Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 13:15
Static task
static1
Behavioral task
behavioral1
Sample
bbe0ce4c22160df0e148b490a112fcde_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bbe0ce4c22160df0e148b490a112fcde_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bbe0ce4c22160df0e148b490a112fcde_JaffaCakes118.html
-
Size
10KB
-
MD5
bbe0ce4c22160df0e148b490a112fcde
-
SHA1
8ef995924c84b9aecd4b7ebfb7c5c93ade4e6c6a
-
SHA256
f753b188a97a4777790317cd4d4355b37f7d7c5cc276e08bf08437ce0f56209f
-
SHA512
71954aa2e0f3e683ccde909f3aee45a3247e4b62ef6db93e36253a6eeff3eb9c4a1e1504dd2a233e40e8951ae93d7ab332e11e2828f7b190585cc13509eb7891
-
SSDEEP
192:7a9ctbsgKKU8N+FtdbAovKHwcuVpuordwa+4zaN0UvtttR4C:7argUhGt
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D4A178E1-6151-11EF-B8DF-E649859EC46C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0de78aa5ef5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000df19e9382ddcc5965d7d421f2f0840fe1909aa855f5632948d78d39469bb5d58000000000e8000000002000020000000aca257784199fdf0d0ca92cbf0bde7e0898f486ed26fb60226b303d7eef8075f20000000c25ea30fa2188b60d9e6fa94f6fc1e7d7a988856c830ace6f6decdb5e137261f4000000097a8f65a707eab642bbe84abe3f84028a9c778ebad8615d0572f587d5b5440365e49aa5f4a46e07f62efdba502c102f30e8fcca5a78956406c6cd58cd7757c37 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430580824" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2320 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1944 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1944 iexplore.exe 1944 iexplore.exe 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1944 wrote to memory of 2320 1944 iexplore.exe 29 PID 1944 wrote to memory of 2320 1944 iexplore.exe 29 PID 1944 wrote to memory of 2320 1944 iexplore.exe 29 PID 1944 wrote to memory of 2320 1944 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bbe0ce4c22160df0e148b490a112fcde_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1944 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4066ec079452bff9a5811cf75a00b73
SHA1802d1c9bfc1c7063915b2584328c6327c86ad0f7
SHA256310ca37876a8c47c4405288049cf71aa47a356628b9f2a9e4df54108f92f9374
SHA51281b9c1901f44d0fc6c78a57b81660faee5142880d9c77ccbbe5c02a26657d0e981b3f72a112154a27eebf930266fef745de7765788ea63558eda60cece2ce222
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5991bd178777901c9e6f12af34e6f59be
SHA1cdfaf502e7343617a194cfb52169bcf01f943d4c
SHA2568ef1f3054684cf049737e44da25b9ef2a49259ece51cecc429c947540d2ea5ca
SHA51264190c6916f5b85a1cead93d3ee6928b7eb683eb6712cae66a39f5f229f701d88edb388d546c90733628142b558abc0f0a2e85f1ad0b589e1cfa59153f9634df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5148b0277d4781209a5e574d88fbda011
SHA1996d9a5414f7dee7a2b10bc8bbcc1adcb772b7ee
SHA256364d8a151b60739fa144489f30600981cf3746e5a629c93c301823fbc3882229
SHA512ef9772ff11f0dbe777f21727c61a1c03960e939f5c2fbf06602b5fb4720bf7e62527905da7883d2177f41c8c377edbac083a25e0a857c4b890ea88c2713e151c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593900f3947848ff1c563df7ce08af0ff
SHA11e57b246877b822f8c74491ca8fb1467229f95e0
SHA256550fd5f41b8f2873950c01727723a1594b0affe145cfc4c3ceccdf584b56d474
SHA5125d4b0b609215773c19b0c3431e038baa12c5a8af997fa662b2d6887f2a2a97e4da61cc4e6395a45c36fd35c51616655eb57a07b963b62e3919bf689cb023ddd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500a2dc04d6d961ef35d415eb6fa1b0bb
SHA1f173ca76cfeec5fa925b6a9b74ded9b8432312bb
SHA256374737625bf55b898faeefd44c6f888da6cacb37e0a79ae2cb65045a117613b1
SHA512aced4509281b5528750ebfcd01a74e7ab88ae72e10b629c1d6610eda287bbbb533b158ef7c291757f2696cfc88ce6b641a7bc9c2ea6c925e5142f53397bffd6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cc4f0ebc12d533b911191208413f6dd
SHA16b2bcf4f3a88fe5f1120df927850ee266c725a53
SHA25671503f67c73d6d7ed03c4f7e8b60d2ad2cd5c5b64ac8340521001540ba843425
SHA5126c4b3c980affecd8c25b893075be94782950476afb2a3bd1b170ca005dbb48d5fc0eb2e3723ff25ff0fb62d44fdf5cc561c2fbe5ace3ba3c4430978d338bf6b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dac66e89528eac241a2d402ae8f47824
SHA1ab6718b448c3678a2477c7107c396f582d776222
SHA2569cb6517bf644b7e20dbf6c779e7c2b5b6da65b11d8e285e3db076cf307f559c3
SHA5126217f1c91841687077f5706fe6fa3b55faba536fa216ab8c550fc70d9c5bea573367d90a42a3478747c5714cfd48f2b88a661b578397375ad7b409728006406a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db251038878e03f74db645381cbf48c1
SHA17502b7481177316950e2735cae42f8659f3f60e2
SHA256aa3c7318e252204d1776a944b9ea8e8056abbc75dfd1e3a885ca468bb795b189
SHA512c85b78110f39f5c6dc1155902ec06fbe94dacd92fd95b6fc02e60a7eea5db0faa02e5110e93065ae32050bcfc18feba7fc6f402584074fb5c492d9666d9c3759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7f6b0a57daee1e3a161e579fd224533
SHA122b1e927de56a23479b480b82cd56d18d93beceb
SHA256fa00164700cd2f184bcf2357bd090fa7e93813891b9760c60c74b7676c69750b
SHA5129b38b14d4ec71b43c9437a61a5d324f2239ba304eae9aa92851edc9dded79371dc33fff2451aad784746a6e51909abaa7a92891133a1da10837f7c3b1dc60795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fc10a0313bf558e5bce7c53be7290e7
SHA1d810c5eb5196e7487969b89d99d8c213ef77ff47
SHA256d9ef5e30509207ca9a14a48a1e9430aab4b5b26218f9397155b047622caac559
SHA512979c87e0cdec41b72af77d47b49051a82f89766bf3d563ed387f36c7997d628dfd97e099a06c2dc9b83ef9dda0caecbf5504205a80f70a47ef86ea3d98e69ad7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2d00f74c203abcf3d0020e3189c63b9
SHA12ef8448a825e71fd52d726d6f370057eb2c2df33
SHA256a448b0b685aae84e0c616d98795b629fba808623813511fb52ad9a4e614eed9b
SHA5124e50ca300985f9fee3e1d06b6b56f55ad88e8207fc78fbaef10740aa1470becec6297a7934b57da71ca2685bb29c9d86dda017487a6b95c977c757d555939079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb19b7cc5108791f475d9e012eef79e1
SHA15d0992a95b9dd4553685ba9cd8bfc4491e6bb479
SHA25660c5f265f430a1851d9d53e63874745824e7325f98254e4b097f1aafed8de12b
SHA512d046069977ff89b88110dc5db9299b4475fae16d656ac18383b5f2b58adae2a7c680cd031a64fed6a7398fe2355497c91fd302a3507a4aa8c8bf4a328ac2836e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5557146c160833af0d04139aef64d45e4
SHA1effe66a5abb13291beac251ae1eac876141d2643
SHA2560655cded12040ad30f4004044a14038478c093893bc81aec45348fe5843309bf
SHA5126d45220d2ccd4db5950124d36b4989cd76f34199856e8720e547331c8eae3bee283b94b20b096d79b7feda01752fd9ca6d5d7bab4e7c4b81674af46028aad7e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a01bbbd2abea6dd33cccdfe9a17aa006
SHA1a22aeef3e5fc7ba94fca1516551311b21ef5a9c6
SHA2563d9a9ecd3d1ebafee6d869205afc0934648efd91ce258147c842f539278d074a
SHA512cf8986b5705e7c9568fa095dd5b1f684b355d5519a23e9ce972cfbaaf29560473fdd2e646171c681906aaa8df00494f9aefa022506e3b50319010e3325eae777
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb7ff4842a283b6399933b0515215851
SHA1822d07379a22d93c16fda17c1bff42e86a251005
SHA25612ff654a0f6b7953054c9848068492f53c17b3a236acaf69c9e22c3da85a0a1b
SHA5124d2536d37f5a92feb9a25f5f75ba4ea4119b90cc4edcebf3e9853b26ba9c4dc3eccffaa49ec65661ea1abae0f161148865ebdf2677e850bf27c22f161e764399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5458b89e7018c2f6bfb8c64df52d87c30
SHA11fb410f757747af0a1489410dd83255f4695f436
SHA25657d5c9128a5d48cac441392720b3ed499dab0422c74b304a35b00d30bdc0a520
SHA5125948745660967a5136d1f7ad96f993557df721c3d3c684a91b327e3fa983528694e36f8aac7481de41660d99b7ce68ed4c32e5932d05f8b01a63da7c3cf6bd3a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b