Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 00:04
Static task
static1
Behavioral task
behavioral1
Sample
bd9e2d771ebbd6363f13c25393bcf5fc_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bd9e2d771ebbd6363f13c25393bcf5fc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bd9e2d771ebbd6363f13c25393bcf5fc_JaffaCakes118.html
-
Size
61KB
-
MD5
bd9e2d771ebbd6363f13c25393bcf5fc
-
SHA1
be7686a1900060360339d2f67d1811863862d986
-
SHA256
90c85850dea196a8c4a87d2f0c32f51647710ea2de9d2b99fe9fc9dab752b007
-
SHA512
de0b3d5de335a3ec2def15da1b89a2f37d8f5a0626205221555f78986787a89bebd2e41185fb63e9abf21e5ff90054319b5d3cf6fa070997f0ce0464be4704aa
-
SSDEEP
1536:8yd+OD9kXcBrO6XQrOBCZrgZ49/II/IE/bqCbfikggav/:L
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7686A721-61AC-11EF-86A3-DA2B18D38280} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000040c5c91bcd4c86f62f17333b7354519dfc68ca8fcd36faf4279f2ff0a69d8a0000000000e8000000002000020000000f7d597f9d1c8b9fa744cf86453637aeca69c6157edeae34413b1528de1bb47db20000000857699644674fc62dbc3a9aca4632756dbfe48af95e83db1277395174afe361d400000000c63efa070f92d6b9a578a09fd9fd78ab8388f5a22e09e3db6a4e7dc89915092dbaf78868b19b99513737753c1296146ab09110617d1364988d94e8d71c6ca2c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0ed044bb9f5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430619750" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE 1676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 1676 2420 iexplore.exe 30 PID 2420 wrote to memory of 1676 2420 iexplore.exe 30 PID 2420 wrote to memory of 1676 2420 iexplore.exe 30 PID 2420 wrote to memory of 1676 2420 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bd9e2d771ebbd6363f13c25393bcf5fc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52e2a2395ab4f284ce7b11c747776f782
SHA1daf1bd8e521130daed7e43043c3d34a3e84de488
SHA256a28f7edf385025adb4a24cb15424df5bfa1ee63dbbe138a7ad05aa86222b64fb
SHA5125585ec92d867ead25b3a21f9a13e93d07498b2e8fedaf48351c7f4514088b597edded769299f7c20d7875b8121bbf7b97dc10cef0d2f2947e316ceb5e121128f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d37cb774c95205555e57811a0b498695
SHA15cc147c16d78b0b9038fbf3a938e6fbbe587556a
SHA256b70b7e5c23d45609e3b9f2d49703829e1f9689773d21e858c4a3187a69d97876
SHA512f997c9a1d55167d96b865123c80e78b0d398c1a351fb7f0ee41bbca93eb4edd982f3ed1ec5235db8967623197243b9063416c7e569ad13b1c93c5dd1af08abee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD510208259aa0a8bed7461085ab051b4ec
SHA1b058fbcfa7992400923ec369d52a43ac0c9296ee
SHA256794031248a9fbfe60cfeb13a9e76fc0d128c7410aa4a56f7a26098ec3770e736
SHA512c785e49fc34761a4d5aa3790d02bb45cd106df1c40ad1a54fdec2f540278292de5849ec2b059247ad37534331da359d36752f199ab9fe60a98b00212101e3f1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5985dc75e51ad05d9781d076c254cdf1c
SHA1687dfef58ec2e82e430c88226f4bdda74ac6384a
SHA256333eadb20f15f2d50d7f1eb44e7caa3e3cfa4ed43e2c3e2d2d313d9db065e0c6
SHA5120fa101ae8a32cd1d201f08cb756dcba8b851fc855545d2349ba25d25435106003a9531792d98664c8677c43db7f79634268bbede3145ca3cd849361278ac62d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5987d0432f53ddf4dae06ab86d5aa482d
SHA11eb3897751ff006d9f3b0fd439565b2957398c28
SHA256b144ada3a698832fb912e2a55546b11f5589ea30445a59d42ba9755c11f2da42
SHA512701e6dc6d080844a0ea1c488c4d3ae5dc3aea4e3304056626f81417ee8c20e9ed08adcc86fb52f51a9dd84277e2a4447cc3012a1bfcc80d4e14f0cba6b3c76a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50771da5717648e5fdad4c7db890a208b
SHA1b0dd45956ded1171d027a708a4094e145771664b
SHA2566bbdb89af9e15abc7e3eb35c059695724daa7f63df89d592dd8ad09b631d04bc
SHA512a560e40a3044ff05f86b30379fac6a2d1f6762444bd5558443068f23158d4c2f26e3f87c9239d92f626baeb6df7113ee3a3e0acfd2c78fc9323d3e8c82658c5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c7bd1c6c6dddd3922c8ef441d71351b2
SHA1ca89667c000571d21ce46e42757d68caca24d63c
SHA256de8b287ea722622ba018a8ec072156ec5522ea74b87c440198248cb3642d3d36
SHA512443ec6b973ead7de1b0eb95606bd4004a658cef4a473993786870d03c27588536aaeb59dbc9f0e730186ede0547e421de40193842336833045d72c81e330a14e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5be42c8938f4253485a4d87551617b2b5
SHA12474b3aaf5515071977cacd014336927faa059f6
SHA256025844f99f3616bf78144d0eb3ab53a664474f02d519a7945f7c6765014d58cf
SHA5125eff83669c8782e4ff41305bd0bbafd12011abd4adfbda3725bb0df041ff67bf53cbf85803d7a984b734fc7a2fadd211fb548f869e847bb4726b439a834f2104
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5df6d1e356a99317d6d4c72436b70a982
SHA12f92731c5dbe48c212c84a0d7c3a2d803d9aad61
SHA256423aea15897585af6982349f8e6acf2c68a739e24d4509023e0364bbbe1c2d69
SHA512467505dc67a2f357465e747828b4f45f42428808785095df3df9d961bb7d8b74ba0b43931df337c927fd0e7c39c372af13bfd7520c9c6d5974e2784b76da3cdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bc8d70fb72ae145760180e5208fd70d6
SHA19169a9270f67e4a6a4954a4a4ecf6a69d75037f4
SHA256fb67595462f3a36b7f4ec0ee96be4c8461242b98dcfb297768a48cc45e49a1c2
SHA5128688304d9ce20aa45c5f691b3da3ac3bcd3e03f87a9eeb985d06a5180bfa674087dbcd8e44aac0c1425a7b497789fbb2479f6463b960ef395f69d98fd85632d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b30cf0a433b9a80ec9fbbd2480a85757
SHA14fbbaca7e6887de5b3caf92ba3885f1894d6c13b
SHA256fc26828c953c17ba3ca6cc1c0eaf1bd94d8e237ea5b56a2631d087113f3777e2
SHA512c4ee95921eb58ef55732b4407b74a657677b63548d04f97906a929a806af8b9dcb71503a9b5add28c5e9c1d638677a7cfe786706c76eb24e40e763ff23602406
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5baeb408a69731aae7c4c8e163d944198
SHA13ccdc36b541f337a0778b149b4daca2dd3d09fa5
SHA2561f8269f014206289ebed59c2437d7197302957fb5c6cb68bac42466f3f81ab01
SHA512d4db67fd73075816eb4e67d2131998a0d69e7655052bab11df8b0b0954d50a2fbbabd51d0fade609134918b571c52f21c8e4657728dc3398d981171328bb3257
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c8c93c27e6a033e13fe2745316ab45cd
SHA15d11ae0b945021c91b7188f7133cb9765fe7b2ea
SHA256546be3c6690281127e5a79d55ccaa3d6ac45a04a78678b1d66798c532ffe087d
SHA51259d002dd708dc6c24477fd1955141891f1d76cd9d5ec62fd1a5c8c57515fc6de156fbc59a725ac8325ea776fa5582f7cb776705f0d742426579bb5a5616f15ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52041b3e38521470a4f6fe7c03122aff2
SHA10fdd05caa6a5fc99044372b139eab6509ab42a46
SHA25669138b3a2966f877165971cb4d0b833e2e489ba4d5cb1472dceee7868c530bca
SHA5122d41ac0d2b511e3bf11e654399362f0cce07611b3d0e8dedc8c43ecd6347106fea1bd4149e4c761f7c32f965f345de70ef7adc68ad7dc4884a859a95eed55915
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5175196aff59b33252c4a3fbdd234f19c
SHA19c9d2d500e1d855b5b0b7374c61e22174edcbf15
SHA25633368b5a794adbc37af6f530747ac093a73a876158f3477df5b7933eadf56b10
SHA51267f815fc22d1452136425bb6dd412039fff5716dd1c8cff496fc14e08b50bdde5c7eb030f7542cb15d7a1934bdef0c4dc162aa8e4201bbae996e5fa1f3c56856
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD592cb4677cd03e8950e2262574cee6c82
SHA16b9cf2df37733205bc5e8a86311fdc053e09e676
SHA256c391f3238f2eafbdb4c5759146526d3c270fde479e3eda54402d9aa275e4a6f3
SHA512b20a7cf42133faed4bcb47ef35a8352d647adf1682e6223764d1cc603431bcceeaef044d24110487364b9012a16c5b9f84d19839d7896f21380c7780718076d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56c66ffee9a74835106b901e19ca7c928
SHA1fbf37d5252d90ce1306119b14fa1e4c3bff91c92
SHA2560bd5e389d2e8d3337c93f54c9a71f23fa8c5c507577131d8ab18feb9c3f29591
SHA512fa231ef3fabbf3a75d5d481d99f782cf18491820938956b2cd000eefca2e44748a8259fcecd3dae5e858eeb3837b6382455191562cd1a39c245563776971267c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5720fe341730b041514d82980d3d5f609
SHA1fd88b7dc736171aed2cffcd3cf9e77236533be5a
SHA256b9ddd3e98f2a5874c8e6fa1d5a59cd66053702bcf77d712d9f60ca4d4d0309f9
SHA512a59659bcf75f5dacc2dd6681f9dc7d046127bed11eba5fb8f49d2f98ad079474890433faa2122fac7eef3f7eb485be0a5f6747c4c6294833408277045f9d71a0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b