Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 01:46
Static task
static1
Behavioral task
behavioral1
Sample
bdc663be36c0106fdd831d8c138eff58_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bdc663be36c0106fdd831d8c138eff58_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bdc663be36c0106fdd831d8c138eff58_JaffaCakes118.html
-
Size
889B
-
MD5
bdc663be36c0106fdd831d8c138eff58
-
SHA1
cbd33ee702e0f10326a955a68ddf4031f1c98036
-
SHA256
a8baa0f5ef6beff51c87d6ea02e5ec837cba90d0a16c2cbc2ea4f60ee8bea04e
-
SHA512
d86d4eec5605d8087a897e3f32e81e210cfd3b75350f66a31a396169bdb049d7c6a505511870600807c65f814f7c1192f2c36648ebfac8ef78e49aa656d83407
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430625871" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B6F1CCF1-61BA-11EF-9CD8-667598992E52} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d05beb7bc7f5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000006231af2c6445ef3746809ac86c924a89b984ff3cd21132dd1b83d35658bfc8ab000000000e8000000002000020000000f4c92acff1a38f9c64c75631a9d0ebcb3e7a3d87758704fe8b1421902a77b37b20000000af57a24e9c176d029d1e79c19c5bfa20016d1ebd33c97fb0d4fe075e3098410640000000dc4116387b7f8eed5f02bc0b8d44afdff7ce7730c2c5e28617ab0c82fae390b215e11c0a00dc077b26b4f3aed81f00aa3a409a76f6cb4c8afd9b969a55ef9554 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1488 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1488 iexplore.exe 1488 iexplore.exe 1356 IEXPLORE.EXE 1356 IEXPLORE.EXE 1356 IEXPLORE.EXE 1356 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1488 wrote to memory of 1356 1488 iexplore.exe 30 PID 1488 wrote to memory of 1356 1488 iexplore.exe 30 PID 1488 wrote to memory of 1356 1488 iexplore.exe 30 PID 1488 wrote to memory of 1356 1488 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bdc663be36c0106fdd831d8c138eff58_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1488 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5adc7584ee1b0424440113753174edd6d
SHA1b9810c9e2e75d75e2e00c0b73e4709035b4524b2
SHA2569fb62dc03b8f156547668969229e19e26059ff3051157248dcad459039a317c6
SHA5128c2e91a48ef57c6d164c54ae3830b37ac4ee683944d63dee64f484f91ae7c3dfbe27fefd1ac97ee54733ff327c949068435d985da6c5c4e823e9c013ebca9575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54a01056601d3752aa5998297a49eba77
SHA1a505d60f094775c3c5c11704c2faa714a34da89a
SHA25657bcebb84806657be9604a76a779b917a186e7f3e106f21ad0f84c614c3ec6fd
SHA512cc899d37350086844ff2bb7c4d37755aeb3244208bb23bc147c2ee87b415996047b25f9319be5a821de7f53c30842d5304170192341f18e3225e8da8e2c30b60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ae83e0b54454b1a0555fa3f48d04ac09
SHA1a0f8ff9cd904b50302d5831806ca73188076f422
SHA256c1201dabd636f343739890b587d42539c05a74a892298a4cf940d355b4ac3bf4
SHA5124c680c5babf18d46c60b08e7203ba5a496372e8ffaae52f10d26e30369397e53ddf58e399134e6fcf8aaecfcf83f1dd95373206638deff5fd29b528755e3ee1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b2731f15ec21841d1d4ede5f120aceb3
SHA1685ad30bac61fae1e4f42655527ec6086daa80d2
SHA2569a9a295fc59c3f0011459863342ff90d58b61f040b31d61ff5b51c906186927d
SHA5125cb54d4ddc388f94e8ab904cd27dd85990375f0281c6f4f50403dff19b81435e6b469fb082ca72940547c8ee9b35d98bd2ef79fe75a8168a70683317b9ffa82a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53e140e303bc5d6df259a8f9d3fbf9cc5
SHA15cb2721d02b8fbb3e885de20f8611d5c5ea19aac
SHA25635cf0fab2c17b3ba1d9a87c899deb684ac33a552f67e335fe146db841531638c
SHA512789567429790c8b5de9de4d466acbb8d02d56ddaa4eb3c5eeecc8490673b2d470ac263eb1fc5e0b048338e9a3242d4dcb26057f7feae91cb4db388327781cec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD555d59808a66de2cf2d32bb993440e1b7
SHA124286b6933c89a549e43116e76bbd81b41ae79b3
SHA2566870d5291765de1f505b189b84d1d25d0c3a2d7f0d149d5009b6f8e1668cff27
SHA51223c1a73ac9846b131cfd2f6c716816140a5f7374017e264830eb89f2d1834293dc4d715a0160e152d0c0d5be096b4c31623f22bb69e867f4f63616c87ef5ef0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5581c01b901fe79daa77546cf058ce217
SHA16a9bc7b9ee81e5ea2944b23b0f5e3092ed052086
SHA2565a63a435a6f5c786a50ef8e3fffbff9d6767ef13eccd81d19fb5e210c27dad68
SHA5128b99adda20bbfe82d5797e550aa73b911b3275c8b2f18b4f3a7e83f7c39f354081b0bc9d359219361410b85d8c7247301ae8e5ef79840435efa24b4fb77641e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53bdffaa03526ae9f738e5827281ed622
SHA14995d0c8e13192da2670fd4f5709b1fe5c0b0bd8
SHA2562723cba28b5fec2df717d393af46164043f804f70fe2a8281cf7ae49efb8bf0f
SHA512c1780e6e10a347752603f26dadaa823ee839ab67c761db5e333711b576c62492c6fc27ed160fcb96faca6dbaccbd37dde233c4a48fb0690c909df74bb55dbbd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD582946148f14b956c2f9762d45ed2f505
SHA1530baf0d0cb24e8d4c5b5487980b7f141b97d8fe
SHA256d234604ad11670a374bcc9b85ed7af15de61143d35e80b564391c2740cc2cd57
SHA512e8c303e25162c5938d7c62588b7687f128d54316a293274e5ba36f59e723434ce971099274f9830d2567cd2807bbd6ba00fd6159313a2de2f0d599e983da8ef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bbcc90f9e7388d854be88300244541e5
SHA15bd3b001e0cd48d31bb002e0e54fa9443a325b55
SHA2561a901116ce173dd07db211fc921503e3a581379fe72e99925e211c95279146be
SHA5128de3886759e79658eff08f7e359eec30356e2ab65c8f18125b884333201f81726d8b4320f9e507c945436cbdee7e71bd311d4e59206042a29f6fcc77780f9db1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c24db31c7d37e06e7be5bac8f6a85d9b
SHA1e906d7d22072e64b9bcc7584c3b99006fcf719f3
SHA25609050022f7a2e28defea5d2a88052f982263cccedb1edc9f94aef43c5a4e12ae
SHA51269bf592c1352a3c19c17afc056ec2f71bee291de68fc740b4ca1cea623d1cb65481d2e5daaf8540aa02b3253cdcc62e0c264ff2d1cf4e44b5925428fd7f8b2af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ff1d4cb6e1c6419ddba2d64f2c23a77d
SHA116d7208e9376e8f9977e3824dd3f056733643327
SHA256430ce2d2c5eec62ae708c5a7286ae50ddfd2584838b33d5347a90f1b03a6bf6a
SHA5122881c817440e84b9ba52d3ea26b9638d379f75d3bdd4c5c810dda6adb6d5d0be26e55cb3a8f44d49545476a9737db6ed97cc20e442ca0756359600fae87f864e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b94fd8d22d30a540a355bf9da1a963c3
SHA1cfb8b9934bb11a4be9444e822b2ee42a62f706f0
SHA256bb672cc74b122e67c491b6eb9c7bb337b727786a1a7a34013e3def6f96b5566a
SHA5128e51e956c899be72cd919f3d7171aa04434905abecb08a4b028b265328f6d626f2d4ef92d6ea42060c3717ebbffacab1819edeebcb8743a5365b9b40a6d647fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55bbce9cdcab9c02ad2581a8bf45603c4
SHA1c5564bc237f627530305d00609b68637d9e75ea7
SHA256cbf7d489c4fc4416d88e2ef3c2469f202a6272152914f428ec43964528ea4c2e
SHA5127f5d9ff387dfe0e13b4d60ad278831db1d2d0368f03f1e98afe2a87c256724adc3e749ed11d64a0f13dcd96928ad55691837c72659b3516ae9edd2523333404d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5803f8968883ad394d3717ad6b3a2d5e6
SHA15c181e2b45ba0db2749932dc4a96388b30bbb81b
SHA256d7e935c2a23f4886086391284ce16ed96e6c3ec67153cadb386931ffb9265ef1
SHA51247faa242fc5634a983cb8e97588341f94f8d544bc05ed9a23a9e95f7d4817545e7121399ee50c69889d843b70ec2fd53f9e2a8c1148b104a4b0b81be2c736d7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59e72963c9f44e7a027ca15e415328853
SHA1cdca02b9136c172a991b86c5b1b35e7836cf8cda
SHA256eb41348a33c046320a1e25b9512618080c3f09d657c426903c76bd1809492437
SHA512c2f05b1d31e075ad8561f3909601efe2f6d58fdb46ec7ba3bb8becf2e69e45178304e6b095b4445948fed2cce6be9f13c4de25768a31cb3ae8d036c6bb72f19a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53d74ccfc6beabf67e1d1d00c7f9ce642
SHA19cb8507bbdb3cce14c7e70bf90cecac03712a0ea
SHA256a4d5611899f2dc0e98fd80515d303943f58c1c8aca0c0b9db70437972b855811
SHA5125e20655c4209ffffefcfb623ea98cc6cf0267874292d3517655e8f3baac2b83e02bfc0e0f72a8b6f0a425563b1d5b1ae4aeaa314fc524246e902fe6302d9f5e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54924f2e7f624904a27bc005e9b9c4b1a
SHA1f24ae7caead2e2902e3e4b41e4869b14dae7226b
SHA25620d9643fa5850d7c6741380b76f056947c9cb7e4d1380e7f899e47add403e8f9
SHA512923d7f2b44f5681b6b6d5513d46ce5f3ea2cead5a7aaa9bf89bddc394d36fed78e6f16e156996dfa28f27be11de9679ddca4f04e3863dbf495b437e4370ffb14
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b