Analysis
-
max time kernel
66s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 05:04
Static task
static1
Behavioral task
behavioral1
Sample
bdf13f48fbc2c70aa71c748b3ed4c84e_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bdf13f48fbc2c70aa71c748b3ed4c84e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bdf13f48fbc2c70aa71c748b3ed4c84e_JaffaCakes118.html
-
Size
460KB
-
MD5
bdf13f48fbc2c70aa71c748b3ed4c84e
-
SHA1
a3856172256285a07e2f63c532a466863d0798f2
-
SHA256
e5932d3ac95722cd2bd4f23477b80f72c35fd5684c5b583f040c39f2e772e3f6
-
SHA512
4aaf2fd23439cdff5442a00c79a83cb24e4df13885115688c8708cf2707ecaadf92e468e3fb5138e0405e698b64c727b7d861632fd70e29087d1c96e3e2a55e4
-
SSDEEP
6144:S5sMYod+X3oI+YAsMYod+X3oI+Y5nsMYod+X3oI+YLsMYod+X3oI+YQ:65d+X305d+X3H5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5C6911A1-61D6-11EF-9E52-6ED7993C8D5B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000fabeb89aabe8bf26614669af883097a390d3fd665ab94445ac30abbb3fc28d75000000000e8000000002000020000000d917f24f11dffceaa387783e47074c02a25bb5e3f326bacea68e2c995f5c8430200000002012ff7fc5b1047dcf470c10c7cf8258976e90b62a1634c183434f79105a196940000000fea10ee0f783360ebc0a7cd9161095c4faf421ab8d3cf27ab3722100a986fdaab2b1416c08aa0da21279df1d88eb9ecb479f5d209472671e92a1bcfe4e465761 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0ecf634e3f5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430637745" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1896 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1896 iexplore.exe 1896 iexplore.exe 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE 2204 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1896 wrote to memory of 2204 1896 iexplore.exe 29 PID 1896 wrote to memory of 2204 1896 iexplore.exe 29 PID 1896 wrote to memory of 2204 1896 iexplore.exe 29 PID 1896 wrote to memory of 2204 1896 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bdf13f48fbc2c70aa71c748b3ed4c84e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1896 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552acc21f24b722aa8516777e40b789f3
SHA1e3b252647faf2cff078c6d73aa2202822730d8e9
SHA2563e86e965b5402dc8cf2be22c38d01876c849b0652765e078067c12ae8021b4a9
SHA5127c7eb379466f31a5b4d0c89f4cd4b476135f81578ab7d3aacfce5258852bfac89b2c06df3f6f2f374da9670460a5e5dcb86445656f30d5ead6701f426b7090d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572c467f78c9d21314d7c9115e2a3ded9
SHA1276e04ce8fb2d5cfc93b31b9f10b11dcdf974106
SHA25622b8ae65ac97d1b634815904cf29fbe422294919bced468783661f301ae42bf5
SHA51228ba16a6fbcee14e47038c6b47dcff9560c5aae8e14459275fd2e8e080908ebe311b8063a8a0b1b01e1aceb74e8071dce098cdd1c6fc53e00209f9c17fc086cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57102b1fded604a798ab14a867b17d315
SHA18803013ef75ac040f70f2e08745b24d67472e67c
SHA25671b1b75b253a06a0e8c9e03cf70c68756b239ebdf7b8080491ada63af30a6b58
SHA512db4efe815275e5f12d57e382ec6c18c089d6d0c4dc593185aac717f45345275af0dadbd666167ffe004e2c0f2e023adff53775d5d586ce96fe9c42ba7e7478d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f15aa61de4aa815e449bdbcedb9c20a3
SHA1122e2c04e693aac872bdfdbf5a3eed589339b7a1
SHA2565f77dca168ff253f1663b019d7c8abb02e6db2b29b7ff08912b85ae1c712aee1
SHA512f80ca03f2e95c560d828a78f8e82d0f3e5e8b1ef3ad0782cdfeaae7465406f456d4968900aa09f95be66011a45225f28edb5c4cfd983fafba1c1025aff06c119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d57b8905285f75ad4c4119ca5b23f6a7
SHA1a83a76f03745d30efb7eb3da5c5cd77fef672e4d
SHA25653e92a69558b31dfefe1d8500cf5c095cda8f07eb8221f377178e117db67174c
SHA512aa73951c67f4410fbd0b8aa20016a2b9f4e4cb94bf2c80354f2b78409bce110ef3a3fa7d422a48d3d4ccbd206fd6647b8133eacff78848d07dfd67edaa6c7b27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586a0c04c31e20a52d69d0f4ae4340c05
SHA1dae603a5895ea0a7e65d8dc2873f0aab540f613f
SHA256ec6c0eaff81462b3d92f55a25ae73ad8ebcdfae1080e975fcc735b176b0ff6c8
SHA512490c8094d4af74fb8eb61400ecce61e50c4af660b9994eb39b4cf7fd89d5fc32c3fee71c228f5317f772e4511d6ec0ce47e12bd787bbd079d9ddd121cfb386a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561dbb2810ec05943054eb762ad5ea0e1
SHA1236f3fbfba65c87508447f1d1fc98e19ec8a0cf2
SHA256d2450f8a28631a021a207cf44a867811785de460aaf8664707b20cf2ebeb6530
SHA512fa19b03f1292f991e3d2f4700de806b4e7e2be252e1950ecfa7c519aaec9b1e0a3435d41bc6e8e9b6195c3e019e2fc19324c7c964135c11fdc57c6c65ed38ca7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f137b0a40cb1841fbcf18f018f561583
SHA1add7822125b85303c7d518fe2b58600d9249bfa3
SHA25698ad29875e4848bf6aaa53b0edc317d7a8e3f98de198751ff0d5ff22b784d8ea
SHA51285efd01f0d2c136ee202643f35cf2152383ad4e49d5e7e01d53e27fe3f4d7f43dc2533f8e9f56c501bfb8fca474f739cb41d0bc1da4268c6fbda275e5e59db37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5257777d7efbfdfb15f8ac77ea56c2897
SHA1732ce8e03be2110903c9892a5b8d8a83a8cccc36
SHA2564abede9395a713a7d2e21767b1838c550a2a826be23457be8a63d764f65ce92b
SHA512e8bab66e0c88c4059735a9857568544f07cd46d088c63d0e8430d53ab49b02c01084efd1bdecbf7a1597227d732a80e787bb2fea6951aa1c6e6697833e153efe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0ae8c67f4c80bb211373e35e8573833
SHA1a82631f6437d2e5f921dec02ae77ce85e2fe69bc
SHA25689da3e7e79aa336c5eb64d5c1c1678751ddd0927797711cb1295dd140f1f557c
SHA5122cd764c21c07d059c738dfd4738a885b22a377af976f65a4df84815b85254a58043f439570f1708ac3313750756a5fa868d944db60246e3c3f01c05cd4fb30ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562432df9d59ddf9d4ee411fe2287a04a
SHA1545e3d280e713d5b0f7d3d6e638d4ada7359dde7
SHA2563bf38bfc9dcce13b10d3676aba2220d992bcb0d40c1cd06835a4aff320935dd1
SHA5120f6b45d0f5b1c86469bda3cf29997a3d6f8ca0c0524aedfa7e2f5e90edaa960fca9237c28af2f9611a88ecb9364f0f001e1a34fe0b25b5191abbd7096d07f57b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581703d40e381528cb128c40d71500307
SHA18f16e215c8094b6bf36c95e56e1569073f2225d0
SHA25602be10c7f35dd427d8598eeef458c011403b9c756c2a946113ad7088e7a96400
SHA5120fc074fab7e112d99fd958d369f0a5b7158f3acaab6bb4c16191d71496dcb63edfc5a2b06e247b74e88d577ef1a00cdefb98d5f878e3d8b93f9d91d98d6e5b6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e432c535791696c8f08e1d8972949853
SHA1c7a3514ba7ac4414377131204f1ca180b9635b72
SHA25683893b2ec8ddec8290a9345997e6f48fabc92044e3a94c06b47110158feb2baa
SHA512a2cb2c3eee4bcd78a193927a862dfa33986205bf4295bad10bd9686a5dba679664873b5daa9d26f12c03a635107d82eb909ac4ba89459450bd63cbe8bf329bec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5253f43bff704a8a63e776f19666fb94d
SHA15e00f9be17de01bf602b4f01cc9afed55af02370
SHA256eb794619e0da13ebabe22bceab9b2098d728aade039ddcf5e89d66588e06984b
SHA512acf2054d966373f0e04a8ab92aea84fd7bdea883f18d7538033c9c147062f7856e243a8172be8e51be21d3be22bff989ef63ccffb656a6e03b986d6afbb2b9a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d12f56ade6d9aebbbcdd3a854aa409f8
SHA1404c45c4cc941717bac669699e980f43336bae34
SHA2562aa930f580fb10b5b6c0754eb2de5b2c776c5a559fba1ede845602b804863211
SHA512dd9017f18fbfc0556a9c941117e7b94ebb4dc7f66c40054372c800eb18ce8fdc49c42fa4be3de2bdc959bca8e7533d49c79dea6f9fe63329df21dffee59d9e9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f47407948c827b5d2eb5bdf07cde8ba
SHA18ba5a229d06112a68918bef8f6559c8e7e2d3eab
SHA2562b0d0c196a2a0987a49389ed2715067c62e5fd59a2e91ff0eeb00df69c791755
SHA5126f00dba03e2753f550b6f06badd854fc77ad44de3f402de4df5383d2cc1d72d8bcb9f692fab3033044d1158ffc4c5bbf28a0e9de3105d39df6b64f92c264e060
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e995a2004904a13c48c8912323627c02
SHA115c6b7a95627d6efcdc543b2ece49efe29aa809f
SHA2566e7f08ca51fa5059849dd7d046c18165b0325837f68a45ee598394753720226a
SHA51294342e7223bdf2a3dee35a98e35baefb5b920ee1eb88335e831e832c915498e5c9c7b6628899e4443f65fab8ec06948d9df28e908abd76eda6b17bad76baad55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb6e2fe3396edaa766dde9d0b0e16845
SHA1ae9f58cddbccd8defc66626fa40b71c75e63f58a
SHA256728425ac52748b7edf020762650e422258b55a7ab6dca96189ad210f4f05b05b
SHA512ca81f81ea99ac279095cb609a9105b95bdcdbd6aafabfc37663cc5be99846fda7ad27545a806cabe036d6a5db633c52ba0de789b138dbc76aefea853282615b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b54bb646b3c7f6acf25d57a5425718db
SHA154ef9a39cd6710836580017900c08fbd9128215a
SHA256b0955889ccd85742275d876a66c49053e5cfa310707e6a50605575b0bc9604c3
SHA512b23b151ae93033a7acb538a3b2a4f5378c219afed65c58b753f028ec517116f2c8e8f49504b73c1f5bd7aa788018556ad1657ebf2fa776fe5286496603163b7d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b