Analysis
-
max time kernel
139s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 00:22
Static task
static1
Behavioral task
behavioral1
Sample
bda47ec68c1e0a5c44c87d1cbe58e3f4_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bda47ec68c1e0a5c44c87d1cbe58e3f4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bda47ec68c1e0a5c44c87d1cbe58e3f4_JaffaCakes118.html
-
Size
154KB
-
MD5
bda47ec68c1e0a5c44c87d1cbe58e3f4
-
SHA1
4b72251199acc60eb200c8ef271e70549cf5bbf2
-
SHA256
fa4ddfabe07e0b17f50e15f19adfbf75c8ccad301e45b1b47a570b9ce711ff16
-
SHA512
d60a93a364170de8f21f715373c22e9c73733f84d49dfdbbcd19638058efcf5299b2ef5bab456a5dfda1dff20ba4a9323ca8c0de186d19e39cca85006be09490
-
SSDEEP
1536:SKJUoVDnCgIclJ9pvK0ayLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wee:SKDT1xwyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430620800" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E867DF61-61AE-11EF-9D6F-6AF53BBB81F8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0040b6fdbbf5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000f77eba1cf0a38ec7e8694f82e4ca52906a1278021843963f5b7e1a1962f5d945000000000e8000000002000020000000917d5d93dfc94ed1a241cdd7832ba5c8e58db4bdbae19b7e828519bd314f873d2000000053ec8ef43105bcc3a84a245f1a2a22d01b19a746cacd5c41f8aae98569017931400000009e17b07e9508abc8fc4dd1c5d7cd9500ae531f2a6d02a64bac2c5056e250c5b08e39051306d1808fdd09da589cbb78143682421cc8fd19a8a1f83fe98a7f38f8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2460 iexplore.exe 2460 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2460 wrote to memory of 3068 2460 iexplore.exe 30 PID 2460 wrote to memory of 3068 2460 iexplore.exe 30 PID 2460 wrote to memory of 3068 2460 iexplore.exe 30 PID 2460 wrote to memory of 3068 2460 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bda47ec68c1e0a5c44c87d1cbe58e3f4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a132aa6fd8ecae1c0dfe894fe6d4361
SHA18a833687c8aef63d8004e5dededc86e53ba5fc3d
SHA2566a535e0ecea3050b93bef91c185ab8159e1aa4ddd880c4f3066cf29dc46dfb60
SHA512e0c2e8f7a0185f12f52d511e91e21bbcee6b0f5f1a3a8f818221284c996237195385672e29cc53963eca6cad1e5ab4c9f4d7f17e1719b8a820221ad592ceeb78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57494e58b499a82212464afb16f59ca29
SHA1d3ba7e9c4b600a4da2ae3f96bd25005784b5f153
SHA25693733ab097d8a763a109263622d10b50240d1857e5e5794dcea8518d0a26ce98
SHA5127cdd8af349cb0d9f78b6c69c1b6e3e3cbf4d7a372182787c1db8970bb0c8c4a0fad4c861f5ddb02d2aaafd5061177344221d6cc63f8966a6691149a17c5e0998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516a4a380dc21e74899c44772fbf79bd9
SHA1fbad990e8645d4d898c0960cf10e391254b8d43a
SHA256c8b8de007a91fc70e44784dda371ea75265a852d39dca6a18cb1292d3b1a1783
SHA5125d52e23581fdc6dcb774495c69331cbb248f9bcd3ab153e638eb3ae2bfadcea1cab876bcf5e6bfc3f8a39056196e1d21ce404144465c54f21d310ff94cf6e0e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0927462ed9da9326fab83b3b11d7bcb
SHA1a0d7b263b654b5bdeb9a396f4c360505efe2c153
SHA2569513aced33d355fe8bb9dfe52505901dadfc7d5a118323129344c97402f15f3e
SHA512d396a8f99412f61e53629bb2c991ec6cc8a2c8a88837ece74b3d011a5d8453f105ff9f3436f1b8d3497e0d1bd5c91cf79c90cf6dd8d0b7d044e722f24f81fe56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59612de7de0730cc6e43573694b4a32e9
SHA159e02f1815e03b85e6cae7b62a68389a15b34a75
SHA25650d4c65a26882ac032e8d170f797996fe0fdc73105b0486892c2c81ea9482e6f
SHA5122aaa4c6b815b083dfb64e3054c52a8c3f4a7fc372904debc8becec2d397865a00524685d611cb5cf8bc85dcaf534e3fa3bcc812c14da160ac6ac04f8b3aa2f67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b20bc41f9447db33eae0bc919326b25
SHA1e62f030ffb6d38f9eeb002e7f416fbff7a8a5473
SHA256e27d1323df419d7eb1d8b6c2db1c65f3142e0a31e6ea30c4113360c26b31d58b
SHA512273e4cb12fae90660e31371d76d9aaae5ef4bab4b66facf170c1f1bfe7cd158bbcc0013266a528c0187663476fa0b0ef593b95a3c43dc33694868b562442d07d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f32350572b1a871be10c22acf8efbf78
SHA18357d021f694240dc049de690d3c554d8fead987
SHA25613099a0d6beb0a4578092bb3b51e990147439161639e06576127f55b40caf630
SHA5126e29c78280540d346f9a137d7fde5e0cd1cfbc6f3b1335dd5fabb2b4beb103b130d044a01059695b77f55d4232b0d5d2054d05b1528f2a272825c2cb64776c39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500aec730989c875ab1f0a44a3360a7ba
SHA15071677ff71315345c8c9809e1453ee74b6f290b
SHA2564b0e91976558dc0104f38abde34ebbe33876854e1cb9acaf09f3ad0af24840c1
SHA51207831d31e3cc6fcd186de80771ead61956dc3001057369d57b1ac9f134c79fcc928f4cfad9ff77e4f0d975b41f93297ef2e3fd0fc20bb41c3916e5d1aaeb94fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ec0b4eb1f7c1a8bda31b653ea5a1746
SHA1274ff25bd1d77d50fdbba119865ecf1d065b5d6f
SHA256ca117f047becbbb0e372b1241b8f4a6fd9493e3b39ce54793901adb5877c2f39
SHA512e1a708f395a66aa520c5678590af4afd0f83e0267c6407d08e0814ade3ca2359a52fb71df2f83becf075ff2aa684bb5236d82a54de8927075f17b2eeabf587c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9c951f49e7e3d3ccd7ccb2bbec3fed3
SHA1095ce88280a898c5685e9dab98fba8715ca224f9
SHA256d53cb57067be01ddff98cadd733614b6c0a0c537e6ba1adb1c9cb03917c43238
SHA512c81dd2730b4ecd1d127a847379954a303421d39c5bfd90418a90cea65478022eb90a624a3e20e36cdf43bb7b7b68470d5cf2a42146e9676fad5f7248b1055c40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab077d84944af9fe0f1a8a58c12051bf
SHA1323765ded6e5cdac178cb213906a6946d686d6ac
SHA25666159a60743528c4226327b6f4e1757021086f82fe1b49ff7b128aa16a5b6e48
SHA51298f923daf8dfba19071568c0ffabb50e617620780b602712f34858a6a5c9e467012b4efa6b962d90ee003932d09fb937aa25b7fb8d8560b255c5337ce07103dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e90c1357d2ac01a4f0cc950a5a4a566
SHA13188858411f4503914be7528bc26c29900b0d427
SHA25604ccff34a1be94a00186d683dba311fce294a32a510aeac990a8bd4ad38c60eb
SHA51292fe080024c97182ddf3a43731e28e534270ba2fdf9ebb506166fea9284d4229c53f82c592b62a327d8226462e3c85f3934c43033fcc7ef736f1fda56e7d2ee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f76cd7f26f54efdd3fd501100193d978
SHA1bc1c23c73e93689313f970da9c0599d8e7048c8e
SHA256f6c3604c36729d30c742f020dc511419db65f836b4abc26d7b428fc5856081f2
SHA51252562c5807d58ca5a4af097fce114636014a94a88bd8ad82ea08907d10241fd6ed8c2834ea51dd9f81336e866f44f1a5c5118105dbb9a61b43ec4ba528fc395e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdfdad31b690b26930f840fb6c5a76c8
SHA138e493aea0c64853a8b35c4ac333b77673c6d1ec
SHA25601e2f787df338a3c512729e28396cf8fe99b1d1ad0fd11946ecbb554aa5ac86f
SHA51285bd216e1b448a9f316f34bf074be01b316009cd25a487b90a0a7dbfa60d931f60242b6ae151446650c9add65b97b08639e09d292e944c8420787dbfc95188c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fe8582f7d8a51dba9a9f38f12b8d62e
SHA100576723619d724be725c1eb61a1a9181de6214f
SHA25699008db0364a11acf4bdbee529f4b1b3e2ca78f2b6ce5f1d82bdbb59f334e499
SHA512db601e1904b80e3d3f4e62398d4dc9aec7a8cf864cc617b13044484ac4b1c68b276e5b4785c92e0d33e78bda3662340b36d853cc62786ae16e5882f27bf05300
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ce9d2dc85faa1ae07999337d7e99a6e
SHA16a4cf6db41afe9a390b3558ddfb5929981549549
SHA256c362bc763bca2d44c07240bded2ee1591a181528089c0e5a3c6c4529d0128745
SHA512efc1eca64d6d945c08aaf934329d90b47517d06055db35a7efa53de24dc74f0bbeaa3250b4f27642b26d443709d4b363e1fd0a21cdb5ffdd3dd1d66fa906252d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b