Analysis
-
max time kernel
137s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 11:12
Static task
static1
Behavioral task
behavioral1
Sample
bb7d262afbe56259236de2447088dd89_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bb7d262afbe56259236de2447088dd89_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bb7d262afbe56259236de2447088dd89_JaffaCakes118.html
-
Size
53KB
-
MD5
bb7d262afbe56259236de2447088dd89
-
SHA1
3396165efc441fd6a638981d4580fc62a602fdb0
-
SHA256
c858023eb9fa30f16eb71b8f8a51d3bdcddbd04abc73476064dc4d5a7befb36a
-
SHA512
e3872e6f923521036155a25ae0a388d86ef9904257ec69fae7cf6470ba71d73770ff086063658c345e024f75f9a5f37f31dc04d047b022c46868723a373dbbc5
-
SSDEEP
1536:CkgUiIakTqGivi+PyUXrunlYJ63Nj+q5VyvR0w2AzTICbbvoy/t9M/dNwIUTDmDL:CkgUiIakTqGivi+PyUXrunlYJ63Nj+qb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{91B9F861-6140-11EF-A24E-4E15D54E5731} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000c53f6027a1d205ed1f2f56c557bd8a6d05b8da63e3608da0a80c6ce79ff22f24000000000e80000000020000200000004b6cd0902086dff09de2b9b8cb93168e7e98c466f93980d2b716ddfcccc091769000000029e4ca2f467c2374859903ad11f1b014a483648d31f98e04d725f042d2cc98373d52f0b32307c56ea976405c9e62aa4b1eedf1580173a83da16517d828ac492b9d0f29b269f74e96c1d47fd354a5419aad644315ad3395f2c80fb762d0d224482ecd9dcf1a1f71ca28aa627e1a9ad26149d0551ee26eca4780b740ec35194133b0fce9d776e24445ae99c0aacb491203400000008d86afa9e2258713ddc79373c7fe6c99c3a8617858f5f704cd1a55d867ff1938b6c45aa3422188d6a1c70f3eb41ecc853e217a97ecbe47ed661ab1d9034c2766 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000075c9092227feed3c75eebdd229283c764b7686f93312c596094282a092ea834000000000e8000000002000020000000855339f1d563e683cb583e029c9b3657fa7b639f4ef41fbde52874390466e19a20000000fa379c4c2d9c8c36de1ad52182f1a0771edacb279516b7272192930927188274400000005d148420000ac15f36b1edd1e85d5013da352bb73abd8b221fbb064527a72718457d8557f11c137f2ff0702009ac3db37e9d51099f5c468c009579ba059e19cf iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430573413" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d07793694df5da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1924 iexplore.exe 1924 iexplore.exe 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE 2404 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2404 1924 iexplore.exe 28 PID 1924 wrote to memory of 2404 1924 iexplore.exe 28 PID 1924 wrote to memory of 2404 1924 iexplore.exe 28 PID 1924 wrote to memory of 2404 1924 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bb7d262afbe56259236de2447088dd89_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5feadb4e8b0b65707480cd5cee1039d32
SHA16863a907b75597e6525ea00ca3a0ca5746e32e1c
SHA2562b165363409ebd1863842d2962041cf312e9ef7dd1cfb7eeb15feb8cec6c87d2
SHA512b2a3aa2fe592d543d55916dcc181bc6c2aa8a0e97aa34e39b3b47a4646b11964a6cc762c3223eb60b8627031acaec25287fb358f731bfa553d18cd5c2f276ad4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55cc29e0dac67ae2a72325edad2d27996
SHA19d470852d373279f118539a4da3f5d482f120031
SHA256e28a11c142fdea3991883198d68f4c6c7eaf6f71d9a9794779280fa6682107a2
SHA512322d9336981cd25f45e55798dfd5f899c351e6db5108561501f71e62693af6bdef3bb76c594d5a70461cc6a57abf9e5566388fd8e5d44353d821af00221531b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5006c06af875e985b017ce7a1cf7ea6ab
SHA17be5da34a539b0fedc794314794fb04acc355382
SHA2569505fe2a2c89d2062af851ed73a4e6b90c4a165c0f472abbb1a96dbccb96e9f6
SHA512fb1b3d98c6fcd810b6e9b1fd4cb081a84ddff968e9720bf26a9479ff9fd11c714bf9f0fbfd44ce26529f8e77f2a2e73f8f3a4098923ae590b18d384e2f6c0319
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5112efb19ff6f8e3ea3eabb7aa2d0f559
SHA1b256122a5f5a7c2556f775be38408d54f2673b7c
SHA256cf3c62bf7a953a70173d5812185c6503470c497cf841c06d4fe44b65e3961445
SHA512c01bad3199885cdf2c5781a04fae0df56968e4a405b4d9478da84f9a5cb537430208216f30881e4426f49be206d9cb92a2f4f1074ca4079315d0afc5d028e1d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5452db538299dd5c6c49c83ee17764bfc
SHA147d039ef59a8a8e926033e142b17b67a6c2c37b8
SHA256e73cfd2d24d66f53a4ecc0a70a1cc5671a2b69df5c6bb05a12461ca6b9f4db61
SHA5120e2831480d14ecf53f592f155f5a9d33ae84528ae5ad0b6b38bb86f4b616fec14acd561c978c4becefd278f50401c9850c109bf4a2a7ce1b46de44438e72a4dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50d788b6ea325ab6b6695b9f0a87868b3
SHA18df1e9a32fde2655583ef16e1bbafa93842e34d9
SHA25695bb9fd5fd531533272a0e44c7f5aafbc9f9e33e675d896fc9d3eb2fbd75a5ee
SHA51285fa537fcb7256e01ddc4bd4572818063a570f7a5ea741555448c8f3a4f5658e14a273265aff8e14837b1ec3de0ea4f1866ba58f9f946c5f9611a519294536a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD545c1aca8b181d720331df07d16765345
SHA1e0378c3aa7aadbeced1f564a63de0401b0596e26
SHA25660cf0594ecadad9bd2911409eca385349b04305458410c15b1f1b4b787c48ef7
SHA512d008b44c849ae50409351269e3a798392101842a9e0dacfab27ad66cf2c4f709974928abf3db45c6f00e90b5ae4af40c5c46f4926e68bfc5e63865c03e373d0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD523b02bb29b2cf72d251ec8500a1c970e
SHA1fc64be9c97c3e839f61b54e10c6097065dcd1e56
SHA2567e03171ab90ceebcb479d8a0de5744a016539ddba8646f2f4ba369c234f0733b
SHA512aa1d588aa8af493e9b2456f1e09bab99baa232b1318b7e5c215a2bc70b28dbecda12e2f7b3e0a8117e600db93a4e1470ccfef0afe80065b18b267eb7ab7360f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57b17de663dbc41c434259d182650b07c
SHA199c35f764618c546760e450383f0760a2a30f60f
SHA2566825dc8c86ba78b9c31a5a4400988dcab777fd217009416cc4618dbd86a5c1fd
SHA51257937c61e5bf127415a7ca563fa4f0bb3378bf65478243eedfae020e45e6bbaa5a3ef5a75f46760c758e335ce9037b225c1d6217625f931ec6aca1544031018e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c5062660372e080142e0244b444a36db
SHA17d5fa8a62c3f0f4d241e71acfcd94c32c4816166
SHA25670b9807f8a793d6575358cac6ea8caf290a5ca79fd083f96c8a8333c4dbb7b3d
SHA512d19468117012af28450d22f6d5fde49aea1109374529cf0af4b897da6191cac0716d394da5ff3b987539b0af320f310bf2271c2789d7aaa51a97653b07d77b0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5192cfbe799b8c7c652753b96b2d2a80c
SHA1892868adcf89b4f1b17f33ad5e5ce59e61dd06e4
SHA256437c980f545c47c4d59cc7957ce60a557c98b8fbe8bc7bb842a4990fdb3081bd
SHA5127e1552327c5883b245e7bab89317116800eef61794bf086a547f8d3e2811149420001dd888f2275134eb7c6f2f4849520e80da625d3c31fbda398981c74595f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50f1b4146dcf9d107e79ed3e8249476f0
SHA1c1eba60b3085bd73eb7bcb0ac9b3f127472d404a
SHA2562f5374ea243fbab1835d1e50e68a479e967bd26ad9136b798cdae93c97f94bde
SHA512c38bd9034ed26bd860f4953f4d0d32a0434c0400b89b55a61b8729070fa278f205d079d770e308138fc8987e6c1ffcdbfe81464a1ccd4b1b5ac11850363f3e5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f32ecdd56cd90bcbb22fadbf15dc6994
SHA17193752598a73318cbe36fdadcf0649a86030983
SHA2569fab4d1421822eafcab7186f1849de1b1fe6bc49775798a7dd7c0bfa2d494e41
SHA512f9c5cdd11ca3a887373c6bcc7ca63e1f78fe17fc04edfd40193bde988bfa4211d94ef33df9c31cb802836ce188da01201c6a21585d3ed9ae465cc239532e09ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e8f28572845dc2186a4340a769195648
SHA1bf9acede89274fb9a79c425c6e7a3666b9b3a6fe
SHA256c316b21183d54b32bfb1a6ee2612d47abe6860ea835976b493ca49abcd64aa8b
SHA512ddf692f95d2f7a78956c2acbec3ee6ba115820567b720561f648fa6e228a9992cc960ebae670cc241f838a8d3ab8440a0e4ba032cc457098baf7cee262d28725
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD535e39b302188c36c5316e5d8bf351b24
SHA1f2e193b8290fc40d1f51760109d759c5e7abdbb4
SHA2567ffe613619b2383f03944b188e4922debb047ba75cf56aecca31b664ec903ad9
SHA5125d347a248afd9f84ca3b9efe9677118b0abf31526bad14eb1a71286394729a2c41c43bb77e26fa5c5d31431dcca7523c623a10aa1817fa248de0c78d8034c579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dd2e4b9f495d59719ca48345267a8c85
SHA1075260e4f730ef63fe79bd4dd16a4d669aede1d9
SHA256eab23c6907cfb5f1d96ab8a46cdfdd8b20dd824614271c2b32779f9ab6f24cdc
SHA51263e75c13f7832ad84efa5ad84e2e0c4d2a512ea2270e6a4bfb80849b7a9d03ad6d368d34fa07e3dc2e9f51d59191dfdff80ade75ac27734d908080ff69996b12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fbb8fe51df0b7578b348f21b5399582c
SHA194306259e83d33fc665df2f6e2989ddd77dda5f5
SHA2560aad971729a9e342ee54b6bf156a6851dd140d67800471bd5edee61cd9b92ece
SHA51215e3bb61d5945c0cdc59bf2a8d88fe41d3ba58c5516292e53dbc0caa94982fc158d9ea826b0672b260004945bef38d5f54724609862fa1d772b3294242bd3090
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2LF9I1AK\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b