Analysis
-
max time kernel
139s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 01:35
Static task
static1
Behavioral task
behavioral1
Sample
bdc1fdc37d7b0f85b494457652802849_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bdc1fdc37d7b0f85b494457652802849_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bdc1fdc37d7b0f85b494457652802849_JaffaCakes118.html
-
Size
17KB
-
MD5
bdc1fdc37d7b0f85b494457652802849
-
SHA1
d221167db5d6487c2d3493eb039278a2d51ba8ee
-
SHA256
05f6acaa2f7bc8d0b83d4c30ada8476259e08023e473c9cc81c58ae041c22b3b
-
SHA512
bb8e7581477c00df2120a3f16ab9076f760baaf20c1cb446520dd1b15258477fdbfb1f50ab21949b7c2b41d5dc774922d21a517b570f3b7ec8172847ded68e1c
-
SSDEEP
384:5bWyW4vcPBzBpOMbcMj0n16pidx8o8Nq7zaqVlNFwDztxdX6sugvNkWgIwjz:/Uo4XyIwjz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{219D7511-61B9-11EF-B913-D2C9064578DD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430625191" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2380 iexplore.exe 2380 iexplore.exe 1920 IEXPLORE.EXE 1920 IEXPLORE.EXE 1920 IEXPLORE.EXE 1920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 1920 2380 iexplore.exe 30 PID 2380 wrote to memory of 1920 2380 iexplore.exe 30 PID 2380 wrote to memory of 1920 2380 iexplore.exe 30 PID 2380 wrote to memory of 1920 2380 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bdc1fdc37d7b0f85b494457652802849_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD52e2613b57f40c552442be51bd1f86fae
SHA1f1c7bec01733ed9e6ca7a1c037b64da643797695
SHA25658d16a58998adae06f9e8c4285ea2dd746dd0d3d239dbec5b194e899696f6a8e
SHA512dfb888073c954c65936422bde3d7f5937ed6dbf1302ad4415ece3607a381420e284bbd901845e8e6f79262873bebde2b4bafc0ce45398c7a495c2d306f08a8c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb883598ad552b75814244b80c0770bf
SHA1d28826a3f3bfb407788c5ec288894356eb9856c7
SHA2562a5f650f36714a14baeb5808b886a890cdb15c333b449bdffb8aa10b216c5f3c
SHA5127ee820e67baff2427d66c84da0ebade36d3a1a6aabf746cce5bf6e036527dc8793d544684c37c8e84fa03734092192ccaefd2fd7fb1d704827f53ad4f03e09b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588de6eb8377c2739138eda32abdbd681
SHA12d72b05400728c8f23d484476b1e3aecfb4528fc
SHA25649be65a0b4ede0bcdd4bce53cac255f18b5340206ab14c4c76a5d6cd7eef3da4
SHA512e68527add56743a109e8667a62bcbb68e3c3c4387aa73b49ed79b265bcf410943fe25d18e82e67db1f5cd3cbb2a082af18d3929171139339e94d32d05f5d2fd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5383102753af6591af4c353d4dc883c78
SHA11900ea99c64f015925475f8d61feb76cc8e3780a
SHA25678a945c537f17396304b0fb99d6ea271b852d187f319aea9db9dfd9c55e64585
SHA512617324507a7a63431ed0306510f24ecda73edcf282882a89f597c11550f694565ca505c4d2c963514434c3932cfcb497808845825b0971ad5c0d38fcf15b5dbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5460b0dfc150f9bd5ab287599b1b889e1
SHA104c42139c9219acb888264501f2fc8fdc7ab8bed
SHA25624a5892e3385075cca7d5c6a35a43da34df9de16a5447dcc94d3feab346ccefe
SHA51209b486ef609178c0934736c3c91a9795268d3cc99c237124801c4052f78a90f75e762d271235409a2ebbe69c14b6b2007a2e33b1f2555f1cd1aa250e970f7f35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b4c9a6ed5c37f63263ee62b30c1169c
SHA1c9957b3f2afe2f8dcb441666ed530b6da599b304
SHA256b34f528bc748c073cacbaa0f83131e72058514c32419ea6a089e2401dc0e3ccf
SHA5125cea10251e2cc397931f19b0551aacc015d316976600ebe97609e3b76375a8d4b4ef8caf83f42b12d4a8ff3bb9edea0c4cb499ca19a9336d4a3c7fab03b16fb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559b10f3abb1eb31a4dacefbcbadd618f
SHA15c52ed54f31a38c0583353184e6b7b68faaf8bdf
SHA256d9df99512d64077f94ae7261ae0fcd034828917ed3e0bec4d15f3f33b5d259cc
SHA51282b204dfedf4b4a72244245115c4a29443793c78a29e2a3651e250fe7523d3089f0665b1bc7c0b9520736eea2a0e4632bafd746d5156346930ad8a8184917869
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554046eb178ec0885ab0b8446e013961f
SHA1635bbfad2d076cb8550a3b082401360e8286aa3b
SHA256923d10cb7ec022468d885a50ea698f89d52ed181e926853d5eba77d831fc680d
SHA512167de4e3f4eb9b25ad9b1ea34fa78e7557f5e0a5244daad4a0d64d43da18d4272add1a011eb8ac208185f8ca8fbfc18a6d764642918e1aa7b747723b43ab1ad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bd5e8c27d0e81df0a016b35e73b2d03
SHA1825373328993cbcb5281b70d25a553ea8cefdebf
SHA25649d151469739819c37292a8616ff5d590a535bb9269242381a159bef8686d0e3
SHA512fd0daf651f37a56b4256c36a7d38393833e117ecf7387727b5239850666e10b07e8b24dd9e73d9fc8c7cbe60195be701fc29ed45f9d302a45abd4d26ef0dbadf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD588a8b620665d5c3b329b369b81ed9c1c
SHA1af48cfabdc5a14569c0897642ed6fd8b0d05e1d9
SHA25640af61a7ff8ac382452d7dd3e240b9594ffb5484bc1ed08f4c171799b35b2be3
SHA51237fb3ae7f1f75d3619e2999b292e63a4c61bc695288fcee24db47b039c632e13ac33eb3340f75c1867a6b002e9d5c746fe239152be06f12fe260a93288393976
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b