Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 16:31
Static task
static1
Behavioral task
behavioral1
Sample
bc7c2023f884ced7cf24eba809710120_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bc7c2023f884ced7cf24eba809710120_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bc7c2023f884ced7cf24eba809710120_JaffaCakes118.html
-
Size
7KB
-
MD5
bc7c2023f884ced7cf24eba809710120
-
SHA1
35d593cb63629afdd74d944a9499a7bc49d9fc00
-
SHA256
c8e72d2ad0463e0bdd121d59d712df70607f65d8fccaa4bccc1dd9ac45d2c0a3
-
SHA512
91c01d6ad5d00c921347bb2ad33a0cf1ac4cb8abbf3467aaa4db4902f24183bca5e6aa498bcc867f9ddfe4381671bbab267be1fe46c7b834ace136d002f8bca1
-
SSDEEP
96:uzVs+ux7CCLLY1k9o84d12ef7CSTUOzfOY9T6G7IrcEZ7ru7f:csz7CCAYS/VtOb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 803447ef79f5da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1A535871-616D-11EF-A1BB-725FF0DF1EEB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000cb3b43a51a77cadabbcc4fc0237ecd11903a7d8fedfa8aa1249d4c03d447dee9000000000e8000000002000020000000b3f6e32eaee0878447c8dada1d76ac998210daeeb27185e5863c8bb591e8aa5e20000000796f1ae10d28beb2f8d62b7eb005738f36b7c8f09e6d2b1407ee8ce339b719bb40000000d0bd442d60b57a08792efcc6c320f2b9635cb717c71438ea5433683d7d84b2b7cfc2383814478fdaad718a25e34bbbd228c8b947d3a81b56ffe1a67074cfd9c0 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430592537" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2624 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2624 iexplore.exe 2624 iexplore.exe 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2360 2624 iexplore.exe 30 PID 2624 wrote to memory of 2360 2624 iexplore.exe 30 PID 2624 wrote to memory of 2360 2624 iexplore.exe 30 PID 2624 wrote to memory of 2360 2624 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bc7c2023f884ced7cf24eba809710120_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2624 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5358e50ae51da1d82927f29ead6c4e06b
SHA125a8d6fbc7e7b8631b3d67b7c34421c2a201c8e6
SHA256f7b963d2d82b21d55a56dab878798ee1bd2261cf6d1a66fa70dd902d3954e132
SHA5121e2347f245a1fe02bc68c1d6c62575e4b027f84b07a895f43addaed8e798e69dca46f037e69c9f6e4e1cde6f1725b6663e49d425735da7a0352ffc63427f898e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590fc44d3753db45f2da46ede1a529527
SHA15b98cf284294a62c1ced5d57690114f46f83ce7c
SHA256c6c785442db6466d66b28154a4336ba100ec631760eeaa67fda820c6385b052e
SHA51296dac5c3d4600accb3d667a3cc6c7aa0bce67b2d1be71456b701c3e73a9936a45ebc113672625030c3f81914a9ab4b531c592011ba910ad1546017e2b9b74d64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ede891e544843a93be86da2d5e663c0b
SHA1a41ce8b8559a891a9df97c6c1dafac05586df91c
SHA256e0fb1b83c612e092c9d9578dfe421e7e0287544a468659929bd628f9c1d960f1
SHA512fe6eaa10d03abaee751f95c89819c6f3587e3958d13a4175d5e42144b908cde9ef0daf8659a4f321c6f6b0af16c5dba0fba52d81558369d4f2184f70e15f1411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad6a255694556000a1143849cfe8a627
SHA11f0eddf8feda6482f5dcf7f885a6f4e1bf4b8100
SHA256eb3e1652cca2ac99d65a91fe42330af8745f78939619b9b24d4ea0dd96892b92
SHA512b238d5fe3c9566fe129f15534a2ae0f7234e322aee4df3b3be6b5e0b9a882738ced67bdd3394fce679f72f37fef54992cd359025936e65d00d0c16ec6ae975ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f96f7374453f4a3e193880e7efce6d14
SHA176c1d4d097e158f977e2b83d0dd466cb670a964b
SHA256695a6a0f4343eef299c1c6e0f4d7b546c580c8ce9c55a12c0d724e7ed5672133
SHA512428f1116ec0ec148c03f7edc94d8c7eb807172726c4bc265284321b50e1c4b314e01f241b5d37bd3f12d5ac53c2d4491d9e161d69911ccdd5bfeb70455edc464
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595747767628edb436a8fb4f4fcba664f
SHA1fa13fcd18af4f7b4f9c8809ceba501b65a71f5c9
SHA256bf47c924ee96e74868707b6d0697c89eebac34bed0f325f32dc59d56ccc5766a
SHA5120b510a2afa0d32fb23bbf1961a90f884050c9af40ef8318d3f6287525f447248b7e80ce27862805915c148c0127f5d4888363dea64824cc835401d826c55b5a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce2bf1728186a49f7a5694cec0c859cb
SHA1a630edd051aff4acec9bd2a6c56bdd9c52de5a0d
SHA25690b93000c57d849bdc8dc05cba5369b4bb693632f87185d205a812af3d0dffe5
SHA512b5398d871e778407f2c69d74f8e6cd9f6884c0b229fa3b726f29ee4b7e59f61c13465b008536b0f8acd73102689cd24be92198084d4697300ff6cf13bcce50f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b41b7bc5b2cd15cf979e87d8f9d437cc
SHA1e230d7366fd777f6f67617aa9ef19bc023ba3231
SHA2562029cbe75baea9857526b71e1b12ef9842055cfacf6a7146182495f7fb4bd9ac
SHA512d40694e5cc923ae91a0f4047ae113ef6135e7081f7e96811c31283d25fbadaa394ead9f094cdd0375cd0d25b00252e2e46ca58a5e735bd9c7cc6a23a6bd45c22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5779230f41b65f9f59e4419e6ca5f36
SHA13d0bf5f8c3a8110bb93cb68d73ae0bde460be353
SHA256d7412f02fc18ca3457524f3f338f7c8e1d0472de46348173d5025175a5167f2a
SHA512ceeae894878e9a2268c267caf6573733f1d983486253d0890d0b70764612ab30fe5312a6ce1bb2f03a4f8223fb228b84f7623cd048b99ba6a3ea4fc4fcd9d02c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537b08a8e2fcda4a037eb689974872028
SHA11658a6cfdb78d39ff3d99cb25135b7fbc5a07169
SHA256d541da1fc9c7104e01daeb84a451ba4a24772f055f6ae52f1f7073268484c6fb
SHA5120f746a78d6cb5c5f7da254cb0b5857d759985c2885b67d5b692a23fc2dbcb818befafa943ebc1ea8c4768591c9926890b39f99478a993a9715edcfecd90baa27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ea20e3c95c0dd8a1e4b9e4af786634f
SHA133ad4054a86825083a700353dbcec7e8ccca5839
SHA256e45c7ce9650132e72ffe701e59c006b0c6b3e65d7d822aa6c934a32e4c507303
SHA51268e02c5358a5141450b26cfc018d2574b462101291861484b93bf2c5ab66517a665767e79f801de7f7131535c25ef54e2f49ada3bfe13c6a0610dc571fc91877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5548d65e4014fded29868b3eb2956bb66
SHA188d92f37be88240df6d1075a9325ff68ccd00b3d
SHA256585456f9d38e1b2e963b8de218c27084db45556d8c053fe201e351fc7733d749
SHA512cfa44e218a459193faf6b2254f10a4b624da9cbdea9a4499f3b62e216ff9af006d7fa287c2ee0c80570f505bf9e04046f69c0898641eed7d4760d58c7f590905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53160396c03371067762ede0cc279a588
SHA199b275cdf6e3feb8a57c57143373378159370625
SHA2562d982be415085b1565453e8db75fba3081d2ae64d37079e9fa77a284bf7a376f
SHA512121c5270bfcdb021210b357c76aab6dd1487b8d637c14a95de0b83c6ffdbde5525c0005e171fad069bbf78c5aa9a3a2753d1d6d7ebbef0ab026d04bb346a2b79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d50681803ee3fa79f071857e715b78d2
SHA1adc34702333fd3517da518f8120d72e3937a7038
SHA25695882f9190d15f54c03565ecaf537e5406dc345e94fa05942becff7aedc62d5c
SHA5128f9da1929d1656c29fffc8b4b043a425874e85fb1295491d4ee17bfc14f175b0d3315c791bc57700e0639aef9f80443ce133d81a53181677ddc18734612327d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f66522e8d4dc0133335b14130ee4297f
SHA1cec91f584fb526ce7acd15fe7aab01d32cf5ffb7
SHA256ca82b571d0f9107dc50db7f687c539ae7faab3f56490a3c0e42151251982e722
SHA5123af7b933e662634b1e75495343d3a9f7448670e76c16233d4c570e9b05b2f22e48e3cf220d1e463540b5365f39d7b22b74c2031a391ef1e2219779efcea1396a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae4b66357f09d95934e0a3f2263d0bfe
SHA1d597b46c0012a945e2cc040e73ffeb731851bba2
SHA256fcf367f8a36ca56d992de2592c312cde927343a9d4206ebb4c6d7fad6e32ccc9
SHA512ace30aeb0c5f8486722cdb4cc4c9a26afa24f395a6e63a2bbccc0562400b54b6231a821e8c0250101ed71aec6f7d73906f254e9ce795f8ec448dbd101ab4000c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e09d3734c6f1e489b7b06bc5e2378620
SHA103c608b88659921e8d048d61040a973a76fe522e
SHA256828af504cce90ceb201f9c3f67f5e2abc892b4f6d704d9d5b98766f38eb3400d
SHA5127f6fd3b0473913e154fa140fae855e652d1cb5e901a6da1204033b79d50694a008b2ed726c31d9bcfc4602b30c11ee064c42bb994df0b359d919ddc6d288ba4a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b