Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 21:47
Static task
static1
Behavioral task
behavioral1
Sample
bf7ba0df3efad3ab1e89072229f957d1_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bf7ba0df3efad3ab1e89072229f957d1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bf7ba0df3efad3ab1e89072229f957d1_JaffaCakes118.html
-
Size
67KB
-
MD5
bf7ba0df3efad3ab1e89072229f957d1
-
SHA1
e94ed262bfb43d2a0360c8f537bea2be7f4118d6
-
SHA256
927b7d6e581c52086a2aed17d1ed9fd4daf1fbeafd5680142cf3456ba0aa457c
-
SHA512
0733e8b8cf5b2e602edab7f3d21622d5abf69b2eb4b54f36c82a1ac33d55073a3f2f18e2281af022d584cf9d9d5d4931bec2613a4f2b418fc1c4bfff4d26063f
-
SSDEEP
768:Ji4gcMiR3sI2PDDnX0g6ytj4oTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8s/k:JiLTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{882FBE11-6262-11EF-ADD5-E21FB89EE600} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430697948" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9008d75c6ff6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf710000000002000000000010660000000100002000000087c1733e342380df7a9aa508db885002a444bea7b9e28ff0e6104407607650a3000000000e80000000020000200000002675f1d8230030dbc75e40337c3ab2d0ec62a27fa5fbbd3d60d635c7522ea094200000006975ba46b56fcff1b25cf2bc330501b1a1e75dcbfc1e06bb6c7d7c18f4198dc5400000009ea3781bef721e0a60f5b16dbd2cbb5da70a924dd984993c1b347b3cd03da9887a5794380820aeafec792629746d043b521410ca93e81b8b26387c3f8dfc21fe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2604 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2604 iexplore.exe 2604 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2820 2604 iexplore.exe 30 PID 2604 wrote to memory of 2820 2604 iexplore.exe 30 PID 2604 wrote to memory of 2820 2604 iexplore.exe 30 PID 2604 wrote to memory of 2820 2604 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bf7ba0df3efad3ab1e89072229f957d1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2604 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aad6ecebd875d26867c79e66dccaad28
SHA1a458f4c494bfa940b7252e581310fba1916fd153
SHA2564e25fffd374ab7f96439eb06ffabba4439e7a58b3b4d7401924d7ba579c10ea0
SHA5125fa9e4ff61b3250213f25093cb85243d223e7c890075d2c5f41da190b02697f85707d84a5a929b660f66b908b9a34abee8291e9a8a3245193b5064f2a2d1acae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdc6bd99c635f4180dd5ae6027bb3a2c
SHA1741535144258a11a350bec93b7800afc27cb5fc8
SHA256ca36ead965bc17e0de0890be26b5c64554386e78c60d19b3f5e050d4a83ba17f
SHA512af666a585b5d6dccf42bf82fdda187e0936392b25e9decf10e541ee775a9f4f91e84ee41a185a7b8c2e477f72620f2534263260709b997f1c1a79dac508c5066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a013fe4ca6b183a06d2ecaa9166d90af
SHA19af2bd445a1d4538ab3e76de6d1cb896e1659dcd
SHA256e146d318b54f022442435d634c8bd248e9e2b38c3ba96817146ee66d9b662b5a
SHA51273289d19776fb59107c5a079f59eb46b80f7d0c131762ebf68b5cc4b5ab8dc8c139a84ea2daa165b3485c8edae5ed93b8df7f0db1d736cb6f95ebce5f0522a58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4e87f34494f28d4b047fe29c0d6d0f3
SHA1010295c3d6fbeedc45720e73c69b96d60d63aaae
SHA25600a51f4d6371a327c45e75c2032e7540257ebc87cafcb02b0d5cc18da4769890
SHA5127bbe176c1eef1801a376c48699064a76571d609849babb2a050116855ef526cb50b495d2247a606a57203fe0a7af4fda700ab5ad84ffe970f27be432271e6ca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fa23833e49981cfc2993203fc99f2af
SHA1eabe08afa440f6ba14ecc5162638a1adde4faeb5
SHA256095b6ee7d1135eca7ef05c239838190665ea2281c38ae7a3cc76191ed210543b
SHA512221e59522a01ffb7751675e799649e8d602a6ca6632abf0eec78d49829159a13afe2e77829da2b4b4e73d1a844094ee94e78a21d76c242fce7d4a78c7a0e6f1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516490f0c0ce249f59139c2c5fc43bdac
SHA173d3e04f2bb45728738572da9a46bc1c569f04c0
SHA2560625303eeb14ac44e006b8f67c54d3091e7503f9017cfb8c635cdf85d5ff3eb5
SHA512d2ed7791847be6fa7461c700f35fec922481647d771673204a6e5b5daa3f608d2bc6fac910425985aeb816e5efbe033b1fa6fd8c9062fb18aa2d686b010b2c2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c692edb5e396ccb2f09140f8ae49422
SHA127d48319aff752b11b427a1879f167807079e6d4
SHA25647de9317606e9f238aa095fed78c4d04817104ee707eaa2a3f9a2c745ea6ef13
SHA512a5a2f57f9dda3d58d2d9afdac8af2ddddd1e5087d4b69f21b71075f9974c1259535ee1cba2bf0e2f7456dfd8a62659f4c6eae2bdbfdaf789ea722ee062e31944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587d42abb161afb258f9726d922735dd9
SHA14f41d4a8e28abc58ea8e25dace9a37c897c57a9e
SHA256e5842bad9982b3af5c00c09efce6a7a8ecb4c02df7ce8473b245fead4418a7ec
SHA512e7603aa1c4b2e5456429504dcd912644bccd776e557e5e9b84d980ec4598eb5a1e90a56484774dccb2e1486bdedd0e80a6a84e75bcf4a2fb8a8386bd3dabeb5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dfe7dbd141dd125e85dc980dfc7781d
SHA17346b998bd6da115557bed0584d0efeeea904e72
SHA25666f86374abd64bbb30f94719f93ac7511abd631779ce6e7041034ed38b1b16f0
SHA512ec55bb308ac90f1344ea2929db05d006197f58378c0e0f59d7b48f51add9c57e4c27fba91ba1147de8bc8800133276fcff7ec29044b0abbe3ed6e3a8f7bf1c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd37214ee2d13f6bf7de70618f437f3a
SHA1b492ba091012e483176e60976859a310e500777f
SHA256b3e2cdcd4b5118898edc23fdb77d56f1017489649ec7c80eddf58813b7056fff
SHA512ee4c34afd9db52a0d25196780452a1f4e77887a7c4847a7bf3525539b1e74b99b654bdf1450f1d70d1a6a31cc44494933d78f8ff70285ce463fa758bfefa7290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559d34b466649d92acac66368d7105f47
SHA11f39543bce0d46da8c40de3dd80032de43db8e0c
SHA25667dac3747fbd135140f7de703cb842aa632e9c84ff47599d34e9666deba8da1c
SHA512f82e6c7d6171ef0c97d5615a29e0797912659990cdbb436a265ceb68551ebff58f2514c761c7a1e6c8c9c21a3f7d73ff619516bcfabf08a2ec60be4f3f297ba5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56064a6cf8fe364815103cbd59cd58475
SHA18fa3bb31f8a6b3b4890ba1823987717d66286fc0
SHA256609ca9f806d608683106e4a4cec6b7b493c6cfe33b14fbf38db1fb6b244958c9
SHA512511c86ae18ad6678c31326463435e6270979306c0b006d10a74a2c35b5eabd1fe2649641698e8c1aa24a069af00404cc3777edb48c9f46dfa063fd67a4cf2706
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5074c8b3b511cd6ed9be1ba6b5e28fdca
SHA190ea606d721e2111dc34517c209de4507492ece7
SHA256c281586dd2bded47b79331a7259b79d1792b546870bd43d44e2b925810e142d5
SHA5128aaa17d58df1385ea00852b965203cfc981336a98a8b389ec365bccad24d24eea37ed53844f4ee48a1b9ec7542c3dc5d8b32df9e86ce1b7542e2b663ec4ceee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558007f4ac7e5a62ff3a3f41f083856aa
SHA14e7305cbce2067e1d6ffbadc8e3b82e2ef71adde
SHA2569567e8c0af671e055c36c4b9a9c6d7ed3d61536e8068e492354a86ffdbedff64
SHA5124841d3f988fc11797a3e0c7aabee17cb18676dff832a33db1d3f318cae140d5cd4812fe0d6eec5904c1e4bfe6b80ccda4d1a96fd48c9c8e4d5ac6bbb199d427f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f28d576ab3f663080aa600a0dc3bda2
SHA11e0ac505b9442cd99865729a98ccd3b5ae058126
SHA25697a9d077d2a74a3ffdcf9ffa5889af813bd36eb9f8fb804d77e6baec9a6cc9d1
SHA512b63868bd0b693eebd0a38612e725cb1cbc7401100c4c44416605eff4e2e9ce1bb13d2f53d6f99d2d2e17b5470eeabf5fc2fdbd1847f6c08a7196bae3783606c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f720d7bf6c5a32fa59d094f6140d9a3
SHA16432ebcf276fb24dc8781659ca65f4ac1f4cf2fd
SHA2565f2bb782d194b54011fb4800873919d48ffd722a5a757b0f49ed477e2af2fff2
SHA512fdaa0baf5fcf698b9fc5f8a9f7604d54d3995fae1f30a5f77f6c5d475cf845620df3e4cad86855c896ca3014c0d7b2ca82f13e09777cca44fbf8820f19e6f4bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5296da0c9fe45abdb46acc6ae251b8960
SHA1fdac8eeb5ce0469d25d9c665d7fe0c9beb9bca69
SHA256c20217f8daaf7d733c5649479cb4c1b0d154c96cdb59b145efe059b4dc61a32b
SHA512236b75722b00d2f71f1531ef6359ed2f3829a8afee0ad98f890a4c3f12862bdfa1771e1754f242953ac3167802934750339fe2f9691a01c83e0bbc0312355f4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb1bbd7652d05bef8a70f2f28b412a12
SHA1ff5ddc167da40f58e7d49332bc4f7a04793ef3ba
SHA2566e12c327c229c58c44b37077e2b25f38515963d8d133f01534de942a20f73d13
SHA5124f90d9c60a9478d0e4cf74a04db9d4e671c7584563554440f07b05890822dc085464a3596a7cc3e9a294a81de44e4ea81b57fe562e72b6a4331f21eb7cdc0ed0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b