Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 16:24
Static task
static1
Behavioral task
behavioral1
Sample
bc77ddd62d2b951be22b17bd4cb7aad9_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bc77ddd62d2b951be22b17bd4cb7aad9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bc77ddd62d2b951be22b17bd4cb7aad9_JaffaCakes118.html
-
Size
1KB
-
MD5
bc77ddd62d2b951be22b17bd4cb7aad9
-
SHA1
633f81a4baec9a94c615dc2a7b0721314f466dec
-
SHA256
e8e185b244132c5385dd6e4f47c9b707913043c67949a502430b3ec51113dc92
-
SHA512
c29d703a5ba10fef96d06adbc8b75beb309fb94b7923d84f4d46269633e6bf0177d486055d30dbf16049bedbfbfffa9730479a88e81da14a4020e7d06e167b56
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430592170" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3E37D781-616C-11EF-8D34-5A77BF4D32F0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000c34f04e4ac9fda0b6f1386b9e2ad232e99bab7be578805af4aed98178de67d30000000000e8000000002000020000000a504e53a8938626a04e6db92024da3b9683e946141ab0653e7de14f79f7458d5900000006a391ed194a902a26a51731e504467d8ad5f4e3dc9144b644349f5b6bf077dc6e3c9008faea43c557cc3b9c2f6e0d0f7643b36c9be910c097ce4e3d3b7cda0d3357e0e924ac8f40790c3758ddb8120d85be006c0c1871fd2bbde38a38a1db356581e8a8693edabfaffff28131950315462bdf73e869f2a67f4e08853cb723a9a3588d2cb93a20424834f6472b45aee2d40000000632688db81f7662b4a9a6cccd27c6ac463c2a9ced5380e98a3ede83209ea83103aa81249df11051d8dc49af401b18966ba534649eb49561e2a285400daa7a37c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000008f32c75457a409823ebade3b7a2f3e73101eb9c0ff109f9f2f0c6ade1a2605c8000000000e8000000002000020000000920701b6c7400f0100ece28718edcc8d9ad27d27c0e84735ef1e3ad1f6461ee820000000d97a4e898f4550ac2fd4a96a279c45edfce08c00aaf442270322b1d72e4600f640000000ae8f412a86cb27bfea32475f1d88ffc1da81d7986d9bda9fef21746172ac2a0f861097888e56fd1598134b70f7ed02dbb61819fe631297b5f653cf06ec7cb98e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d09b2b1879f5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2816 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2816 iexplore.exe 2816 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2816 wrote to memory of 2800 2816 iexplore.exe 30 PID 2816 wrote to memory of 2800 2816 iexplore.exe 30 PID 2816 wrote to memory of 2800 2816 iexplore.exe 30 PID 2816 wrote to memory of 2800 2816 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bc77ddd62d2b951be22b17bd4cb7aad9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2816 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
5B
MD55bfa51f3a417b98e7443eca90fc94703
SHA18c015d80b8a23f780bdd215dc842b0f5551f63bd
SHA256bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128
SHA5124cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD50ea24991749a51f3b59aab6e245d8982
SHA10533e6ecd5ca1bf823f5f7c187bca36370b392c9
SHA2560e4e1e312422f005f4c383abaa0191f6891d5d5d23a68b84987288227fc6ee70
SHA512437949e5663ddda998903f703b8db8c00944bcb03c7aa8faa81a96ae1f5485ee394a6269b78c70257651f6a35f64a0c583b7fbf63e3702e473a77cb5c86b4a08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e72631c5227660d343522d3d736e96b4
SHA1ea61a7d689f350343b2b23149f24af54a8a4b01d
SHA256650a9a694ed5549d8705e15584bff686d3ba191c80f5d14e54c53ef71f0688e7
SHA51255f4a41e6b7ca7fcbfa7b0bad57e6e9a865ad858ed82567303fc59f6320daf72330757546fb715672bdaffc0b17ad352b9a2aec1bee345d6a5130dc7620960aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b6a61d3f09b06226b914783c93ea16e
SHA1006987306e17cc94f578ac632afe76c092817ff0
SHA256d450a60b0e15518167b0547a6d1b215c94a4271a82bade381250f861f6224bc6
SHA5122afce5a7b92b1b6831ccbbd63e114f2650fefbce905330a88b103131f436c27978330a7a0ac7d808d0460d439037c871616a0db092894e1f50b749cf01480cff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afbbf880209c535b22423e6dc432cbad
SHA1ab1c5b9e6f93ceb8a9738a5fdcb386a9ebf4a1e7
SHA25654c6930877ee78def445bd52a397f8ceb66b9f38ee75bb9d4715002d70b12611
SHA5129eb742e4bc5f7aa4446045eb06fb95c8c003862d900bec939178f9deb00889dc5066e192f9eda126412d0ffc9ce1a718e48ba29752cdced00a46052f3708d1b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55449829a69c554713e6ae44b04f82cc8
SHA138ba8a0842cc809ee86893a7e68e1eb253b1d608
SHA2561951094149a16e2137afa567309088fd605142f49d46ab3e08b5bdde80f43080
SHA512326e61e7fe0611d1f91ec9aecf022d0efa5827ae11146fb62ce76342d98cd7a798b56949ffbb2661f0fb63a99f6a572619e8b6800db76408397c847d58a6aff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9a65e436485cd88cb0879ca88adf60b
SHA1be0cc232766ca08a5a32ca788e336bf3b9162c21
SHA256ac83f5854fd004e880f0328dc9d8f3716f4bae97de3bc8224e5600deb628ee92
SHA5124034acf39e63f87869de0fea2e91d19908a43ba1d7c4325b01b500f497a1c9371d42e25280798e36c2289174a4b25f735daecc231c536c73cb0694282df1bff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5822c9e005c8f9354b913adf545a6c074
SHA1116572456aeda8a1267490b62a4484962e2aa1ce
SHA2561734e026cbad12d963dc7c45157e92115533a67c48170c94ba736e118a4d063e
SHA5121b91160ae5a1e49c8ef61ab89bb2614eb7d848ddef0bb2398037cf86251dadc37c232987cafa4feb1e74030f21b239ea184febec50881d58565884b865906460
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca18bb8818d91c0040578323c8786b57
SHA1a5eda0f924cd047d0481200bcb439ff08957c6b8
SHA256ab896532d17d5cb4a4d29da378407a944a19c8b0eb7d1aa53f1a88a17a10b19d
SHA51209188ecc32d593eac5db0f61e38ceb31d5284d88d998fee556d3ec3b3e37a784ea37e1a2111f25e0e9bdaaf5d525524768d5194024183274bde04069cf2f8ee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599e2c4dcd11b2cc47c9ea58f607e445f
SHA11e78abc000cd647d8661fe2c7aff1999f1677391
SHA25669ff91f4c16fda13a0110565574ffe34786d636e3f97311548df9868e4cd2fdf
SHA5126a544449e4af16caf8f4dca9ea7d204f2b0fb9e0c768adaa178fb438b9130f2c75e6c706660469fd92649217229dcb61675e6836739007e4eac8850ebb5c1709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b6b5d77d26b5ac1ac50d652f736e857
SHA1889d480a348eb61e2b0424f4cacab3905cc8e732
SHA256728475b519f2546bc709b28e5806712dc47b917bb0a2857b2f7028eabce3e0df
SHA5125e8fec7842631a16fed9999ccfebe3cd9ac45e11c630ca641048aaac52771ac394cce0f55c2952aeed9d2ff47710bc50454e6fa50216a2dec3e26b52f22db054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a74ec9ea074fc4fc93c68d7075290065
SHA16f0ca93faed24ff343354e9ecc3fbe24e8bd32ce
SHA256172c4191c8534dc1a859805fadfcc8a8c51a371a21caa436a6517cf70119c618
SHA512acd649ce7c540aaff69419b45ba7009a3a62f653612dfba620031a798f7c3380f23b53ae78ea52733f6ebe617e28cedbe66912c297c544e5905fdde93490d205
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbfa6834eab9a974c4c6689eadac1028
SHA1376050eba433e826c6340352868ee47a7b2b9e5d
SHA256a9653961faf59b551e6469c7fe356c1a9a6daf99e542a1479f82a6a91a85bdd6
SHA512f7fceb53980d3811877ce68e5298385fb6d1a528f32b1bbd17d3c07657cf070fc35e67c8d511f0eb92a5750e75461e5b085041f6538044e6870d893d18398167
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f30ce4651d52fa49a9919411552928ef
SHA11bf9e8f13d1727f93afe9ed281ab21bba6cf40b1
SHA2560d5425f9a71a16276d309508da9321f614418955a424e679a0e19ed43b3801a9
SHA512c913397a9c45f00a61ca14de1e137db1fb0d59c21c22e03e85e4a4f9dd0e277564a0d183d476b16fddc746a2511d8e15b3652cfc1971d469ce844d202ea432ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5ed73c7e36e352536833465dd4d521c41
SHA18b469f4df843882deeebbaf4e5d6ad169e470a54
SHA2562569df23356e878e5e4de453ecb2fa9241384be1543e766a9d9989c801502d0e
SHA512340e8be8cb7d684ad8c9bc1a4d5a201b7df229a1a49cd1bfb5ce37e39926f2acf8a44dad1d34b328af3b6dd5e0aa29cc1927b207bae7b46b54f51492b74cb20c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b