Analysis
-
max time kernel
70s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 13:16
Static task
static1
Behavioral task
behavioral1
Sample
bbe17390171e278335675e942630f46d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bbe17390171e278335675e942630f46d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bbe17390171e278335675e942630f46d_JaffaCakes118.html
-
Size
53KB
-
MD5
bbe17390171e278335675e942630f46d
-
SHA1
1e1a94ceb78c59e0bb477efdc1bec71761309a15
-
SHA256
1b30e431a287e229d40eea286f0c7a089a930318b1bf8790f8843fba7790bb47
-
SHA512
ae2d6ebd5f7828c62e96de05c6b38d5e48a1b218cb18549a2915b47d9c35d83934ca347d73e1db72968484d03d5b86253089f1ab5f6908f5e5663cd89475c107
-
SSDEEP
1536:CkgUiIakTqGivi+PyUVrunlYz63Nj+q5VyvR0w2AzTICbbooA/t9M/dNwIUTDmDI:CkgUiIakTqGivi+PyUVrunlYz63Nj+q7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000e3e78a96b3431ab0d823dbcfb935c0b9d79fb53c3dc9dca1b054063c307baae6000000000e8000000002000020000000cb29ebb481cebb99ae79cd2e43a07f7c1f043f219bb07ed5e0e62bd1f4f31c1020000000fd38cf3d873e872b3be621c35a06a39dd9b54c98a278f6cf58dcd583e0965d01400000001094e91d61447cf401bc575cf5cfffa772e7972d42a4dde45ef02234f4c11810c59eb3ff70d57772cd85366addf2f00787f323776606a7d0a835ebaf055bce74 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E1CA00A1-6151-11EF-A74E-76B5B9884319} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30b11cb85ef5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430580847" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 708 iexplore.exe 708 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 708 wrote to memory of 2832 708 iexplore.exe 29 PID 708 wrote to memory of 2832 708 iexplore.exe 29 PID 708 wrote to memory of 2832 708 iexplore.exe 29 PID 708 wrote to memory of 2832 708 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bbe17390171e278335675e942630f46d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:708 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab999be90c7aa4d4dd2d6863f87cac2b
SHA130175de80793cd30549935f1844d2bd6521d601e
SHA25660d5766eae53fff60b9227ea2fe2c818db04bd22030ee41680e114ff08bda740
SHA51279210358bf35d1dcb7d588e76c8ad3c7238c59fc5d71c7aaefe7341e7477c2aacd0e6d4b4a7f481c4460603d059944e06ea17c2b5c19c22dbda6258b2343b16f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ee0932cba1fe36edbfe896bb81a052d
SHA14e178e7eeabacd266becfefd46aa3f231c56c797
SHA256e183ccd7cb760ff01465f197c9fe6f7b0b68eb8404320f29dd5c3c617f08319a
SHA5129a132a9e31a0537554c642465a928e6750db3f56144acf22f0924844895cb7b50e3089481418110f49a7ee49a4534400dbc4488800b7250fa3b03fe504b515f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cc7218af3decd604b4af7479af1e57d
SHA14754857078a824cad87cad3bbd0c04fae9400153
SHA2564cfb69e1093aff4ec2c3cdb51394a07c0ab4763798dbaf3f805736c9141dfb70
SHA512cce4a9b72ccf771f6eab806b86a73e532064c8c44ebc3a796b3790b10ef6281d678ec616ffd29f01292ae4b7775282479cf0fcc7e21545ba6fd4adfe2781ed28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce623eb965a53e0fe1bcf0367fd18773
SHA1929cda56145a2a5e29d01d23a2bddc6204cb4b03
SHA2563e29a407a061a6248a469921b635e77326372d19e114d897a2bc1cb3eeac1c9b
SHA51263f9d203751beb91445b798ea045b1adb39609f403c7cc41b6f604464a685bf45587a7ca2e05c7de42f3415dcbf2f304a2d34211bb796ce6870dfae2e0b760a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b958ac4ed24c2f52c6fe20ab007752f
SHA1c4eee70bc43bcb6d0c31a1c0302213dc207d8623
SHA25691f0bafdfb8e71060fdb276253c8dca08370f080fb7aecffc5f6e653005fd0e4
SHA512d249b378dd92011982ca9ba6131003f962dc7a18f9df1fc97203ea8bc0376dfca59c652994129d0409ac554f14643449905183ad9755ea6fa91d578a286975ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbecb18446007cf15f7250874228190d
SHA1469c78b5c267ac0e64487f540c485979756493a3
SHA256566e72fe47d28543bc395713c8280c13428566e22c887e3e70c897a3dd68ac66
SHA512955bc1caf25f85d1437553886e198867426efde14070839e2f908bacf2fa5452e9ee8bd14fdac60b1354a961a7ae5f34be75c6f186775569ef91848791e293d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ee0e72e69555d31371c994d36856373
SHA15920f8484fb0b29a5c7aa4414f8f2054137a92cc
SHA2564795f41739dc458efac7b577b25dc67d884a115fa8ebc54bee80fd1961a42a89
SHA51246752d2b4e3f82c1bd59ea2e2b9de0a7a119bce35d9082b47dcb9ef6ae59ba0829db48017beba6c732607b9c74770f5dc7fee8738482dbda201c46aafbb54d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8ff21ee83a20dd36fc74ddbb0631b26
SHA1cbe97c856730bb3add4063ab19c63e29be45c2b8
SHA25697fde0a853ede569c92af714fecf91fe79a2a6694f3aa24ed7182020e95bdcd9
SHA512f2da31e623dfed7bccda90715044d4879cc9a1e0e035c88668c60588986efeedfc5bff1014bc3bd648e4db8fdae32ae0da2f813cab98c5aaed31d5ab307e57ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfc536dcf5a2c2bc75639c9232a634de
SHA186bd4fbde1a38ecb518999bf6602ff55dad6c818
SHA256df60b4995502ee85cd89ef3f3018c7db3cbd92003f9267742a8e7e214a3cb7aa
SHA51257a8d233693629f23d71351a391eb0519e1db5351cd13145378db211f5f2b04b7b3d1c798ac6ddb76c52e684ada1cedc80b600abe279d36ad039d21bdaeb45d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507bfc3940fb8ed450743149134ed804f
SHA1875cebbf9645649aa66fb90482a203a6e554ceda
SHA256a1ef4c9e4ffc7f083bc0bf1a6fdf74e35630aa9bcefd8b9240d6ba0328b025c4
SHA512d8e6126b4b9cab78e3234eb7732f6b665c2216d02eab5aff6f0929bb883761c7ed43f30a9983130dfef8745ad8387277d133e855303bf9411a5c2fa4d320d25c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5479d927dc964132adb114d2bc4acab33
SHA1f5bc6db88e373461e2f66310fff8f2fc925999aa
SHA2562dd84b4e9669121661c6908d2b8522b3da08c2606aec16819bfa2a6f685f187e
SHA5125013665482262333d87af7c98cb3069ad15186398995b00ce2f01f504cdf716ef97a45f88e8653f9cbccc483a525a7c49be846346ca4487336dc1cbf85d70898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e8f7bddac0ff1436dd4bbede6a322ae
SHA14f243f2f737527f8aaf6071a324cefb3e03ed55d
SHA2567171c7b1a2396ced7ecc20d22feb3aaafb34e7db8d5ef035078f34aa5377f47b
SHA512a69c13bf0be57d988159fb114ac47570a57ac3426a328dc009c068b4a4cd3ad8d2dbc521ff67dd95dd131416ef158158968c3d15d41dfd6b1b1611e5272f3d71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3c5e398723f1d730a8cba3416caf196
SHA16782eebb7880dc885ef6624860aab4d6d9c3ce4f
SHA25653875518f5a4aeae8adade0b2e955f4830aea8277f745ff5d2a253b94c561833
SHA51294abc56785015ef1e4cfa985e1cbe811377bb70413f5d1c8641de3646d43239914f73c0e1544fb96a48ea0f778958af2252f216f5527e014a83068b4c9ec96e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557efa0da5c8f8744f5ea574a4a37cedd
SHA128c91a1f44e6d02711b60b49ea6dcd244d01c47d
SHA256fbae057674de2b76eef2d648dcf4e5a05d079d9d04936ddd0a827c37b3b8c53d
SHA512e3a33168a5f689f61cf5116534cf1618ed8e974336ff28cd3fb5374f1085423f4abaa6eac5bd8e2f1f18b0479f16a5db8bda86f39935191a858893688bc2041a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ae88c4ad8a6922219d3381a779aea0d
SHA1ae268c4223faafd7f0482d7951c3e1e46ceb9bc4
SHA256284c9177c8e9cca50430ac94c3863256f9a843e2e7a392902f435b56c1afc1a2
SHA5125ecc3662295b26fe7328fc4e8df2e7df98a5f0c9094acda91839dad04db9604c97ca2dda9c23bc8645d1dd49dda620bc19d846c112d588ab42f0b6ad93ca6ce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9cb79d17b9dcdcb026663c283dc63a2
SHA1c801816031b27afccf810c2532375035681e835b
SHA2563890743853e49e16d4e00164df590fb66d0dec1e40a55420e527cda46375e4ae
SHA512281ba7b988e48b5329d1783354b8e48a0d013f8f3b12f80027f2e708b4557ddf18bfeb05b809dc89b28e56065b71acc87d78f4aad9a56700b0cf52f584368e71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8b5b851e005c9b4e823ef09acc230a8
SHA10391b068ff3aff09d086d095dff5acc6f8cf49ef
SHA2567c5d335597f8a1ab8ca92057fbc3159f1de86e3bf5b6fb66e99baaafba6f9bf7
SHA51297834bcaf9dd811ce2ef89f2fc80e35b0d57ef5c2d3944fdf955c8c3e498bc85e4279e5e754ccf44286a43654318079c82a075e9fb1f69b8b16902f8c1e40968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52435887e79225cc2dc21429ff77fcca6
SHA1bdc72b1bc5c1bc2af1521ff803cc8342754af805
SHA256d5849fd4a69f42ffd9b32ad57cd8311c55280dd347999e5bb9df37c2a14282db
SHA512d893b7f16129e2c42ca63f56b9cbeba54d27980e52c5e32c3920e378ca2aa6f18d3c64c295888b5cae39175be5e9f363fa8f3067678dddb2faf387e0cbb13619
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NFAY0EOS\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b