Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 21:31
Static task
static1
Behavioral task
behavioral1
Sample
bf745e66214b3fc43c09e9f05e125961_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bf745e66214b3fc43c09e9f05e125961_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bf745e66214b3fc43c09e9f05e125961_JaffaCakes118.html
-
Size
15KB
-
MD5
bf745e66214b3fc43c09e9f05e125961
-
SHA1
fd8b64138666b8a5ca2590cc3bc9613bf05772a0
-
SHA256
16715ce769b0bfc44bec7e76a2a8dad69d969766398ead08d308766391677058
-
SHA512
024ca830e01c76d4058154c27b907c56a83fa98b59411ec4714d1511bc3e5682422af4422bc249b886704b9a4a12d0027818b1fed36957a55610e30ea885f703
-
SSDEEP
192:AqTlkxQRbfgCzvaDc/fnFU6dbZicPHKstl5G/2q83Dm/37CjQsM:AqBkxOYYvWc/fWOT/o/Z8q/37P
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000007f7aa1d1308ff4824214506faa3172fa664eb0adb70a92a46b197015a38b6f3000000000e8000000002000020000000e7839a415252eac5feaf80ec74faf9fab3c7a9ec27aafb22b7285ee46f9d232420000000d1b2922c0e5e28260f88bc1923d07e76384da652a07330e85dd1342a9bcc751a40000000fa5dab7160df9f280ca9143803cbc99ea5f87852614cfa37cd38d3ad4729d94d5128e9b6d32b3f46c42be0c1e5de86ce7c1bcdfcb521ab5eb03085be564f7e3d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430696963" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 706cab1e6df6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3D14F9B1-6260-11EF-9816-E6BB832D1259} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2684 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2684 iexplore.exe 2684 iexplore.exe 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2288 2684 iexplore.exe 30 PID 2684 wrote to memory of 2288 2684 iexplore.exe 30 PID 2684 wrote to memory of 2288 2684 iexplore.exe 30 PID 2684 wrote to memory of 2288 2684 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bf745e66214b3fc43c09e9f05e125961_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2684 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fea0854a448cd68b0520944af460fd11
SHA1a65ab10bdb08372324b15ca39900fd6d8c28e5f6
SHA2565a97fa0caae8831aadbe69c99134941c2a148aeb96eb6a3f1345ea34e69ef540
SHA5124bf5ff9e9ac641e3a2973dd491293262523c8b3caa49446ddd37a50deb45b2fece0d46116ccbde25689bc9b767de8384abf3f1e0a8efc3b6b33f3455eab7bd5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524b2cf632e28abc88ee2140fc9c95af0
SHA142a07ffa61312491a7dc939a08da8aa933176017
SHA256eadf5a72c89d98f9e91de822cf747fec1f3468fb46bf30d4088471fc96b9ba99
SHA512964860b7e1e72172c42f5f45de1a3e0c480c36e22ae554122977c4d2458bd745437f3613aff717c062a0be83e6c1527d7cb88d06f17dbb2a6e914cb6bf28bb0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545e7db46a7e41c65470b8be8c150fe27
SHA106ddeee009cf9263b6f3a8a5a2f859f46a0f1e26
SHA256e1f672df4f9075aa20025284e3cea90a232729973f15c1618ac46be0a7de26dc
SHA51211562e3492cbb2beb646216e09fafe8b3a1084ddba3d296f239e973906fc1a097cdc51e0f2ad50f60000e706f3d5af571addff4bd17f3643abedcdd1136f945f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56df441907ee934bb172017caf4fd142b
SHA1b678d149bda54f1d5cf99c3af252d3c8fe3341c7
SHA256ff0cb0e7a4506f10c658418ba02dcb7573b723508393bb3944ec7e76e13b38d0
SHA5122c3c2420069150bdb0b5e7577806c1bb1a69b0840f9ca7e18fed2f7090c76566cb98794f1039c542d6ff30363272cd252d71fa3c2ebcd62d3c7f0018487bc198
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b42ba60b536fcdbf2a2065f86d5b2a95
SHA199475991417c08bbbdda3ddf8ce17844eadcdfa3
SHA256d05091b61aee441c2f08506bd24bfc9c0560b3f456cb16c35cd5371d0a258acf
SHA512d3c2d362354f8fa99c078e90debc68edfc9b864a48dd5dc2311ab6de7164757db38c61786d825b3ca140d5e1fe4a5f7c4e850769122833925beb48e3fe45b78b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5919c0286a7d38fb4604bf711f6d7c8fb
SHA1834e58c5565aec9b52abca99b1f21560b756b254
SHA2568681d36b31933e537844a889d6af6a0d5a18ddaf3e33703689bc10e499bcf89e
SHA5128d745567fceeeacc4d8f04eac51817c7e4860a7657343fd1182eb4677489d53624c21f964f83342cb35c740515a266546213daaff02a1aa9503c28accbd0b7bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a787b489688c84de56db39c6a5ef4ba9
SHA1348db297df05f4d9dce1f4b059ad0e527212d32e
SHA256598b148104fb77666f1a2aad4228f54ed813935940f694b0976cdca73e0e2f2f
SHA512d752ff2e9719122b6bdf0d101fd04236fe4b0603198de269f533e52b888c8a8a6adad77d09481d6f5fea8ad2ad941f6b95e367e837b036e4f87fc038eab375d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5187d43f1b5d427b299ac65281c5ceb7e
SHA1b17efd089ef2ab9b550d1cbe8502daafa2965449
SHA2562a683058e8033d3f426d8ed6b623249d29701ef64b2555fa2636f6aaeb1217e1
SHA51242eb0a4bab395886b215337dd299d874e6c9eec0fa39354d5aad6a8cdfcee084ee6f06820cb7bd4636eae0d66b162b367c4942b6b6ea562190da733582d0d1f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c919b730034eb04bfe6a57c48e33a4f
SHA1f9ca2da9c6218ce338f86dc7e03f78f7d04ea415
SHA2567efc7286bbb57046367841da5cd620d46fa27711852a948ecd96f5df58f80237
SHA512b33afccd9837b4304cf20e0dca9c49c1965ea90733a98bc68dcbac4f94eec5514bd4d9cc96c4cc46541d20515f10dc15083d9d70e81b74146153621602ee39a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d77637115d65707df6bddbf160ce0fd
SHA15ebcd3e14c7eac22c3d3e5aec29350c1753d4d55
SHA2563c8deb3fd28ac8d56a74c4ee05a7a6c4516a73317479a19c0741cff1cb5d43e8
SHA512c2f98789c38d8b383664be3f998a8dbf0e54b9959dcec27d8b6bac74a6762560cc6a1cb3a425a248a119cffa0a7655d8efa001eb65f3406b5666ed9aa76734cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5289c85ead8a07277cc56b8c009ba6c81
SHA1d467ab5aae234916acf2f2829e6ad0a91be29e6a
SHA256c445c7fc47bf3aa220351682dd704e92b5a4b4ec385663f3a94f8cdea887c5d7
SHA51251f5a7f49afffd829c6138c430271067cf3d80a4423c5b3892a23cf4c2fa0bd4a714393e3646b6948d09432d4bfe28896f307651b432d056072398a702f68719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff6dd4ba269e1d35cce697987093d95b
SHA1c8b4b928be0796f411c4b7ba0dd219973666a008
SHA2566222dabdfb72867a0af2a0458f71066fcce03d66ab6095b0bb8a0e62a1ca90d6
SHA5129ee85eac3d47799c626c034b90766f281177cfeb55ca704bb6cbaf406903f30bc86e41bcd0304160ee612ffd0af27ecbb3e28d107ce66ce2713b2636e8897546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ba12ffcf3db53271152fb3ca32ecdc2
SHA17be7829a96b007d8782dc5902cd7016578fe6551
SHA256e6bb78cdde8ecbee6dff36b9768827c120ffcd79f796cf93207013272214ea1d
SHA512b75e0789228e0980d2839b002416aec86978a5fe7c8a7cf4be0c34a8e869b3335c892f7f4d2cd3c8d3b0cefe92a9bc11dc27f331a3e77420692a3537f989c49d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceb516de819c2ca9779555818ad04864
SHA17aeb07a5624e72a33b046d3677df4dba0e245de2
SHA256489e64444cddfe13b83d50deb3f57f24b166cf2c6ea1282f46888142be9d1a14
SHA5125e4202ee64076abd0e4b9f5f946b55831b698edb34a7bf4b382ee0ecf2b015264fd7f446f27da6900a06dd0afbaff5bcf02aa1ec33f12f4c41f75ded11b5be3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51abba40ce70c346dc5b241debda36a99
SHA103d3050b38f0008ad1e44687b23ea97c271b570d
SHA25654572877a8692552fb20b692f3ae418385df09dda06575f432b483671f693752
SHA512928f8f7bd60fad7e35621fec060325aac17373060649a8f37ef2e3dbe216e1f0613445b3cf768cd7c119639fe1f044b84b3d12c98a3f1f7b9a4e9d51600f686a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565c576b3484e703245156e87b3b5a5a4
SHA1cf5e3c5cad16c6cc2e5e6564b24a5c423db29770
SHA25669fed42d54d32875c54af5b0a14a598047d46816b0b5d76d1b14443e3ff066b8
SHA5126457de6472196d4eecc6f8cd94f41821b41e4b888b34386dc8eaf4ed97b2a8651b69f0e8826038fabab38e1ce25627abcfaa0763283a895d1e0a225a8dcfd2a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fae65109b6c91a72fac5cd953f99b01b
SHA1b82d82142d4b769d4820d951e792f4e7cb932b09
SHA25626338845d2803a513c2978e8ec9548619a74038628ae70535c4a9e00ddc71509
SHA51278f6038314eb87cd89dc6440eb3e546e39e973f55ebd56f67e093c13ae65434408428dc5581bcf7d5081c7d6cce0be43d991cc46ea7b2626f236a286f84e5866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffb1128d264d7bdf488f4ee893d74b6c
SHA1e250a0b4fcb1fe6a1f6c8a303061de584590ad36
SHA256a92010a75dc46a569b06a76770081c5234248810758f5eba98f4f9e56989bcb3
SHA512ae12b5e0d2169f2fe47efb4d4cf35fbc13fc991ebf2e3b511ebd64d2686df42fc8b65e947fce376cdbeecb39126e1286edd2cb811cb0229eb1568b25e550df95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b15afe6150334d725b4f22d45fa2105
SHA1044683117ac3b274b17caca7522dcaa9d0c94350
SHA2569140ea818d4df424017e6f89bbe8be16b7386f4ac23102e7901798e999d40134
SHA512345f25a41d98a964c6e49d6c6d637b3ebdfbbe4b223e98f65a4d46de72ed8d5fc6c8d88e8958d658c30e0e81bc59e8608ed8b49d3a6983948333151b01840c37
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b