Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 04:56
Static task
static1
Behavioral task
behavioral1
Sample
bdee8f336b3286b9ef50fbe5b1bd5905_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bdee8f336b3286b9ef50fbe5b1bd5905_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bdee8f336b3286b9ef50fbe5b1bd5905_JaffaCakes118.html
-
Size
1KB
-
MD5
bdee8f336b3286b9ef50fbe5b1bd5905
-
SHA1
141a7e8890455ea2ce51f1c0e9ae1077849e2f11
-
SHA256
07e59882b013c03a4e20ad6867ce1ffa78ebd8ff65bca291a86b0d97ec1803cd
-
SHA512
314683656c683d9eb832a168dca65b960b2be561a16b7a6fe04f7f8eb3e9372b813b34f5c53c9bdce46af945af47254b35bccfb4877e8231dc368fac744f4eba
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000b9add61f6456ace544d18631976ec294294c41a91256315428784f26671a4836000000000e800000000200002000000000cf4e184aac9baab37498815ba8bd44f6928d3fd2494abf39fe347d6322e8a220000000aac169e8656a4e5771fd769cb3cf95f6c7251974c70803a04e633ccfc4251b8d40000000dd4b4b74ece4f01da1f12b0dd2025daa95f5bea264d8b6d3bf952cc1758bf6d548faa598fda10785cd592e7748a1e565b834b8793e3c42158c81a6a48034d704 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430637248" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{34BF2871-61D5-11EF-B961-D22B03723C32} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1064fb12e2f5da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 784 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 784 iexplore.exe 784 iexplore.exe 1588 IEXPLORE.EXE 1588 IEXPLORE.EXE 1588 IEXPLORE.EXE 1588 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 784 wrote to memory of 1588 784 iexplore.exe 31 PID 784 wrote to memory of 1588 784 iexplore.exe 31 PID 784 wrote to memory of 1588 784 iexplore.exe 31 PID 784 wrote to memory of 1588 784 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bdee8f336b3286b9ef50fbe5b1bd5905_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:784 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db7ad498a8c3b3a3671a7dd2890d1721
SHA14ebd4bdc5bc2769b970dcfbdbf2b1578c4af3df4
SHA25615584216c3247706c9b02fcdfcb2d6c6d285875be70672eeccb1cd9816a2c2d5
SHA51210abf98aaa6d66e7c4eed2055d1b7764286a483d74e83a2872979bd401ad47beb44c53fe03c988c9702e095894b0d41b3f6307b4bc0749fd79add9bf33a136e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5682f63e973d33da68eea190bfe48521f
SHA159d7891bd7e469d009843bd75ccc0c8a19c6458a
SHA25627c3d435af7775f4635725ff23bfc0e8752fcab6c9135ba8fb992da2c6e9653a
SHA512b35f2f52c07285e71d0bd24f5b511747be5fc0d0451ba7bdfb213d5a99b541b844908c4e633f7bf252d903fcac53167bd4fc3d8cc2f911bdb822be5412f3db2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540fd7eb38c2c9a39fc7552019bb1bb16
SHA14dffdf4667b36107484634328fc840943f7627e2
SHA2564eea737cc0cda29f79c68ae8ee007d74cd2eb1ec0ba4ff13fe5b862abe313d8a
SHA5125816874316686220bd93c23e3209bef1e48eab90cafb02097b7ef4d78d272f88a6f45e77a2b57cd7e4b2ed569d4fd3024984375f94810055824fec98aefc7910
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b62a70911d5a7a41cd63100db2f8edb8
SHA17fe24d3e34c38dbd55b1d6a58de5799e6487234e
SHA256fd630b4b8b42c7b230114bb3a22b00e29503ade8b8dbe20b353c531cc8a21052
SHA5122097ae9d0dfe9d20f911b1844a1f477b60d6dc6bf5f104d3b00e3a6bfe15eb123a02f832a9100ccff8cf6fa066a73bfb47d141ff857064b5a74ce8dfd5d4083c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568d0e7e5dc135ef22e4838ad1210a4cf
SHA10f7ac44de8dca95aa524dec38ffa557120ddad14
SHA256018c04325d903f26c6453430ddbbbd311efedcd2a58f458cd4f1626d842c1d4d
SHA5125e751c336d67f8b7708805db5526910ea8e56b0e7a510b5c29c523c06f40cf681e2cfc09916854526970da3d1f0c430872b769b450a93a04fc4f49ec345e1c66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5015b54ab125801571ee18110cf02b1f8
SHA1361887c426cb021bb25e688dac213cb07ca1574e
SHA256a653574e05c684d342186a033fe720edb0a211e8629ddc4a82c0ee0c90ad51a4
SHA512d039fc0d5f6c1bc3375827681fff828fb57027a1b46ba790f2aca4cdd66fd104477b04bb8083d36f5f4163b83be1a5dc4ba6af96ae7561446f88a58ef79d5414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f23f34449131ac4e22c4c3a61e71c314
SHA136e61d4376accdbfe3215dbfcaef709f824a4515
SHA25685870aed90ec01fc22ce15b2dd75f26138e5c716fa045a8b89d9a9ac445aa3c8
SHA512d1d41ec968756446e525f47e59d886b0d54625ab2281f847a58e33627e16840cbb3ae51a4c08c9b5850076ff67049d94784fc8523a0b4450e8bf614d279af2e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f4a2190266341d41cd969d0262f0c6c
SHA12d7aad293a8d5db2596101e67cd8e8aa95513ecf
SHA256200d4bedb23e1d0b71c1936005f0f987b668862672dd3da4dcf97e2f37879d36
SHA5126fd3b2030afa3f942018f3109289e6ffe2e9df49853c2bd30e9b81c644071a808dba2c909e514b0be8486b36a90d1aff07542bbf0e9caf391658a0316c56e2ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b61941582fe5988c72ef3b3d6552db67
SHA1cfbf9a4d8e449aa9c3d920e4943a26c3d40c1a4c
SHA2569472add030690f8979e2b9a231c9928a45f87c439b992fd306156028d2217ed8
SHA512bfd375baf4bbfefe5b4800ded612a0e1ba9f695c987ce0cdd0607cba73d1bb45e95c67c569d1ee9b1c675f259ceb9884ba8328a75b367798c66a0d205b47532f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584d0a89240d343f29fdefc5e53a269b9
SHA12badfe7dfad3c0e609c059e7ec23d9c642c524cb
SHA2561200e0cb5db8c3cb54d87720df7b156588771ec63650f70b5a9affdcc83700f7
SHA5126dc088602e063cf2535fa4f9a6ae53400ec60712726eafec397c1597185535649fafbb9693a294a020cba7e30a6b43e2f2c208f585b463d0e87171c9c5b02d7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d0164463d42f53f289473505810f48e
SHA16494093420426065bbd44a874a7e28de4cfe674f
SHA25695517a4e71b3810d0144e69af1d98345b1225a1362372670b41a532339e95556
SHA5129804707ef726b95595b6e3b67469ec358b7080a97e3db3bfa3b327ed804dd218bb78da9cbb7add0f03ae7aa45f0078553efd28c0dff0eef61d0aa3ab6199767c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5172e7b011ccde94675cd0f5740043f61
SHA1a4fbe8d20bd5996940415fbfb2605945f49ff1f3
SHA256cfae6383964b898fb78ec63d74d56d9e1f43559639a9c3396262c762b39e5746
SHA512b5651fc5ac547ad2a8bae0ede466f911c63bbb2b390592fe9de6ad4bcc45c07474303e6e2da5b73e01413e880fb804bb26be81cf0e4da8b611bb9e6a0f5217ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dadc13702b1f4bd1796c5840bf6d8bc2
SHA119aa251ecfef9c3277578084a54df2fddebd9caa
SHA256973138dd570ba1500802c3737c025f79e4333d27276aeb8c0adb520210b132bf
SHA512c57c71902ff5c2349ad7ed28e52faf78a0382d7f12a371607cf7ad0f0e42c2e815eaabb4df5b1bbddc44c98bd3ad07bd5b7cbd02bd28a15c5285949d314c8859
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa489a736812326df0cb136be6712ec8
SHA1596817c9d0bd979ab21575e46acc571542bfdf8b
SHA256d99f02c34229e6177a1d2aec97a0a532c59814b55604b3865d96fc165d687ac5
SHA512189dda2160f1fd1baca0731403a3c7a3a1df8901758c0a24c4e8ab9feeea981da85cc901cf78b841883c300febed8d39fd294c3a80011b83ddffec7167778862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab776e30f43ffe1c6257da70cb486c34
SHA15c12081c98ac1147d7b20c922b3d82fe27870194
SHA2563fe3f46bd616ced7bf3e113138309ddb0f224784761d807941600c4b3bc067d5
SHA51263b8c8c4a0163d54a721ae223264f9606df32c331e195467eb70213d73d2f5ffbf67ab8d3ae05ae78d6414d4f6276ff6219f029d3a66ff7213236721c1b4316c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cf34bcd565313b36777c08e87a933d0
SHA12afb4b044e08613d23ae3fab97e2938a5b32477e
SHA2564a2dd4daf266a9611691b0316ecf98a70d2307b005f4f34092e687419687c502
SHA512c895f30948604d7137ef244987fe1d14a6bcf052b7a67ac8f7175c84f6980f53663d29602f23247d8ec9739f1e0c424383d0fcafc16764f2fa861410b30a69b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eaa23b0668f443856fc871ee9e3080f
SHA1555a9a7fb4da1a22c68270362a3a96ba1328460d
SHA25651f82a7dca7ee14408a8c23db25cf49ea28ec0d8ce2e5a629a7808b85701e8ed
SHA512171cd23a8ec6c5318d6a90c4a2b1355dbf9d4bd47b21254da96fcc9988537b3455fed2dfe77842ad5401b6ed452272b442920184bc0a3f8a630634fb1c30d77e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9bb92d686c30c99b0c42cf71d290453
SHA10d765e1ca229cb2b75f773d6782603d2f6fc7298
SHA256b95068bf9f20534a782537bf67edc0f99b1d06970009b28c1fb01d29871cb723
SHA5124a995ee0ab108e4a6ab9de08104bf858ef63ffd2809b6fb85a0f709f5c73ce7a030f657a2614ce4d6fe2030d5ff70b567b9b14c129ee22e96869f9dc1dfc4217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3436d6ef103b3ff7584e06366386ec1
SHA17eff509e6e2b605414d5f354bfdcf3b8dbb9783f
SHA256b3880c8cde733b1bdd4efd6f7bfc7e0b2b7218d1765e2ea8113886a89fcacd73
SHA5121fe5b4f51612afc4af4bef499a3bb3e7cd59f0e2b79ebe33225e33dc91cffcf7a0bd91c4a2c4f654b0eaa7022ce63c59436e66e959a3d88fbdc3293b15440e9b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b