Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 06:20
Static task
static1
Behavioral task
behavioral1
Sample
be0bd5e630e7783b0c0a245bfe520aaf_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
be0bd5e630e7783b0c0a245bfe520aaf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
be0bd5e630e7783b0c0a245bfe520aaf_JaffaCakes118.html
-
Size
461KB
-
MD5
be0bd5e630e7783b0c0a245bfe520aaf
-
SHA1
9a75e21b5def8d8a834aac6243914da2fb32bffc
-
SHA256
50c7b5882e8592989e2befcb2b2da14cade9a34e5c455cbee13c31a55b2d5826
-
SHA512
3884a0428a3da9c891a300c0b1fc0aae5bf0861754c7f9af474c9efc67e8a5c88162b1ddf2994e1ffda0aad3a446a5f3a6ee44234c2a67f5c5aa85eb4e36fe74
-
SSDEEP
6144:SvsMYod+X3oI+YgQ+sMYod+X3oI+Y1sMYod+X3oI+YLsMYod+X3oI+YQ:U5d+X3G5d+X3H5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000d17c78a4dc023d25c0769fc64c4a834dd7970e8f9f349bd969213a08088621a5000000000e8000000002000020000000a05b6c78273a1076713df60c685d89873c63e27a3dee16d205612540daba8f2720000000f579b2aea397354e68f3b4caf92aae937814ad246f13a8db7df2b3e6ef883d9e40000000a9a23bdcc80ff12837862930927987d781e4e16a77fc4bcbf53df91dfac2a0793029af3cfe17fd07f340a7e8e2199b8e4d081fd0b6c1d8b2ff990164f60e8085 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430642275" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E9156221-61E0-11EF-BC8E-E6140BA5C80C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2054c6c3edf5da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2344 2104 iexplore.exe 30 PID 2104 wrote to memory of 2344 2104 iexplore.exe 30 PID 2104 wrote to memory of 2344 2104 iexplore.exe 30 PID 2104 wrote to memory of 2344 2104 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\be0bd5e630e7783b0c0a245bfe520aaf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8471b6554aac7ff3249040baf4c0249
SHA10b4aada7766671c8cc39d154b3157426a59b7620
SHA2560a062b15a6ece82e9546005f5901a6e169183085978c0af8072f018a9efd4bcd
SHA512c09eca985c45081ff1c11a9e5a5cf68b341c25eec65333ed9c92f2e82e8ce6b48b5c461e3d01dd75ca28675b930611848e75c7e2ba73b81ca3cd6fd123746225
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8d5bae799e54bb23ba6c99844b83ad3
SHA170bb2f0e3c21ccdf828b2c6659bee69dd5152b6a
SHA2563da79d258ee89956c0d4f240a4381a690dc4fd3276beb807d664f44fa38d3658
SHA51227a0cb0bfa52152fe732167541aa54bec5d1225408b14a9af12d6bedca765461d775570344ddeab450420ae5ef7de52ca8b7617722051ce0840d21bfd8cad0d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf59c7daf46ceba122d0e4282c89d185
SHA132c27b5f0841e1371076e9984fee6d23496cd115
SHA256802846937702a902b557d0c662f913c8dee83d202fab35d7cd4d5d24b02cec02
SHA512b6dad3d53ca4af033f1ca90f2962b5b99466b79fb9b7c652354369acdc68c31f49c05072cc54f118248d67708a46530ed681ee18e6f0d68d5d31e7f016c55741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5833f65c0289dc134f4d4ab2dba2b77f9
SHA10cccce32e2235b29d7c535c760bec77c1059dbc5
SHA25690acc949c2335bc69ddc5332a2b525fcd92482cdb5e434f402d90200272d4a73
SHA512f8f83e0251f38379e6aa84a9afd96926ab5b90b936b1cf0cb1307ca2e3aaabd042551a965480f20b79279402d6c27495d342e12809a6f7c00f38fd4020336c46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd9d36544a0c556b6639bbc375ed4faf
SHA1840d2a69dc8000ba130f9e7c27d50f96dcf12df7
SHA256a8877f48d81aacd5ba125f7a82110cb3c4f65352052f8da8254895e662362922
SHA51235b74c32eb2c21c1d46a91f57b79048de9b416fa116c74aea397d86fc197ab0c1ea5843e570da4a2045e56a389e3aab67c349d39bb530d2cc21d3b41b03e256f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a56a63af227028f6d395d3a862ce5149
SHA1decffc5b4b978a69b67e0d6612644272c00da315
SHA256127c33afca10a5f104ece6b21f7301704ed8c89325755d6a36835e7543b15233
SHA51269855d80322322e5e9fc7fa5a15ce9c4923ece6abf421639e5087cc8750690e2de63c9df94f253608c79d23224d145116d71c8f213fafac0ca93c49a54583a57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5007f6600b1dcbbc6f73a6a2f0518b2fa
SHA17d81e71f5321e80f62493d706902c9371dddd013
SHA25625e70fced2c50d45473123859779126f73df62e1557265230276a33aed273b90
SHA5121684c2751349ea754499ec53dc36dcbfd377cd020dea1ce1e885349ade54662f997662bbbcaf9c2f2722ffa8c063ac7d4e9063c9be7307d2e900c7511d26775a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c23392801824ee12c24ee0e84346ba79
SHA1f72e783ea9aacf6c2af38fa79d678909b674a916
SHA256d3d54a21cf0d5e6c886948407ab8f2f5bbeeab23ffe66f9f9afdc2924a236aea
SHA51261d4df134033c5e052a5d3da85d0284d6f222d0f28f9d292381fab1fd0a0161e1c16e95ebd434580adaca05dccbe2663cae17d95d6e469c3f6d0017ea4c80009
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5211740a046c6beb54b09e9214cb245c6
SHA1b582065080e21639c8bb4a97d004809f8188d897
SHA2565dc36519134d988acb6e46f596776d6dea5152e8296176eee97b10b7c3d98313
SHA512962dd7d18905d60986a63d8f5895935646468248fcd463fecc0cfd51ca14df0d51fd58b1a5028896c0f608fcc03044169f13805ec08c6c578691a1a456cf0cea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580b93c72f4dffadb6a4c3e93d2e01740
SHA10885622e9a4481958109439bc8a4e564690e3157
SHA2564eb6cc84aab45183b6b1db1bc9db19b7b9d082e4b96aec8710e57a3f58dd9241
SHA51259c5a755e6935cc76651ad5a7abb66533cfd77f5c8be191a7a01ca80b4013d3852f7abebeb0e85970d0141fb1ad35515e678a604d5be972c034f40de659898ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5706ac2bf954aa2e5bdb3d950689951b9
SHA17ee3a1032bfb0e100c2c0a63bd49adc7df4d9f38
SHA2568a7ac6a4aa09e2a06dd6cafd854d6a26aa43611881671cf8f505ab4f8d5b442a
SHA512dfa90af041f0a2b1a8c0cec66f7cb6ddc0133a619bc96acd18916a4ad152d03673ccc22d60ae00e8e2f25e4c5bf5fe9da0866935cdab9207764a081689af91a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50879adfb0803bf6ee0b2658c679adaec
SHA13a33b67cfd8d85ffc1ea80607df92f76c678d04a
SHA256d3fb6926ec0f6d14857d1b65c848237f60f6ed49085974c23839f40df04f8106
SHA512ec5e2e341236374dc133b19aa3111741d4efc56939fd4cd0d9616c2749b17a50323a4eef384b2164122eb1573b2da11086617683e2c2f83d112989febed1cbf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ccf62616fcdc5b66cfcdf57589d60e9
SHA182745f242e90cded14f07e79cc6bf2217cd83b70
SHA25654914e947afb45472f8d595a9a6fd496846fcb731f7d6bfda14152b0950b9a07
SHA5129d3cb1f0c0a31a9197f4a912ee6e7adfb816372d76cd1159cdeda01f5bd62f4fdf08c52813ba4420aefdf05f022c4c4b6a85472a9d89b404329f3f0a3597cb96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53449fce57702ea40f426b25e5950c09f
SHA1fac03adaa87c7b03bec888c04e6d16468372fa18
SHA256c24d04ab679f4577ffb2df94418277cb6ee850ca0352f269df5764790f66b52c
SHA5128c59635819ab06aa977b38dc4579a9ac45ab39a606759ec576a016fb9b84e509ccb8616da448d5e4b73db8ffd0cb9b0a0b251d365f294934e52d5780275915d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55460fbae3814429182ca27b17d0696f9
SHA1f05d411f692c4cbe3ca8b2862e8056edc9419db3
SHA25672fec30b1ea93729254f757ea1f37ff20500eef382ef3d820837e23d65e7ff9e
SHA51200b094e094f4b84a89afbf39f3931f05d1fb32c8fc0f2614cfbca22eb5d87bbc5b635edfc297b65e2627bd749a5cbdd20970c7a7cdb62dd070173f55e27ae685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c58bd4c6690ece20de0e7e339daf43b
SHA17d9392496d9010cf4d94ba904f7254330f8a603e
SHA256b968ef04d10853ad97c673ae90c069a749e1229a381772988f5209c2ce6538f5
SHA512ef310e14a1f89354a7ba57e512b069e71780f6b3195d1fe3c6bdd11cc954e3b2160f0c2b4b73e9bbb38973ba349db65e34fb8410fbdd8bbcf1e015c934b12df1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59824f446b480181b5c815b4b2c3362eb
SHA1c2d83e55338e4e9e730d1f143c99f01a03f50cc9
SHA256e2ac7652fc33aa8444a5886ce21c68b10b60182eafd46dfb13c66107f8cbc012
SHA512a443cc267776525b0e7fb1bfccb2c9ea2f4a9cd476abac64ff996de35c74bc7cc55a00cc57057000af6c6486b6859a4b1664db677962fce7761bd5af6723b08f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef6c2bd60103b2f441537f844f0790b6
SHA138897a0c1284dc950385a63561d566f3708a7a80
SHA25651f653551e0f5d9fa725a9fef2ccddf399220a09f9085f954175e7a8e15c19ae
SHA512da49433d76ec1ac6b8261fc658ae773c8beee8588f06863c16c6b7df0fb554613b4552b6fc85c9faa8eeca0a9c7579243e724c905b8fa29a5259df6e1f2cd3f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5958f0fe211b2d9dde84e9a2329f60af1
SHA1c4c8fefad64b34a16ee3845cee11df92199f6a61
SHA25697dc26cf5315c922f434282ff3d71369ebccf968e26e9c8426dcce35c66b300b
SHA5124a28a79193940c575dae99838b16d4ec798cf5956ef3c29d135e93e2be5ea7d7a67b34fecd62ae39e6b64c19b76da20194717bb6f6113dd98a67ba24b8a32029
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b