68aedcd5479139777273969e48f17d3560594aad4ee03ee5f5ca670bcdc014ed9a98caeb9669237e32f72d051865c93bde9
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fczjVHAhosLo8q1cZ/em86p:segxLum
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000056ef40897b1d00d9cd0914ed90208392f805600df7d84f97bba755977f5944b3000000000e80000000020000200000003b8ee00a22e35ea5d09d9bd27f3951d418a15286229485c45fc1c2aadcd381b5200000003cc51cf42c0b865af49cf217348b73a269f8a8124e8785422741595dcc51903040000000f8896d8dd94e3734acf0dfd3439043a9ef7649e91198c274c8584dbf874866bd036463c5378afaf6ee4e54f91f83aaaf56c0d1adec5e33745ab3177c9f62a277 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f04eb95445f5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{65A46C41-6138-11EF-8A1D-72B582744574} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430569899" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2500 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2500 iexplore.exe 2500 iexplore.exe 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2500 wrote to memory of 1988 2500 iexplore.exe 30 PID 2500 wrote to memory of 1988 2500 iexplore.exe 30 PID 2500 wrote to memory of 1988 2500 iexplore.exe 30 PID 2500 wrote to memory of 1988 2500 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bb508a5952345649e83e9be65e21f4f5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2500 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1f59ced215e701beff328d78592168a
SHA15823e989b09778ca34f8ad69e6f2307f6c2cfb7c
SHA25657de9d38021762784934444d254ac833a5bfdf4f4ab77041be12d4abcaa1587b
SHA5129f153ff78a3a0f9f641d37f47ebf56f3c786119458ebc1fc1b8f3fba2c5e4dc58a8c69210deb87f6340861df26f7a0c6912eaba44b3c8050567522bc45b48ea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5040ce29e17794c9db47398eb57973ea1
SHA1873e37052c7b0bc5d396e1efb13d1d73b6d91b0c
SHA2563e063471908ee1007db09506e524bed9c11f9a82c8fb20915bfda1caeee3fb06
SHA51235c63b9e5cdcb51157cf78c532dedaa059917ef2c3cdb405a4e3789a927285a0762218599e144c1c8e7fc28cf8665362407a32585f23c130790ab802a9fe924b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f27109c4e7fb7b6fcc0d2e216c5508db
SHA170c484d7a85185132e8bb769e135015a3397e64c
SHA2567b8564fbb0f5c3004328880beea5ff197413c725eb4f246e4002400301a42c31
SHA512105b60c16af53008d1abcbb5be1b607c973000d24470e20bfa8069d14a8b86c6a324450e58d5114692e0f6ae30af5d98b1e259484ec1161aeee73bb6bda72087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbb30c00b7f804a294def2f83daf5f79
SHA180a63a96baa9fba3170c42bf5532163faf6e83d2
SHA256e119613666f9e6e9406d320653e0bd7bfea31bdadb37e7017247ce67951812da
SHA51231802d5b46035e0361ba94dcea7d8f10c1e3bc5496200f9843717ce875f1da12dd33b1c079ac4a861a3a4138b522d82ffd02f0719e599d19a2b8535401a43c30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56025f16e05a9feec05b7e97ccfb85011
SHA1aaf930d52218b630669f8beba06530f98b41ceaa
SHA256fb9e2a4b633a70bdcd5598c625896b835139a5339d5000230dc7d2c6d2128b6c
SHA51231f71089b05f1429dc6861b0d64d45744c363129eef3b5ac81fcf3809bddf9793e810df43e8aef85a9e0a9ef8865eeb4b5af83afe96a2f24c6aa57a29fb84a57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7d3709a1611b244674cf0124413e4b0
SHA1401547c2be04038ce76051dd800a8b23089b6ee3
SHA25674ffece0b5b249319f95c20b2fea508ccfb4ff98dee6fbcaf26817b817019cc0
SHA51251d0367946a39f084edec163072c1802c7d34ab0cbd083269c3820cb172a9760063586028dea157362544995eadf6c04bd8ff0356da999e21b8c1237f4a6b32d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e1f728aef8e7bf5836d54ec73f16a38
SHA1b06590088271c3354832b45e7c2b467587de64f7
SHA256bf0dc0785d028d17a7f2ca172dcaee73b12816e7c646f25b08fabdfe076c5d67
SHA512c88069cca6039dc6ecff5d2ba241e18cb54c3863e3bb2bff4709d288d4493f8c8dd3f864f2889edd9d3b086ea1a3b1035d834e4d3c6569e66edb6ec07c28771f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e315565e2a4cd00a1f15a7ac66a6826a
SHA15887205498165408c05d45dc14b16ec7fcfa6533
SHA256f50951e9fc3fbdfbbcf2ad3156b6dad83dfcf506035475c57ce0315ae2f174da
SHA51238e5e07caf72597d110724ef98c3689288bf36f8de53eb7ecb7053dd97cb49f368bf540b68fe924958969eededd1d19a2e0062911227d8f91359a1ac91f63bd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f6b221b97ee1ed0709b3ee39be21a45
SHA14f76ce7d0d4aecee87bd1a282d25ec98d4f14282
SHA256881ba2a5b7e11b5af01b142c14a95db8eab623dd2d1d4dcc2e27ba0eca774671
SHA5128f6da403352c952597d2493746a72770ecfe4aa99a67266afa38c7ea84e2ee1ad40674949b255a99e11b6a4d7013b8fe43b967fd8685dfbadb88eee2d78269ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519ce8cfe203944398e6f70d95d73ae0c
SHA101adf9de735d5e03f09f82e1bbe6428da553a57b
SHA25661981910c0c4c20e300096080cc48005e26cf9dede901b7e35dae5958088175c
SHA512328d5b084d7ac052d45a23945b4d256213f6b1884a66446cde3b55bbd06e351949483d3e7b8943b90d80440939d148bcdf09116b719f8962318cb63ff4a06ec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8f412bcc94ee8a844e9d6e088dc0956
SHA1ecd6f5a216082ad9b2c847bf64be49497e88dca3
SHA2569970e3b7a33ba7216f514b976bde9716f172425cfb80a46b73ca80a9d86398b6
SHA5127efd6362d9e7e0825a8092914522cb27ddaaab6d2f98b8be3fe7a76d7880f14fec6e7c4b0acd914262d567b583f49be3b6a6c163a94354cafe60a78ea9d52cca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b311eedad2f8ec56a39fb36ff199f3d9
SHA12039910f466d91655b8e02ff1fe20ce472a57bed
SHA2567fa635760d2d35fc9487fdda06d3f7e75fb791a958dcdd4435315ff334690e92
SHA5124b3517723ffe4a33c0daf85a8f69ce47f82c6100b0c4446716c8f5601edef7c01d672925ca52b625cd3bf2169e217b07dea4b73d1e23de7bf8a22215d960ec61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d10629e675036f4e70e7739c2bbb632f
SHA1c02bde02b05cd7ba83f2f66f681abd9de89b978c
SHA256172dc8be203c4e0b1d0df61d72ddb3ab141dcfd6ff1c7686b3600a11fa48d118
SHA51274623373d722c35150c006c83210e2f22e087bed6875f3e1593207c9eebcad69d6514fa2dad2084c90d2a14b1c0e347d02a5bdb347084b67b3fb3154fdf4165c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5315d4c0b4b517b71510046e599d1f65c
SHA1186be85bea80254526e69b647d7ab0fb3971962a
SHA2567fdd66bc93aac31bf64163c124e1ef9984d17db4307f2283800938ff400f9f27
SHA512a43942b49624fcf13ddc9a765647b1247b3046374b9d00ed375f035ce09b996e9251c64414f5b72fde895aba18a7bc1bc85c816012b3611184233cbf17529c2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed59499bbbe1a820aa3c109357e1a6d5
SHA1a9de526cc15b0f9dca4c7f7a63cfa7cb64c31b39
SHA25630748b85618e38821941b6bb62f4ba7f32b5b6028bd4ff5e4e2f49a0736c1761
SHA512cc191a22cacfbd4f25b83fb5a8ea0356bcec78d62736bb2812074faa8ffb608e4d919e6f3179c85e8e6ae63b8897320e4a542f5d7976f87c1d4619d86b7be488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513db1a148349907bf0b2616e8737b133
SHA187d38de000685a6d3d95f8ce03cfde0707cfbaf4
SHA25696675432d1a63ee4619ed7d2f41ec3b4a166e467a6161fbadaa8b69a5c706445
SHA51266f10cde282fa33c9debe3077143f4e4f5227759f60c7add82d434c1bee19a38f6f64735173dc8755e240723fa79a59ee6f6a402cc8ebab68107eb92ee356cd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5885e8bcb96dba9c1bcf4aba795ddad96
SHA1980d6ea144c4f9be0d20a8b2b4a11f96cdbcdfd9
SHA25698f5ed6fcbbb73a6f14f867923f8816a107a60a53f8b536c2ac3b2dd54efa699
SHA512135f85a6eb31f753923d664eaeb084e62d965b539783329b9050a792f1559c2b5e2955f54af33d55f1ee2eb8df16bee47010ea59b3386a0b0c6d1b337fb78871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c19711508a1bc09507affc703b9f802d
SHA17eb9610d3d9f04df9a72e7449a0f85ab08df358a
SHA256367763b512543b873404e3f945d4c5f5f2d39343c10c4039aa12b50f6dca9183
SHA5122a6194d55a64ab969337a2bd8db4005e61c11b1d521d90fc3dc38f61cf8e7069d16e45a605b5ad8e831f4bfe607e4cb792268adee1bd20458e833834ab67926f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588c7e6c0c78eb7b2db0a7d3ef984fa6a
SHA1933e88ce909caef16f4fba17e8e0b56bba3a9a97
SHA256c7b1d6b1d964f536a5a9cb5a89ee5800729d22c89d780db00a2c40ac62aadde7
SHA51264075edeb3e2ffe969daf94eb855efa2ff75967fb049f21109f90c20f3923f6b004abd1fb2162636ceeee11f7f01d2227f84a346f09f05932b2fbdbe8f4546c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591a389549f6eecbd5d4091de2d178c8f
SHA10f3a1e957471788fd70b159ee26aa45dd85538cc
SHA25649b3d44b7e3ce7e1bf27a3bc66ef65c985a7d2cfebab5f3c4c92019df0ea9b25
SHA512406e40e15d1bac801c8f4c360f2b277c4ba5b9a6dfb36a2fff273ce5c9b7a4bba3964629c475340f058dfb03decdce96c71d68af02a13414403eb052e191acc0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b