Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 19:30
Static task
static1
Behavioral task
behavioral1
Sample
bce38cf6a6b6e9bbef6c25ee53a5513a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bce38cf6a6b6e9bbef6c25ee53a5513a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bce38cf6a6b6e9bbef6c25ee53a5513a_JaffaCakes118.html
-
Size
11KB
-
MD5
bce38cf6a6b6e9bbef6c25ee53a5513a
-
SHA1
69d386751779964abc44ac60eb3d78a4f9b5456e
-
SHA256
d2dbf530507017174506fcbedae2055a11784f2313cadab7fe662b8bc1e54626
-
SHA512
1b1d9f41213bc598a26dff8ffefad8b82ef5c5c2b5ca4865b31cc309b9049a6c244deaac56193ab7905210210d7f30b4976df8add8b25c40da46c4ab06460a69
-
SSDEEP
192:FWbiKKm06PywK7ppqe5IqfLzSrBkdd34kf8xr0N2G1q8yMRKqFNgw/bJe/0VPOoE:FWmKKm06Pyw0ppqe5fLuredhNwQN2EPC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000094c994126fbd3b17b2a18c08957548f5d57924f0f5254d9e854341d74171f30a000000000e8000000002000020000000f55e42a52e618b24159edf2786e03a8c19a06346d654020362819028d33fc90020000000c270d9abbb9e29f0ed588ef9918b90916996ecc82627b444b8e6ba705fa08af1400000008ea7744a067e00527cae5798f6dbb0588426da54f2a596b166d862cdc1058064f4a28d09a0b2ace9e8b9e121af92d0feb3602a9d27bc23d3db14bc1a7791ef60 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{21D3F691-6186-11EF-9A0C-EE33E2B06AA8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90540ef892f5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430603287" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2416 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2416 iexplore.exe 2416 iexplore.exe 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE 2100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2100 2416 iexplore.exe 30 PID 2416 wrote to memory of 2100 2416 iexplore.exe 30 PID 2416 wrote to memory of 2100 2416 iexplore.exe 30 PID 2416 wrote to memory of 2100 2416 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bce38cf6a6b6e9bbef6c25ee53a5513a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb64bb608730da1649e6590772278d6e
SHA1e58942e0c45b07b155dc55101a349fe2941a6474
SHA25607730d693c35cf1035cc402bd62ab8e03ef4c32471651c660634c9c7b330eda0
SHA512d0e95d79182ea5cce3f5eae3d46122767a0b39bfe6a04579670aa5fdf96e761ea05be62c9e9a77148536f853da65ccffecc197eadfb05d6ee71f5ecb6e76f0e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5150bac15d24591474d63d6c9d94426a4
SHA19977e3eb4955ae9eb14764475ff2951f132cbbfd
SHA2567e57654403c546376d727170217d2e68f4e1f35468ed84b2ada05b1f2906e87e
SHA5122a26d0f0d710a2b6375f95e73c42d42f300972f27a7d30608d7ce62aa9e2b4ffadaa31800f9400cd55f9e69566ab4dd2f462340467d8e48bcba04a490fdd11de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abcbfbeaa4cc944cae1078f1d55bd2be
SHA10e15df98db4353f9ac33ae943ff1e02a7070d5af
SHA256a6655d67a38d9ffb094eb3a2ab362807a31df8619032043b885616ade72c89f5
SHA51261e4215a773e49b58d71682561d5031ec692184e242f28554604df0d9d2ecbbc70a403ce413a52da511988fafb62fa107fa7419654f5ac741f5d491d91200fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5729150e3b3a38426aa4e069fae24dab6
SHA1270bee1499603b3e23cda5aab8417ae93708870e
SHA25647000f4336013850d96cf85941a2b30bdcd4f293e2a4ff7bc78dc1cf6f90722c
SHA512e471258bb1d65593471ccad9d0461c2127d5d598908f34581ef6022536c90fc191cfbd18841eb7babdf0b360581f43b13aa0418d9ebe648cff5562cbfe528044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c35780bf0ab2a863d0d41c2ffbb5dc42
SHA1d4aa7135653db963814a1c10d75e21c89b903b43
SHA2562a99c3aeb9fca3403932d8b73340f92efe229a1f10cb721f8adca7333e91cd64
SHA5123ed825d7d25ab8a002f6e59ef3c300aae1136fb3b71f13328e49826faf1ce0b5ed75034870e9ec51bba79e173a4e8684b2c9db016d687d903932a177eb36b812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8f842570a7e861bf9d57cd686331f0c
SHA1456ed50ceb21fed5b0d2a12b8ffea960d77e838b
SHA256e5f3f5168d1b391a1bff84dfd85dea59244cb0e3977aef64d039dd91cb6d9229
SHA51234884fe0ec85e52bfa5eec7df3a1764adc8bce9dad7f75ce9f73ca874f6a620ca784fc3c893927f167254d71c5ac9da567fc2a40112846d854ba358757b35b01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f316dbb77204f7746727f923050c2493
SHA1118c17579e1e6de37d7341d3056aa2477ecd5868
SHA256e88146179a52324bdfe4219111d549d6ebe450e4948b4bd37a2d647a58302331
SHA5129ee6443b144dd4ef6a61c4dc070243fea1f0d0b09c0227392437654b11f15109caf5fe269c474c445b5f697a234074279e48b717d806b3a309d6d290eeb6ef53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeb4c7faaa07c9ceb846ffb0910588ba
SHA114a16d37f56d4956a596f4d297310cc3962db467
SHA256fc00da8acee7e41427714af469497b7bfe95e176be3f74800b49638ff13ffe23
SHA512f9df34ebe58a3afa992e194acaf62e1893f642e8f9b5bfe71a86089abb096e425f3efb9595307fe234c7e1bf5be1161fcffe471aca76aec9a6f9744405c862c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b305013a934a8ba9013760ddd5acdc2
SHA18063ee62604e83a768ad6bea627e7c95beaa891d
SHA256c71e5a3204df354797fb41420928bb4120ebb09b143aeb4a9e8090de2f5416d6
SHA5127ce533a0261d3c29efa3f96baa8e5be7aa0a57e083a4c81eed13428f3716731c3910b69c9b18f3fb849a10c6dd0b150d0cfab10b8b271a1129f4e9e638f49773
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c9efb5e459a4fdc1497fbdbbabd0e1b
SHA1bd26c4259ca616108df058db097c9fde4e0c3b9e
SHA25669bd7f9a4f9a54103fdd0a0a480839c7400a07eda3099958258139dd26e87f2f
SHA51223776294fef52d40c55a9f19e31e8f4ab2d0e5cba6d7290619c52f4b2e98b30b14b915ad0cc890db815d608faec77210e95dc4e7735aa6a412c720e06fa5a75d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bbdbac979138f77edbd376662b89b46
SHA10a8a1d454c050e1f235e7ad9f32be08299467ecf
SHA25691abb0be41c4ab1854bf946e7b42a5bf812c97d400c4aa27f43b71004e46b672
SHA5128710e56b04f947e661760289711e6c70e626051d5c8de7d936a718aaf045de6def1ece9144534aba1529681f4710601140976d16cf31742adf8e7f20595b16e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f601f3cbb4ede3f8a7ea7c9a28af8c6b
SHA1434d8a6ec1ad84948028b0339ea068ce14a6df44
SHA25695e0345b50e117b482fdb809cd34d3295eba2f2c2adc1f300be7a6a364999135
SHA51217334d131476e80a5dbe7365cccf1c2c1dc9160eae775b2071489dc6386fec016f3e713025702a5026ed0326732df979d435056e5fe68f0c291df4ec8a04a12a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51640df525a65a21d7d437b2046ce4b5f
SHA1986ae1eb88bd0da7fff8416b03b9582c0b9edfcd
SHA256a4f862646a40c04e9653835ef44060217a4e63971551eb2c05e6b7d795e512d3
SHA512db22fb0c085a180c59b6a236587e9e71d3e291d417589b5fc367f905ce6e326ea4a0b15af8b23bbcc14429ce9699706b074cda052065f2d820553a82a4d54391
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1f97fa5410136b2e96f651948ce6d73
SHA11575d8f849a32ae0a62581bae61a27216b6a8e58
SHA25619f51ca21b39f5685fb8fafab94a59c160f967e08c4616c5e1654a0167d026ab
SHA512d41154cf7a33d30ad6d8651f6e52a9dcce7f7aa98db4c66889a0b1c6832de5a567545c17171ea53a290548fab16698ad42ce5227d8e203fbb2dd7becab96a173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57950d820384350d3c3b7ffbce68a6697
SHA10f4b188ecd872a1e9e04e154fc3fe3ddfe9d2c30
SHA256f6868471cf1380b7a4ca763376259f323631cca8f91c4253d6c36a83eb552732
SHA512d5139d1eb8250fd3ab315a738d682343bba034b1a986727a83ecafb8dccd9e80f66ce0ce90e3004159592c1924ea31fac820719f20d2aa4b5f636e7d2646d32a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5409fad67fbb351bfcc3d391f8870c6e2
SHA170c483e62f429a1ba5d70ef9d35e39d84c04daf6
SHA2568135a5704c382e5ae1dbd94c207dad3041fe2eda5656daff16d3d63c5b40311d
SHA5124e2d9f8610c9115af1759d07ffc471d38536fcec60864e0c65ec0a75be5c1a068c903d99de02fbf2522588c1c1b4d0af2f8c3258a36b19be8c42e157746e82cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7343a80780aadccba00908903254faa
SHA15258964ba37267dfd2bacf9b972e61dd61765522
SHA256fa27aae4fb54a15137ec4f70b5c2de7403b2ff4832a5fcd553bf8180dfd52a1b
SHA512adc0a259c394dc298f69d2f77faca2943e12ece6fb295103ae38000f3c5b5177460ad36f241daa1ac33144a14531aa64e00c327889f98cd33b066e5f33c5cf24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a882ef836ae8a3a0e66663c854a92ab
SHA109b355cb39f8c7de565d124582666642bbeff47d
SHA2568eb8750083e6d8dc357fb70909752b0caebfd4d29c14c541223aeee31cbdd539
SHA5127a8482345e76c46547e9e93eb5b42a7277469d84868d27846bf2d999d20ec19ada9f1d73e08a944e8b7f9a45f5ca5121639f711ee237abf0a20b7016b0842805
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52750d794a14aba6da37e6bad9b618456
SHA1feb603e1011a99c771794c9b9aa5feed12a3cebb
SHA2563818918020725313422b9b5ecf03ed6f243cf5d33c12863066250470d0b79ce1
SHA512b186a81ec172fcacc4cddb53e9b7639d51f78644f22bebe96e5c9722a653ca5558e63023d2aac5a3a29d3e1218ee6846ef939a3335fa4223667d9ba765dd234a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b