Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 15:10
Static task
static1
Behavioral task
behavioral1
Sample
bc3ff58e7f4eb2bea16609ec758694db_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bc3ff58e7f4eb2bea16609ec758694db_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bc3ff58e7f4eb2bea16609ec758694db_JaffaCakes118.html
-
Size
1KB
-
MD5
bc3ff58e7f4eb2bea16609ec758694db
-
SHA1
e1a052f823fff37f0b89bbb052c45e6b36c635aa
-
SHA256
fbf2d3404a474933226944fffdf5249f473bbac4fd9e77d12c08c1295369de52
-
SHA512
accb2b321f574591b58026ba12fd81a67185d9638387d386ff4c208e1f66639e50dac5da663d69d5fc3b991c6c0b6e821f1ad2085567a68db408836b7bd25704
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf710000000002000000000010660000000100002000000091e29cc95328bcca6c98858b69c3bd5393e52978ef6af46279cfbe06e2c55013000000000e80000000020000200000007e4b1eed61cd9e5453030945b8302319b50c94dc48577c412eb176d867d6b924900000005f14562f591de07887bd191130f04425416602caee2136eb64f909b1504b932a8b4c92c83b26dbda9da2d3a8137e9008ebc2f95fd20de4f7e90edea134092e7bb4860e34b67bffa0267e0e9c1d123f3670447a338e902172c026e5a3dd30e67d02ffa5658ce1d2bd23738289f40a7b626fb8464da310141729d736e66d72cde10981fa5d83a61e0807d0a5fc51799a5e4000000015574a0adbbcaf4ae5f4107409cb264947fb6cfa137a2ec6814b9b71253300c28ff2f0023925de98344cf252d68e55c9275d3035929d3ec2592e4e9bece163c9 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430587693" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D31DF2E1-6161-11EF-AB23-E297BF49BD91} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 007d75b36ef5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000ffad864cad2c52b3af2f1a25eff717904297596dcb601f734651c3dedf854a5f000000000e80000000020000200000001484027a38cde38a5a0c2167fafdc096e7972a187c821ded32d180729310c73b200000008805aac635694ed283757ce62a010237ce75ff7e6716385a5772afdeff05fff240000000113c79b2aae3f7ec991415d40e5ca5f2d4abc95d7e3ff8e2a3e76934c0eea5be9690eb75f31599c8f88476c106464eced39ba02dc5ef87f32e0cf3b2f0094565 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE 1728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 1728 3032 iexplore.exe 30 PID 3032 wrote to memory of 1728 3032 iexplore.exe 30 PID 3032 wrote to memory of 1728 3032 iexplore.exe 30 PID 3032 wrote to memory of 1728 3032 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bc3ff58e7f4eb2bea16609ec758694db_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd09301ab37faacd153b0eaafee9743a
SHA130a7ee4bbaf06b6b69294c7d900ea05a7488b9e8
SHA2565da6cedd09db81eb4f7b6db9ad0e149acf0299c9aa194653f2aabb41cd851b22
SHA51203d014f625a1ea171fcd910fb117427644a97b98b5a60a088f0db37fc32e83b16fd6ada06249fe368fa4dd543dba4d5b1ba2d2d4690fd05da2ee69a045f1e3f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5616b77b64b866dd4d3199bcc3b20e4e2
SHA1011f19fa4a19a01702f8dedbbf89a6a85d6771c8
SHA256a89fa792154f96adb336d010a531b598fbafa1e1e12f5628814af7c093d71f91
SHA51223190fadedc570820aa3a13296c906b8c8522076974ad3a324ae0ad734512ae5d355e49f54fe005cc5384ae2da85dcb581bda31ccb05ce9aab5ded7a26ee1cdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa63fe4ffc46927871e42cfdbbacf1ad
SHA1baad42099ec9fb40ce10b0f42b277d423a8ab7df
SHA2562f09e1d6a721c7860ab32498c31b6a6e5d06a0dc8db92447892c922c177ec977
SHA5128237a70036ed2f06c68b0f6392898d86441c602c5aa048ceaafa5404c57ac05fda0801393768b765121f05ad620df7df92e7615e4c9fc705874bc488aec0c0b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55adae58babd35478202b7ef192d2adab
SHA19563b385a7b30092e1b2ab6c6f0ecbaac07a9064
SHA256f655a29864e3597df108cdbed60981ffc48fe0b031b460baebf7cf7f77e8825d
SHA51237115e29718e69c716c697593c3b1961f203789c5999e5030e29433d26f554c3699afce8542f62824bb9d86304059ffc4012608cfadfefae82f24a979b352ab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5969b6e250de8209c1f3e23c50a27d66b
SHA1a013783878c93fb24ead10815b80630a417276e9
SHA25609c345179cc42fb0c02e4121c209f948cae2672b1c12f3d677a629ec755861ee
SHA5129bd4e432ea1a98a3fddb4bed95afb825981bd2bd6e7b83237fdb34bbdfd713871d821dbb7cdc2790baffb8a1e829f6d87098c99d5ddc7cceb75161f487757a90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5416edbf702b64e5c825ce145883f8e79
SHA13a701fc557579854e6a490baeef0bdeca0f6f1fb
SHA2562babf82c0708f695b255f5555c29dd633514bb33119023a94549dcea7e4110a6
SHA5127165c8de955bf2f3b7d8e541d353054ebaf6a11c9c40a2e45855469144b1e80bebb7f1d957c40ce93416b2f510d2eec39df677d05cd9e158dcac6c2a4f5795ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53119fb069995c8d2913e3137429f208d
SHA17a15cde264577cdc9c15d15637fde394cffb9061
SHA256614f4346a598897c3e68ec6d5c03cb8cf2de09c363f9b787082c9d3872f89c3c
SHA5129372628a604706599a47400d6c72240643c7795b9baaa10c15453cf0612c9ba27d94b21b81fca28bcec1dd0d03f3a10515fed8a46d458f2e67ec1749de1d68dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51189c4b59d50dca56c90c009cddba137
SHA19fb874398c23289dbb310c0cbe2fbfe4ad58e9dd
SHA2563c324e4d4f9f27ade896d3165eef28332c8ddb8b8502b1ec2ff0af174b62d786
SHA5124e7de3ba5be0f7ce61e66197665db3ea1d538ddaf3e4fe7ea4ece9042682a296a19462250adf54524b0342bf72da11ec0327a826f4dc936f1d819d3831de985c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f010235711d95bdf8760bffcad629f29
SHA1cd12f93446248119413ec7a50ac2342860a23484
SHA256e173719d4e1e78c8f504e33a21d813a05f470a05b801618c534bfb24931049e5
SHA5126557c5e02aaacc1bedba109afdcc79445098fff30088d00f7c568e14cb3aa84bbd906b31c1d8efbf1c4387330e9922ffa71a61d1c25353303536ad77e65d71c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b122aead85858c81b2cd1987b7af4368
SHA18bb4a1d4335cf355a1d3572e66ff3ed2c59c564d
SHA256dad7ef53d701548f5f4c6711bce6ea760d5fb7e889261b79d1a6b6b3b988cca1
SHA5120e478bfebe07c0d3b1330233398cf5c8bfe82018b3093e306e5db751b35d1151654155fc1dc7bd84ffe78efd84a3e5279226a5209a0c1ea49baf5e353c0dbc49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9e4dd1de4919e9ebd6ce2883cbb8444
SHA12a7bb1ecfd1d6df7c0479b235a97578e86bba0db
SHA2566f1ef51c50ff7e8366128e8412093d83e868e72a011adadf948cb364a6790f41
SHA512c140f7f952bfeadaa56ef5383af5b95221142032b4f3280f716109ac358a477b6d1ae63b43e49e16c2895d54815a09fb3e49239cb1c425820f6e28f3981d8c13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50008a4fe699b6ac391975457b931db67
SHA135c04066e1a18912f9380cabbbd2d33e494d7abe
SHA2567371ea1ff4b0918d0ab97cf9567a8b3e387315670c65ed53d79323e78e9d2e90
SHA51231c16034716cd54c078ede6b240886b4747e185c8a686258e42c7e60e4ed36a026d3405db60a9969c81499d7ec4d914d277b6225b1fe0c2a6febd3a2c0882a8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5244c88cb2bd2ad01cb0b775a3ed5e00f
SHA1cfa107ecfc4bf713af913ac08ff8af6202633c88
SHA256710ea16572d8e6cc5817b95e5b1eba3f0935950037c2e973b65e75c36ac2d89f
SHA5126fca9a4ca1761185d5ef5ef9049309c4be2cb93ee9e8531e29daad072b78db4b6eba7f358764dea257dc6acc4e3eac99fc8afede53c20a47a5e7ea2e51463956
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5755b7dfc00c97d78db766e421c6bef4c
SHA1358d1a8f9ed3d5c7542ff8f1927732aecbff1596
SHA2569074f1dc1f92560c381aa7bdcc73b6836c865794094d1b1cd76372ea9f9532db
SHA5127eda0ec357e4b8d32a53a6ad8632bc806c02b338cc6c228777d442a67d1252b39ce13d4016e0837307717fa44f33843342b0e82f79949c814d627cc50536fb76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0a9cd9b3784c25e1cc69113d0be42da
SHA1a180a0c3bd3a8b9e250e775db666eed0ea8f4c6a
SHA256206e032ac7cdb4af5275a639591cd0eeec9794075d54d762639b084b44f32f77
SHA512fe80ba1a70b1d50caa397657adc1cfae623df4721de86faa00fc786e0f01286172415da3a58f60a123b296eca8d154eb033342c3f7316d14e847a7587725a212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537471ef0b0b42736429d26a2966d205e
SHA1e0e7e628b2a1a0139ccda35964a62d1640719235
SHA25647345d3163adf3ad3a187d555ab6c327515e1ab060afc7038a20d545daa7e5cb
SHA5124cb695db3a53c6b025502ea1fa2066b8e2244de2aabd714b9fffc51a538f9576905bbf332c96e6c339ec1a6452e1e878f58889a5ecf0d9db80a949a65a8a5f70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be047123a3ce9cd38edcc8a802720cc9
SHA124cc999579b96c7332365ea10c7bbe69dd29af95
SHA256eac4c322497dee6aa1e872e20315cf835604e0ded5236366b58ae63b0472ab34
SHA512701f3fd7dc42b4e02474a6ab0b003541b81a96051d805b527b7beb92daf43be07bba22d83add9e96b6381ad156211e0ab56f4512cc5da0cff8ff2e06eb7d1afb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a6c99453fb081efabb37dad9b6d3581
SHA155190ea834ac0a4cb2044fbcc5595a8908d96a9d
SHA2560b57c0b1c33945cde5971b19321d01303cafabe045fb81cb5e034596e1831e2e
SHA512d636b885583e20c8670767ea9c0948f6271165e981f2b7f0258a706a9e9e3bba6eb61846b2a868b768ffcbaca624a5d241601a671d97647bf51bf2a0ae80eae2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a90a663a77e59beb51e58e07a239346
SHA18ba23fa741896c2d841073b2ddf0aea6c2845a42
SHA25607988119130c1efabd75a644a4933d2204ebf8d27c76aded4743a3406c95e385
SHA512cfc24e965fafff8625c57bcef317fb07d2e2124e6053b8dd96633cdf170e2c252b8bbcc63942b06dc59ae41bbffa7cfaaa9d1ab15db2c47ddba1012811cbb383
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b