Analysis
-
max time kernel
119s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 23:09
Static task
static1
Behavioral task
behavioral1
Sample
bf9e97344e187b8674654138270a6e38_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bf9e97344e187b8674654138270a6e38_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bf9e97344e187b8674654138270a6e38_JaffaCakes118.html
-
Size
94KB
-
MD5
bf9e97344e187b8674654138270a6e38
-
SHA1
b2dd098a28945531ce8061e6ccf72163fc2727ed
-
SHA256
fcdcda8886d5ed080492a7a2665ebc8b41d0ac8d5004f16b364fc3c55a44597b
-
SHA512
6427b60b45256beea65b6ee9666789379bd3b73e0c27af7f58a790ef175553f9af0c25f0e656ffc157555cbbc5ac8cccc6444b9a6982c99cb01da8853c579db3
-
SSDEEP
1536:xPi5N4i405zT7WI82hhEjW1UVL3/m4ugjSKmA0VONrzm2R49p3X7amI0JgHFvtY5:Ni5N4i40FT7N82hhEjW4Lvm4ugzmdOdG
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000cd2581f2aad484f6403690aa4d9d7ca88647d82f8949925a2069fca75deb02c9000000000e800000000200002000000014e1bbd9d809909168fdffcc57bb84c53cb7ce6e27d5b49aa224dc53585bb68d20000000291ab7e6b78214ec68b32bae3a45dce14a5885703b5d20a2ba7f79614d3e2e0c4000000014384de135b25484e9fad74b9f460fd9623c11c215c4e6336fae89ba6bca83e2141d25f460497b18cafe38026b47720d84acd717932519fe771b2a629a669371 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E02C7531-626D-11EF-BB94-CE397B957442} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430702825" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000c7631a00f4aa4491bfd81d572bb6befad525dcaac4d3dc01d71e1b683d4d1aa5000000000e800000000200002000000098d025e507ab719ac4c80df128dbc50d7c10f329b80529e646f35ae3c4a85d3b9000000093f8bf596a193accd17db2fdb092bc57a9aadf29188dbafc6879f4596f28bb653d4a45021da36b661732297d3722ee72b12a690931a8fa2dfb4386880effec70754832b9e5731d769d7fdd86fb54b4c708c13ad7db6d9c54c143ecb495c68a957d65cf96a5f66072fab8e87d984a6a2a4bd8e19079d8b5b08e85bfaae27c9a121c1dfdfb4440d432f0e6949fea8ba67a400000000f6626740b80c74fba045a75405bf63060d893a5970170fe0dfc9b41952dd9254b5a4f24845f992c8f68ff9a258163da05b6a8b8bfaeec745ae9fa4ed5be5f3b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70f5b0b47af6da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2708 iexplore.exe 2708 iexplore.exe 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2760 2708 iexplore.exe 30 PID 2708 wrote to memory of 2760 2708 iexplore.exe 30 PID 2708 wrote to memory of 2760 2708 iexplore.exe 30 PID 2708 wrote to memory of 2760 2708 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bf9e97344e187b8674654138270a6e38_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2708 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e63c9f100ab0f0a34f16dee83421aaf4
SHA171bef8447530b5c01fcd8d18399b31a17fd218bf
SHA2561caad20c0949d113e4192c5808cfea7a010605293602b755173ddd6e5dd513e0
SHA51224ae67bbf485e51382c6a4e0680086de092a61ff48587aae1fb249505c330cbb5e80120b1ace6885b0ebc2e22bcf8a35ef33705708b3ec5d61ad8c314a6adb9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5731ac0f379a61d24088cfc48c144060c
SHA12bb7f6cb7cf8ce6fef8c2449eaf0f6ac5fabb141
SHA256b1b6a5ec9f39b81a7df9643227b8c0cffa73c2cb375e8d8c71c47bb17b963719
SHA512bda70a1db0406b8896695433f7486dad96efad6854a1faabb6b05d79a67d35f1640ce717edf55c8b4002a01b7fef45fe8a783bf5feb04c4a95a69919453ee128
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b5c67e951a9b57895ab0a5f1a941053
SHA16048dd43a9d865889318edec156f197ebc050235
SHA256d71d1263e8736824f07fa0f9a644ef33e755476564868a8ebdfc783b53cea67b
SHA5127c673f7908e5ec26f5eb826b5a8d095cbbb81955cf3f648706c468418d4250f60e173fa16d9524f6296e88e593a39a3a277fb754081a84cb3756d005243d4b6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8e3b75bbab00049622911f226fba5da
SHA10152e1ae6fb255591bdaf25b11f5d27b68b8ec17
SHA2568cadfd4466e9512522d6a51515e3b1b74367fbf7d7f3dd17b780f4a657a7f42b
SHA512fb5083fcd9d87f22a30e5c94d0c2d5c47cae2c655ecbf2565422294cbfb5b8ce9ab0d09d9c3b471dc0068f95968aba9c18b276851b4a2cad220c5809e709b668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58af260c459ed25d81e9cb7b5d5b3bdc5
SHA1e10fe93027b235aff8bb99902e560b00cfc57294
SHA25601faddb1ef3bfae7810178c3e3661a44d2762b81bdf2b9bff653329a3f43e7c1
SHA51289535bf8b9fb92ca9ac513ab243476bc8104baad3bd5a6210b3634e3a552be22fadb344faebd0493b3fe5ca779a045481f2a999c953b3c9c10a69742d7305118
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e621d8f8e3f5b5a0f20454e6f33d0a65
SHA133333a7e1efcf37745ea87c59106f28a8734e306
SHA25697006a41eb2d81022278178048675b5a38ab971b4f176e4935ca7331214a4e64
SHA512e6b2b146321861f11d5f118cd34eb17b045ad8b04cfd94051cdf014dc2bb70a974cf71c14a4e25af376de559207a75f48ef366164e771487d02d6bd9c8cc8ba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f163d126328e629eccd03ad2390b4cda
SHA1602d03bc12ab7157ebbcc0b7d5fe61a948b69a93
SHA256d7bd81cf2e5ad4811225e5e573ff201b6149807fabfe365282213f8445d0bb2e
SHA512b1bea6f2343154ad0adc0d8c56a92144cba7fe7435ad4c6485950d45e6e356c96c92c39599541be65ab392018aee5b9e62c463306d73094498b0a5368e592fae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59920acf34e8927d5d65d35c645d0f7cf
SHA14582424dd20dd3f53ad338d75e47322bbd2452d0
SHA2568bf265fc9f09a5369d64e1fc8ec6fc415f696acd736a0642dd77b38c0390f524
SHA5124342b0e54f3fbcf582709e220c6496026a10e2f77f4bedee8f90bd34232928a735f2155fbfda040d825bbda42d03303de8a13d7585c0f6b59f31c4ff39b10523
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ef80c88d84527db04e8d2d4853cda9b
SHA166a01befd084de618f8e758ccf68035fc5af343e
SHA256a4f8a69d5158efcd5299da883689dc8adb5adf61179b0211c4c2f5bf347b0b7f
SHA51205b3a04515ef102a530d97f97b6d2b41a50ee5274e59a2558a365224994835214a0069e689ee1dfa4cf660b0612c365397397c18a05dff252284e332e7f42fd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af57870e39c665bd6af03441d55e415c
SHA1bc1b2ca39bea20f072a9e893113c903d472d7176
SHA256ba79ab2dfeead093ecc3fa13808c3ac1936add3d65bb53bf6fedad313a4b5c6c
SHA5124521fdf04cd044849e288bca2c04fdafdeeed561effbe32fdce283ce85d8ad75137f4f1957f3e5dcd2d33ffe90e02cc0872286559a317d214933365035b91d78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e39966172d473282948b23b43e5ad56
SHA136a5b8944c412ed766f865cc4a5864c8cc17b1a6
SHA256fd1ca4b191973324475870781347843fa1e855c4421197a62b6227b1d3300dca
SHA512208a8a83eca06dfc1eaaadc0fdf5af9ef7a2b5fabf694745c57e51b0a2227d6816da14de09cd123dccf298ac26a06ace27851db83def6c062e201b272a2d256f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d5f5159a064b751ac4fe58ff2d48bbd
SHA192b659cc96f34b4ac04ece1afc42d196898cd18a
SHA256fbf88e8135951f61cad9f24b4a34d7a5192506cad4106f55f4a188fd3bfac5c1
SHA512c56b23163f7ff3a786eadc25e6ef53acbe861d27080c14245bbf266481c768e1e47b26776cd3e73bb2874d1b40e9c441ebb7bd66b3ca6eff23ecd35df02e347c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e011b070a2b1e913e640b4e0da6e807e
SHA11e567fb92ec71c6d1f422b0701ce6b5e60a23f34
SHA256609dc412df713b107a6fc7299005c64ace2a7990dae0b6d3de61f2c924b0cf7b
SHA512aa1d2bfdb71df11e74dcd6491f9ab77b7124583bc98536583848b306d4fe20f316b43ebbcdcc6aa531dcd634b47d53567f4c74d0d4c72bf168038489211f4f19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56be433dd35f183d6ab3f29f04f79d833
SHA14ed81d132cf13e700b9467cc2f094b5c86a9cb7d
SHA256b3f8118cf054f4dec11ab4ce93079d4e6b94a68c6e253ace41774039cb9262b3
SHA5120cfab29ae2c4c5010b45e299549de08f783a5c9d9754a9381dfbfc03cbf8463af7f6122b5dd5839f0244e53a56ce13de00268d21fae350dfea87abefd78791f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a51ff0a15b4f2cd473d5b737c7b9e8b6
SHA16f40bffa8bb1130e36b974d0d8198a98cd9e8821
SHA256a48d870c253dd72e559296471ac2a779ebe0b8b625efd296e42685d17ed8044f
SHA512e5ee03d869faa5c6d24a31aff1b941a06694167921aaaf7793ba005d7fd5edae8ef152080ed056325767f3347d2213a87771a343a5d3b3ca203fb1855de443b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575afd55fb81e017ce0871feffff80c91
SHA1580ae423ac7ab91dd2fffc3cb69a49a22d2ce028
SHA256e0d3dad51046ca8e767e7bbb5bbb606f1e2ccad0fa20221b6b3b62d576cb20b8
SHA512e6e89cf73d8ae7ba33dbb1febb292b0769876b682fd8a592a9598cef967e60eac3f16a9179e7e358de62da077f89bb367bbf86755b1fa886a70234381de4fd57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525f219e4b75fb179ea70b42fada60bbc
SHA10638282f4aef46c8d40097112b3e516fa3f28762
SHA256b595bcf471cb059181191481f8bfa95646bb865e37734992c74fb508c2f7455f
SHA512f2ef6a715a4d4bd1d78be4c7d31b60f5c5486718cc94c90ceca0dae82276d8564cb7420d8a11146ca1f2b4728fd9e40176d24cb9ded9006f03d2e57dfa05cc49
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b