Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 23:21
Static task
static1
Behavioral task
behavioral1
Sample
bfa4220b72bc9d0caea9de5c2b90bc3c_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bfa4220b72bc9d0caea9de5c2b90bc3c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bfa4220b72bc9d0caea9de5c2b90bc3c_JaffaCakes118.html
-
Size
462KB
-
MD5
bfa4220b72bc9d0caea9de5c2b90bc3c
-
SHA1
2370e17df61c5558181bd9b4cbe38368e1d1b6a0
-
SHA256
921068432acd0f3073d31a0e19e0294e9845c42acc3290ba6e222cacc8940377
-
SHA512
ae09cecdf3e6ea89f6b4f8337106d8f03eb916baa4afb7bda3e203e8bec035efa41a183c93fe04bf7e7d8af15ff1583da868d8b65f8c1651febdd3c2dcf88387
-
SSDEEP
6144:S4sMYod+X3oI+Y+sMYod+X3oI+YWsMYod+X3oI+YLsMYod+X3oI+YQ:z5d+X3a5d+X3m5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{99CC3E71-626F-11EF-8EE4-CE397B957442} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf710000000002000000000010660000000100002000000015e8f754feb1d24893bb991a5b1f7fa608fef283900b789476016cf1df7fddb7000000000e8000000002000020000000e41bc793c29cd7524802f8cd7b07faf40233a92bc0e6553ec24dcbefd99bbe8920000000b87fc131c19bc0d25f9c9ec551e9646de5a0d474c617885fb25707f602d1600b400000007106e1c0e2f0d0f0ebdf0ac92e8606cbb6f33ecedd674b38bf46213f35fd1d08388dc4976118e85e9da37ecfea2bfadb12d70668365357f3f7269d7a4dcfa657 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430703561" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50025a727cf6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 884 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 884 iexplore.exe 884 iexplore.exe 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 884 wrote to memory of 2396 884 iexplore.exe 30 PID 884 wrote to memory of 2396 884 iexplore.exe 30 PID 884 wrote to memory of 2396 884 iexplore.exe 30 PID 884 wrote to memory of 2396 884 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bfa4220b72bc9d0caea9de5c2b90bc3c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:884 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c8d0eccee8c369541fcfefbfeba105f
SHA1fc742ab68998918521f0213c74466eff3c136ba5
SHA25645f8c64fe11947a6b469e1a35d16185ebed5107d416b30ea17dc7870b93085ad
SHA512af47e728118ed2dbdf7a04d4329da277f3ed6e4d7e8063934a8dd77faef4bb4b804b1df59f8dcc99df02edc42917f17ea6b6196c4dc4d40e906a2764a11d10af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a5b543412b7876fe291ef4d91182abb
SHA12e14c91da671fad40a1efef6cbd4154c72563549
SHA256ff8842d8e85f0d09750bac01d496e77b1b0a833b3ce9603ef16b872e830e7af9
SHA512dff14a61ce647839d0d9f052aa258d404e0b6e9e4352b0d2fd5a3450d1b67fa972377764b6e9fb812f1a3dab68bc3d58a5640bb987d67bb2ff188abcc4e39a65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecaf2a37e3f7b490e96245af9150596c
SHA15c62548ef23c83a2908dc06c0817b832f72b170c
SHA256c3d854b4238dab231c6165a6851590645c30e7c35eabc917f108df02a544216d
SHA512b1acb0bee5dc44a1a661531559ce2529bcba9c478c0eb7ff9d68d7b71219ff43142c3d2644921c008d6f6ddc1bc12f0eec7e5e5f97c22ba48c352dffc561aa5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2d8b69a13aa2f868a30a7d5cb5768a1
SHA1485772ecd58e2f7061ac87951243742ae60a8710
SHA2564d1f0ba84432d586a86cef87e3fef3640bfb263dff58031e7eb7c602683b2fcf
SHA51279bd54829b8a5141e90e2e7a6b9da9e113738db4beca8ea5674d6d312610a3457ae28bfb25df101b8263f5040f1db4a0daf3db31fcc492ae13cf61e60d6fa6e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdd2aea5000b23ac84844b3e2eb5ec36
SHA168c42c6137c553654759066d423ff3775230d3c5
SHA2560683355eb49f52dc55f325369e744ad99672f606015e2cf91d069d64d7a86d62
SHA512f7d43d71ed4f2a66b35e60654787db4de3a7d4040087790f16d57619f91afc2428fb196296633233f113f140c3342247ff092bac12a81181cd7e2e17fb8210cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5350d37420af7434affc97b7381ed64a9
SHA17cb30268906f21006d075be4d4c3ea5914a6868f
SHA256eaf04d4e4e978f5326d8cbe638935cba8c6a091dabd19c96a2ffe34f511b0c4b
SHA512e69e267d5a5852b1f06a4e4567ffcb9c0d5fd9504ceb1a9ccb9d7d8c4f3a525db6e4de0dc787dec1563a15091e060639b8b06c4c6c98f2f73a7b69562531bd52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a389898e8c73024f8a4f3795c94091d1
SHA1fb4eea9d1d117bb57bb3d71788d910a2ef687848
SHA2569b9a3287daa1f45df324ea4cdf83ddd8af0b875975943089845f384b1fc37374
SHA512d094ebb48e0fe21793e1e268b0afb57ef4a4f51bbe0f4801cbe595214fa038769ebe53e131d90c50895873ff50443b3782b613dc59cb90f57da85085af8c6fa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554ed4bff07ca666155d157ac145c5c3d
SHA111a4c5e191fc8f891399c6621d51c53c81a9e835
SHA256ac6f40bd46060d6b6274676465f96f23a68367d864b627e4131880797bf6d012
SHA51240504a97c4026351e3b2e1634edf6c1ed5ab79f005fe20a39202131050b32d5683d9823b7a021e7ba8226ac27f275f3fcf95157c130a4c1b14e800fc5fd8cd35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f3f0929d19a75f274d621d148ffa160
SHA119ebd5c0dc8e32ac31f0a4bd6f929e4c96c72a9f
SHA25699fd63dc364c18af78d196b311487e94bc977fe4736f005818ac186bb61dfb3d
SHA512c412a265e7a01ab6c24118c8243a28c471f5a0854a55a1224552367d6a3c39d894526c9d7ad020659b18c959f26a69b825e21a33e312826520d7f0cf46939dec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4f880864117b8dc92f08830cfcdb70e
SHA1d69d7070ab063b3cbaab31a1e622972078776866
SHA25607d12b06dd8727cbe14b4e018985c1fa710ada398bba35eb576ed270da774f0a
SHA51273204766ba0f34626322ab721d5471a1b7f7d7fe94395b13b408976591c1c9bda30f8fd4229a2d6294264f34ea712d246ef42c3c91fa161a4cb92c3a40d5c593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553d19388aeb180ce8d07d36131ee65f1
SHA184c5decbf0c6507bd0c21d4faf94c408bea33940
SHA2567e4ec8c973088ed510608ba189134240015034f537fe23d9a0cf0cbb4168db45
SHA512fcdf53e89f8721b339c10ca2af7343debe676c6e713ba457c80e839c7d716aacba9cb0a7ad61e57e28cf0795fccda27323381bd2e26905ef95ee0f216e1683cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbf460d863bf6ae26cafbb0bf99841c2
SHA1e949d92b2d768fe045d791964be8d3ed97137e93
SHA256a73136c8c4660ddca837eedaa9d727a66580bc719298d29bc51d48cc3475f9ec
SHA512b1ecd3b9b90706ed53f745ad4b76789f8b7077a9167300387c1adc51929d49972262ce4d3aff146d6b1d41623166591cbe85aedcb23ff3654fb5b6f18dd88bdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc8bb41cec8a6aa157962a8395cbcaf8
SHA1241d4306c5d9f9515c1998d1c571378ed1b6d182
SHA256aca16a0d1315d09a142c1c24e32af66bb4e197e4fce0018c5ee5f398ecd20855
SHA512826a702604278f3b42aee06669674989d48695c623edcb3d1e97cbfc1156fbe938a6e67fc6b7aeeaaa097ab37ebd120aebdaa5e72253adb3aa3960e073d3f54f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dcfc14575d25a278fda62dbb2e68e83
SHA14ed85613b5410d999903f3f858b5eea128e11777
SHA25662927e48110c9e13053a2cccd913d43d9ea9c46d17864496e62e879974067f9d
SHA512c485e006e922340238158a4b0cf47a6387450c843233303cd126554449dd29458ba77148c7b8416db37b77646a987378391096dd61bfe386bccff216f6ea5c1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58238b4ee7d8500c15b9d875619a0543c
SHA123495618dd4f1a570f2b11085a6a842f0551d993
SHA256585a125003d1c6a285fdb03b63b608847157e233dba0dd7fc2f70dfb42d628d3
SHA512ca4c3eff594e599645bac1a7e9bc54d9e768a354426f477cf5cc00d6f58d31fffdfa687c3c5bbff2c4625dba643264b4e96bceceafe60e8ab2791dc1fa531e65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bb113241ed6a0c588b98900318fd189
SHA11c50deb4b56c31e899c3054ec09240f50c6dcbc8
SHA25609358899e38a487565c1e4a0f0515b33d8a1ef7cbedcbcc50d54c4b15fc7cd25
SHA512deb30e6a224ff11efcd88b70461a47aea9d9f0b79a1dfe291056bf320a7d28ebf74121117d3d29b6f4fe6e6450eb5bb76e60c8b564d07ecc0df626ee5b532e16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c2971430ab53fb519049019e01a5b60
SHA1b43d60bf0fbcef17d2bab8a07b3a79b5b9514d09
SHA256cc8391881ce006be8d962c7666fd777c48882f100745242066fab0eb9e2a2f90
SHA512086478c06548ca3cc3cc02831a39a3f11a5465eecad869967c1617593399f95059020533dcb19f2727fc738d724f52e50624e0b4da40f9f830c5dd576b9ed53d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539d48b55576232ea7be7a90da1913150
SHA12b616f25b5f04f31c896bce884bdd20d030de3be
SHA256b122d9c4fbb093571a59b75e8922420e630cb136e953083c58c993a14c07f3fb
SHA512194a0886ebcee1b0633057750a9d4ef32fa7a69492a092ee17c9a4f06e0deb38afd3cdab70366b3110a17d9f4983ba3fff98d13b82c35144f6283b3fa0778f3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5202ef0e8fca064540329444acc83b0c6
SHA1be2b5fc906c6afc62b6ce98b10fbd79d16725e4b
SHA256d1867d74b6eadb2be852074c0dba614c9f43e83bffc1bb9fb32a953e36e7e6a6
SHA5125ee0aec00c2c177e6464a8492f3f876a32b34247626b833c7124144fd09b86e346ad15684735d14e47beda59e21bf31fecd0b8f13eb72d7920ca9cb1967cd541
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b