Analysis
-
max time kernel
138s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 04:44
Static task
static1
Behavioral task
behavioral1
Sample
bdea2cbba4c9072f305114727d6fce02_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bdea2cbba4c9072f305114727d6fce02_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bdea2cbba4c9072f305114727d6fce02_JaffaCakes118.html
-
Size
133KB
-
MD5
bdea2cbba4c9072f305114727d6fce02
-
SHA1
1bd7625b985f01fbdbb6321ae69349060d0a3351
-
SHA256
6c3a37dbd1673a3b373530c82dbbf7dc8e7af79912bd6e0644376145d8e0fd2b
-
SHA512
b3f5699fc135db9d9bc0fbe49c4f164ea37e8ad88f41d3e12b0640bb8cce6d150397591e323afce9f71b8c0c10e48eebbdb9af7fbfddc750073902dcb8121795
-
SSDEEP
1536:qcPKA4yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dK:7PKByfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430636546" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80ae78a5e0f5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{90929531-61D3-11EF-BF21-724B7A5D7CD6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d99090000000002000000000010660000000100002000000023bcc4b8791626cb1f320bc444e523c7b287eaba2062763b60a823c6bd7ff7b6000000000e8000000002000020000000ae09c088ee0509bf438fe57dfa5d5db389f7bbcb5e4aaad5c89c0ee964714302200000000d2f535424e93aeb2cbb994968c883aa8bdb7f2e2cd8f2b28119ba6267735f694000000009a933976bec1874311665357cfcf8a0f31d64044690d1763a8d9c0a9ff9a3e5ae999692c76b02aa550e5663326c3a98ba7c5dd31e7e3f4da8a531b24f62bf54 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2376 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2376 iexplore.exe 2376 iexplore.exe 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE 1976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2376 wrote to memory of 1976 2376 iexplore.exe 30 PID 2376 wrote to memory of 1976 2376 iexplore.exe 30 PID 2376 wrote to memory of 1976 2376 iexplore.exe 30 PID 2376 wrote to memory of 1976 2376 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bdea2cbba4c9072f305114727d6fce02_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2376 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dd13b54c69dc6ed4ce158d8918e54e6
SHA1fb54aa9135edbd4597c4d680ae7846a96d32cc3b
SHA2565440082ee835874b8226df4dd91e09c88f5de89e1b25a75d09aba0f850f7d4d8
SHA512775c0abe74dbeaa94d1b43bb302e1d2bb9c6dfcf2f2571977cb90eb09ae6c82b8e50363c8cffd1f58c5492c65dd6567975e05f6b5eebee622bc0b1481f7a7714
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c74dbebc11829f8da9075e146d20caa5
SHA13c1c29b5b8f9f0b74c57317f5f04c1a461fcb335
SHA2562e3a298916a037f71628157778e49e5de0c528c0cec8da5fa5518a79cc9badac
SHA512b5fbafdd8dc3f2883fee0c720d088c9417bbd82b9c9aa0f8d5550e59cfb893731e01ff3a1166db4ae5dbb03fbabfea07402d1d3ec51ed86e831ae13873c1d796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592667f65e1eab610f2f297623f04f9aa
SHA1be56fffc356cff8153d43e28f23b70d6949b08f3
SHA256e7badff6e5664532a481ebc2088d577802ef796daf56deeee8562a9c10323e23
SHA512b143479b870e3bb877858ad097109939083875055ecee91fbc8bd7aec59a05e2a6a7d548d16dd93e7c69d0c1f4f9cc591f28ddb160a99cba327e2183372a9008
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c347221bcf7388005086283937f61c26
SHA1c1282e85e31b17570e61055ef15293a62eea08cb
SHA2569fdbeb0228a2fbae26e9aff83741c54143074616441127c293274d172fa512c4
SHA5120b7c6f139e88d8a6abf566bc810039307e7a528174a3bfc39f93d07b09d97eb4da0b485e685913051dbe1751ca70101debaca93449ce97249b1daccb0b7bbc7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3e823b4c67ca8ecbc7d58d7b8208f55
SHA10a874ce128e4c60d15446e9bf0672f38c846a584
SHA256ef2f9c741f6349ddd9b8d9a001bd584634d50832aa3b863047ec83131b462cef
SHA512ded8be9e4c01c29453c63aecffd41e02f86f7bfe117f0572f0d57cd2ac18cd5e6086ef3f9bb46977a021b02a8e9fb503ab562d2a19a631ccca74ea8cafcd54d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e81bdfc6115299a51f0abc6c7ab871a
SHA13711df1e4dfed042b34bc1a4fb15b8079499436a
SHA2561a4fa78ba4189537888c60f426524791c2af8790606dc5a494c0b8a5b803c023
SHA5121f560ee4fd434bde431b6705f83b9065e7130e30ba8b497483b16388fdbca387dfff196abca625f0564807bbe6a1fe3044862e054127e2c1203acd70161a7447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d9d886eff5493bc6c4271e5c62782c1
SHA19e9249ad0e8a1b8f72f051f7d14c1348713f8d07
SHA256bc724c46b4b0b390c7152c8309b3452d3173ca74fe418dbff33666b4b27529c6
SHA512b3cc8bc9b2859c27fa2c2be3e030168cc5170d73559dfc4616c14cc6d02ec3dcfe7fc26551c56e121422d385ba2baffbc6bd38abead0cbb6f781480b4dddbc2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55051d465315b39ae0af829c8020ee05e
SHA11d4ceff22b9f2653049ab0d67927061256c8fc21
SHA256e0e7737b6eae7678a96f396f119543b747e00f0baaba4e11fccfdf4469e877f9
SHA512191ac306c8bd5da53622370c70416a4b18cd4e7184ea750ad605484c96797a743a6d7908473c1b0fb1fcecf011927ce5475b628deafef7a214f1567c6fa64cd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4f4d2656a039da67ee0ce6b259d99ed
SHA11002291f8c17c42a446fd7f316c614e730f60636
SHA25619519995cab97d53c308873ca3ebe5ec52476160f9b8412f1ef8927e0d399e12
SHA51245b4db7151fd732dd065c15f793aba2f8c78ad5bd62a9b31c858b1490d9ed3fe2fd4c68747249c3f963305823cfca13ee1934c5ad27704c1ede5896f84b88685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbb156e815528f700779ff186c216f4d
SHA1f87efba171374691ac2f6bb08fca87271f886ff6
SHA256f891eac7aee5542c2576c698b9f0c7a0d1ef6304c5bde5e3d6dafec10d0e04cb
SHA512ac08e0cd177242eff705122fef634353c291ea3048be3c731fd4036b4bef307018169da0438e04453be2b53343cfc01754f2cabb16f4413358c6b5285c1c69bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c00b9e9f571b277a8c6c3e486571767c
SHA14501025d18e884f9b4dd4b849ec9824b14d1fbda
SHA256dd528bdee17b10ced14de7fe1454e675e8590d65f103cd7c0e1f98adab5753bc
SHA51245cd3ca2f5729cda2eaba2986158d78532a4d952435d6209924daaf00d7289c57701f752482a8f542f24f7bb48a04c2d9de80df04207c7330abfe5e094b47705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bae61b7938bae53585ad317814d44863
SHA1ab65358e760e4bf05cf4fbf03ed00bd78114d9be
SHA2566842f5c88f2ac5d5e261ec76a4966b160f24ce9fcab28fa4b87ffba42d1b8965
SHA5126c740e7aebeed579f8dd7645cee19acea1407b3273c5236f3d2bbf33c9a6d51e1ccd3777b493015c4198b4737340707cf9e3d92409eb255ad801f950b9e2892b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534c248716028fd01f9a0fdd88dcfae88
SHA1035bd23233e8a799d957637d1078b71bf9bc2609
SHA256a597ae083a2c48881246ac54cb1255afdef5492b15083e7474c06e9bac5bb2d5
SHA512120237fc01e1d31b5e30cbbc01829757d2f6676f9309b1f6288192c46474dc757ab5a68b3521c55b5a8d02917aa24e5ec4e226de258915bb4e04df972dbde496
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cce49617760589f567d82dbc137bd60
SHA1d0f3f1c4ed83f90db2ff8a61315d4cf0b2dbb28a
SHA256ed3ddef9cff0eaf71724c3fae2bbb7cf7b95d526d1afe019d38a8f4e2a3ad35e
SHA512b43951ac34bb5df7deac6f41a211d2d389ac44655074ab6c933703024423d7c9c300c0505018adc7302d91f7fe9fedd3ce4e3c4d6e96ac33fa44ff7c598863cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e99a72c622d52bf5dad044e838dfbcdc
SHA1f9701b24e8dc3510246bb0f723ccfaaea4e01a98
SHA2564651007b6845603da0a12f134cbe2e3d2a56d8ce8642b68306eb8f77ae77be15
SHA51260431fa703b7a08a83b8d68d9ac7433459f3dd8f7fcdc440c5294fc0de9797a47ec3248da0f8d20705fe83d8b9124a0e86612eadd6dec5ef80fe5cad05e8a00f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57313472e5985769679ebf67cf49e0c2d
SHA1ab81ff60195c59762b8a20eb2ff71111921560c5
SHA256cd733b8b71666cb3d15bc08397988ab89d38c1c41c08b0c0c97a732e70be125c
SHA5128dd6bc24709bce023a6a97d758f79d75aecddc68910d577fc66149fffd93c35d1604e99ed25e08db7615170c8c5f72e38359f35246cd38e71303eb9fedb769aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592889d7de72bb17fd394b23ca741be0c
SHA16929a8a15b8521573045ea66cbef000b1fa56c9c
SHA25640b8e4a3a07c4640eb3cfaeec09f458d09ab910c1059926582fb5a508178f9ff
SHA512cefdf6810bcc1845c69c2593bcfeb77203f62d5c8b462bf6dca59c538f583679a5c1fdabb030fc8662f086cbeac567ff79987d94a8710b10b7de62b68a63246a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bbe4847bef0ad805681ae3b9c65671b
SHA1a2b9f5c754b1482bf55e25f51f6429a5109e3ebd
SHA2560ebfeded2a98907aaace5b960151fdfecf35768f3663228cdb5bb6a55fb2c647
SHA5123312560163e996c057f921657b4e3ef33ac99391953887874a3be2e5fa8c248aa6f2e11e60490e2f2e4cf128e0de87a0b4c867b721227f0774eb09d63338cf6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd8a34464d3b66e6cd9e5188f77708b0
SHA13f6ed0b47215e61ca12fb74940db21ba44d628a6
SHA2560df4786210f24669b4ce518d3cb2e48b19daea6b8f87d29fcb5c58898e6986b0
SHA5129217597753bb88311eb302379acafc723eb8899c91b1cde311bd7fa29b25346584d6b066e87a0df9820a3100d2fe720de189a35b944d4def830d82341014b60e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b