Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 19:47
Static task
static1
Behavioral task
behavioral1
Sample
bced4108c01fb74831166aa086e05880_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bced4108c01fb74831166aa086e05880_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bced4108c01fb74831166aa086e05880_JaffaCakes118.html
-
Size
1KB
-
MD5
bced4108c01fb74831166aa086e05880
-
SHA1
0df4eb47c6069fcfff418c9ca94cf0b897c54375
-
SHA256
fa8dde979f27ef30a3020fd1942777bb4f58652fb2663afc5e9f706a2ff899d9
-
SHA512
0d01d969cead234fd65b8ca233ef600f18ba3adcb431c4a5fc2bdeb20601b1443dd29d509f796ee32b9586bc91b1c4af93d30fc7beda7a950f93973713a7515c
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000000b469cc1f937482e55d47bac8b405cc1bb21eeaa8ba3c98de49612d069f62738000000000e8000000002000020000000834404f9a2513ef62dd0c4e0d8a9248ec0af90d2d8a47bc2c58da2f9e8fad86620000000618651075ba325a3c5a921f6170f2d7334e890beb98c136bea4b2fe1f3646c7940000000a93296c9f5077dbb5c33cd780623363e5d73e1e864c2029bb3b7189e6b5da1efc8d4f956eebfa3b1f373429093e0eea7487bb4df5b354e6dc489a516e625fb26 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0f78e5095f5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{86A55F31-6188-11EF-853E-4605CC5911A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430604315" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3064 iexplore.exe 3064 iexplore.exe 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2896 3064 iexplore.exe 30 PID 3064 wrote to memory of 2896 3064 iexplore.exe 30 PID 3064 wrote to memory of 2896 3064 iexplore.exe 30 PID 3064 wrote to memory of 2896 3064 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bced4108c01fb74831166aa086e05880_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3064 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572a781ccabdba9942f1e862857530e3c
SHA1f12cd495db51cdc30ed02876aa5f0297095f7395
SHA2569d71cc4b0508835535fd680e99d52e05c393e08350453c10ad66092803db0b44
SHA512d23e6ed1c654b8c2ca7ca22660a9c8d65029079b433946287359e1fff9f5b03b6e352886c1166f6594b64490b02917e02e97a70b9f304d8536fc855e2351ecf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508733e501520945b8ec52e27fd235910
SHA10ba86ca39724146affb25c28c3bad6180208490a
SHA256c508e68b4e5be6777a414deb1595f76d7c81bb77d439f0e9a7a3132693ef8c68
SHA51249c0b5d23f2fc78943f99761373d377ea7cb717f2e6b264db40f001a97ff524e920a6f4126c422b3b2ebcf141ae135824a0528a7e356b2c655bae5cb8cf7df62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511884ae7119f586c38cb9ef08eedac9b
SHA1e11176913fdd1714b27298791a341d5489af5664
SHA256a5e990fea3ecf279a0ca63f8c5d67ed7db498a87fb90d7cbdd19dbb969eacd7d
SHA512cada9330d655c224af85870eba05101d93a5a7887270fa6466baeef035d3c1632bfe5ddc91ac9c1f5612b442311573d10dee93a5b7def778345826e5b89fe5a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559e8a8ee4b087907c57d56f722038e7b
SHA16b538c9e7e9a18997bf12822c247fa17074b4b30
SHA25648e647dfa36ff638dd413db734e9be498567e21e7ba45258acd9bef7612de213
SHA512bc9efdd540d816cb10287d6daa892e439569a19cd45884b26b6d90a8b2df673ea38a786ae76d9013c7fb52ec1b3610754e5cc562afaa95bccbc9bd6c9ba3ad31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc16203b5fc8d16f628536671d7e9b35
SHA140db02ff11f9c5005580db4d16a4092b497a696c
SHA2563b4270091bc27be0ab5cd96c8fa767406c91e9bda7e00251dd54b4a235fdbe46
SHA512575d31b51462f72d9080a5f20d55026982b09250c5f746d20b7f07ebd6b6ef954b76e086e84d66a00527333f69ba89642daf642fd4b73acc47056a96e7c5faec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3a047076712d8f6ac7ed94e9c2822cf
SHA17b16e7855591e36d9d9d4edb2851fda3f9894346
SHA2566b82ac073352e3f23c100b756628e33db1155bb080f00af6009186df432c6071
SHA5124bb961f6535b25ef6e30bb8b7a9d724537955833ef1dd114de2da5b826bca9d605c313a36c3091648d01b6413ca67096f942953df2d6f81f75c852c50a142806
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5268b9994a310dae0a6b81d5e093f34
SHA1a6e78a452d6986057bd0631c5b196ea85c049cfa
SHA2564c1edf450daf692d3e4d2cd847ea35436d50b73168361ee24f79b006b09480ec
SHA51219341ea8b7ff4e02aa31a04d54b32ff607e39e3d281a8352e87a0a92cdbc803e4c2c64f7222c80db0690f5537c9404444b5e5f1cd65b6eacc6afe007cb4b01b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d4a72ca86a946848e42a80423d9354f
SHA14f14c435cc7c58a48dce4d58e474543497bdeec9
SHA256845d5be9ad58946520ce1481345ed9cabbaa954b3856bc2b12554d8afb6d18f2
SHA5122504c1160b46cbbe6fc014425cb9892bfdf015929d1ac87b2970afe3fb0146b157253e46142cd234a040e10aa269c2a8166ccc64eb6a67c04360fe5d4c576b63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b39e3566dd10d22b652051aa9136bb42
SHA1c36906704d57d2d9f7fc1b7e0c2642dd7b91d872
SHA2562f5264934150f6338dd852b61aa86d0de390355194f9aeed57da41b301ac55a1
SHA512762bf517cdfa422b4eef5914e3fb96375c9335d33ba9926f96a63d7fee3ace0380a1098a8a2951dd6e81f758a0370826ea07fed535baff27f93d306f5fc25698
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d561ba4e52bfab6a285ee7855ecba31
SHA1af5cfc22db449078013753d3b4c94e84b51eb7d5
SHA2561046b7995f8f71267a831912de669cd96d026c6907be397f08436ae31e69b71f
SHA5123fcdd321d01a72488be66d5d43b0f4011e5a58c3feea80faa395586876f5105c3c404d08099d851f48c90fbcfb638f60d98aec51904f3761ea26a995a10e6c66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581bdc79594b2b7646a1b1ddeb60dc728
SHA186c999a0735fee5273771afe650b99c9468c41ba
SHA2560d39fc6206e7cf81c425648f0279f858428d51813214a77b2f9dace130601bf5
SHA512a6eef120dec09d7d71d58f1a30951f8b9d9494a562d2981b693f215a0ac34720e44398e23b7f1a02ae0d46f2958d979fe94ffe6698ddcab672023d8f12325285
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c49c65db4d4fb1f4376b7eef803fc54
SHA102ff3cf0551298da5430632926052534b913e31b
SHA256153879d2047ab98cc27685feea02b78b1dd76ac517d2f706bfb3869d859311f7
SHA51255e6a26fe632729ba2941fb7ca59713958e1583cbf92bb827cd3f9369e5ff76b4d8860b91e42643eed3c7a061d5e24ba9ecb1b0fec6b12bf1e98af394b1452f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53101a25dea2457b55ee70a6a2a6aaaa5
SHA1716877b3c075ff8f68b7916bdc5b0fbdbee8c023
SHA2566bdc96ebb578986e56f7497deccb63240c10b2ef2cb04e0aa6e02f7366423600
SHA5124ecfcc3d5d8b9f9809f041d4ed1e51242fb626b3b8d42aafd397f21f4554e7ebe985315515e138649a723e0055221e10abf6767b0b92bbf065607094b24894d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513eccbcda6f501d89afb78718bc2b6a5
SHA1dd75dbcd609eb7a8c24b09c746a270b00d3fccf4
SHA2560c5a73e807d83f1b8271e31f61c3c3045075f91ebbe43d94508d16818307ab33
SHA512af77164320e8eb0328e9aaaf72610ce51584b91b6f8c7d85dbe751cde2c73e741a75325d4df39864bfdf6b9b478cae3056a494377268194631389fe5cfa69613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0bc81c75db889df8a112f4f6a31ceee
SHA17b6472a457c339d3ac4c1809896fa503922acb0c
SHA2564a446820141665f5aa5e84e82a6d253c59d9526caf3ddea6354367a9856693f3
SHA51216555e3e8363e9c1b390f06da25e3609ab8c5f70cce30216d7a84edbcf552e3bc1f3eeb9af625555384a6c7c2c60e37eeac3a8c603db98d10409996e56e9b832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5204e77486603a5f72d709318dcab2514
SHA1694672430854ff780ec97d12fa52385b7e2c49cc
SHA256796a12e4083547189a3e55bbb29d6211b96cf41e8892982614880f09c00e1769
SHA51214816ece5b4ddd127080efbd167cf8ad1584d173182f6c2054f7a8fe6620191619a561685ba39d3aa5abb5382d57e91aac3790b42eaa653e1cdd81d92b21320e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5378e93a5b82e44803cc6423db40e86d1
SHA1cc61b8029c858429454f684ec19327c4a19b5b72
SHA256f3280ef19ff8ff5b6e00055c31104b22dda33f5660b822d23f76ecd602c2bd7f
SHA512ed6df7035d77a93eac9a55016ba74aee4ce5cf20a87325d302cace5482fe0d657560ed03de8a6a4cd501b64bfcb02b1c2b3108efbe67599fa3806a55e6168739
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57811f5ab324f94352eef3bdfcbfcd179
SHA165b9c3e6d0e1e9993a89ed4eb4c83b25a16c1136
SHA25644d88ccf6d608273eac50661a6522d6c94d9965f1311bb322e98b6bc179c03b7
SHA5129b72bc705af0f47594920a4edc183fcdbc4ca85a8a3657e0773aa367bce17b3ef5f4356e08095c6878702e6146c44974ab4d1249692156a399e71422acd2c29f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571aed39f5837b6d14dd104349a95249c
SHA1d330079fc269e38f01cc285eb35e7b22a734d8ae
SHA2560851ed1c5e9ebd909488fca519f0d66ddbda0eb9915e51a29d35041d4e3c0721
SHA512a4ed039ff24e34c0304dcbb6bde9fd1ad6e6e68be32a6c7ec998ad6d726348c93154da3e104e3e02f51ecbf9414626cb959db4c417fdb2f825e8535b3ac12624
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b