Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 06:59
Static task
static1
Behavioral task
behavioral1
Sample
be1ac51977b0d3f69dbd682120324481_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
be1ac51977b0d3f69dbd682120324481_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
be1ac51977b0d3f69dbd682120324481_JaffaCakes118.html
-
Size
70KB
-
MD5
be1ac51977b0d3f69dbd682120324481
-
SHA1
3b185088f0d3e63c6f9f7d4392b7163d9a84fc02
-
SHA256
857859a481fc6956d2b7c27f210aa26b788c4f3fb8a9e4986fd7486eea8b6cea
-
SHA512
43d0ffc876b104711ee298dd146f9d61c5ef4735661f5e63f0d8b8c97553a36eda3f91b0d703f0ba891eb186bfe36a50c75f71817adc422cf33019ab221b6abc
-
SSDEEP
768:JiRgcMiR3sI2PDDnX0g6sg6qLZ3ZPtoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQV:Jp8pPKTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{790769A1-61E6-11EF-AB1A-5A9C960EEF88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430644664" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000006eb24baf29b7a504f7d9fec3674fc12b2506409434ad474e42983596c7c84c12000000000e8000000002000020000000fe4268660cac346fe45aa6ffb8077926befb741d92bb4c15d3dfb1b7f3bbabc72000000001b8f71cdf6de3cccefb867c955392c52efee16750427dbc0dbd47a81a5064bf40000000a988c7a5a942f214d34dd831f67409f05aef50893a541304c4412d27979760ce608a4fa4d34f0c452b4571977bcea67605d1b36c35ef3b17cecb78654a9dd4d5 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b055a54df3f5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2232 iexplore.exe 2232 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2740 2232 iexplore.exe 31 PID 2232 wrote to memory of 2740 2232 iexplore.exe 31 PID 2232 wrote to memory of 2740 2232 iexplore.exe 31 PID 2232 wrote to memory of 2740 2232 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\be1ac51977b0d3f69dbd682120324481_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502b2d2766372ae00a8bfa42e08e3d174
SHA15e3991a773994fa93797058062c991556eadd970
SHA256bee5ab05df69272fd957862a5fb2d1941568a9d476525994bfde66457cf8e6ed
SHA5129b2dc726be8dbdc943fb09300a04baf411e14ef56de90ce49aff1945bb4bafd3b836167f921a47020cb09b8ab379a295290e66964c344bc42d7d7295c7544be5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540b68db7c025085a6f447026c9c432a6
SHA19a7f0e6ee371ac5ef2889cc8a6178cbad683b879
SHA2563d2b2e27aef1744f7f536204f089f4d98fd073e0f9330608998e7a76e167385b
SHA512fa15303e72b5e08860ad076bede0787156b28e986a795554e81d86b19899c797045ff2d309b58f9dc4fa764daf4ab5d88d52f27419d2e5b5c6da2a6cdc7cbd01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576273d7e797ca97ae7f3c27ad448240a
SHA14558660da84607462ba94012773b99edb7614a4d
SHA25621bdd496e3c282e5d7de597b834d6408d96035836e9c75e8936b15f08e1cbcf1
SHA512e0c4195c9a43cd69b3c8196eb2d2b50df9d623efbdbcd8cb2074547ce083b4623d37ec6544138fc7715130d7e7895960669051a5a503954fa6bb4bb1255712d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8ebd46474827712a972792c4f52d1ca
SHA14f1d1ae6b4890b7a8933bcd9604c3ce9bfbf21d5
SHA25654a4d08cfba8115d9c5725b5efd32cfad9bc0920dc1d2bf1941dce158073f134
SHA512d95d1c693e941fa1124b0b970bc85b8dceebdb4ce699ea8de0488cf3c01ff9c5e1664ded4052ef343564ad46b1d4d457cccca8326182e8282d9fb3e7b87629fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521b94a72ecfe664195e310e3c130ec74
SHA18f01a44d63ad523e64c43c35f0fe960e453d610e
SHA2563d2aac35f7b39c3b544366c1f80b700e420ff0f378dbb23cbfa11da5fc470581
SHA512987ee98380166f329ddb72743b970e8c49bfd030bacd54e23c5db0171589d0b32bd7e2118668995519ddfce6b66196e5bfc12d500901e1d32db0dc7d00231397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bed6c5288070a94d08d369ee53b6f8b0
SHA18156d81b786a6e3e2fa4823ef7f6a71f8d423225
SHA256b4d685c612fc37187d889fa7c7cd6f55ad42ee0f7e60fa319195065754f2c72c
SHA51245b8a61928c80fc5ed37450936b5a9e7ea6a73e64c678198040b225f6ed0e169794558de4bd150b92497e6012434f61d1b0bff7d4008aa1dd6af5cadc5970754
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a18debf5c253900f1682a8f72ac18aad
SHA136c8fe6b7a6d88be10eba426be9f04f89d7200aa
SHA25651fc8badf9a1cdde2e803abce1535bd38a509a569151c7b77cf017e25a041f07
SHA51296a59f252b8925e30bd98521fb39a2a54fa6a1b1c432c7a18a04ce125dee6ff6f0ebade82ee30d1386d15905e7ecc8673107cafc73ce525d1a29acd98ceae28f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5c3b1c59ee5a25b775c5f13f9b7a128
SHA1817584633cf5db07ce38fc3d60191dc440a1bd45
SHA256a727f6caf35363554602a451243be885e03acacd6326bf4523e613c066d2bb0f
SHA51271d3c774aa1c4b9066fb118eabe2bfcb207511bd27a326ea1cef7ce25740c4163f9c25041adf09984c63665bf2888ee6bc8efd52f592fdd850392cb88652b901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6642ccf15b868f78f22c893ff94cacd
SHA1072fb498d009f19a81b06b8b605fdc00f17f2f13
SHA256286609b417e9e457e0c347e06f4edbd4764228979cf53f03faac8b119b9e9bb0
SHA51267d195af5898259f218a515ace28e7ea04edf9317edeadc1087c2eb51861ebbf38bbd491072bbdf9fb45fe783f9f460557423ac5e5a8718ec88ea607ca9d1e92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524e3019b11042cc0444eede288c65cf4
SHA15fc8728556d4d7f6679d768e6a0d32231cb3e9bc
SHA256b7a2f42f1ff266ebfa2b569525686c7ac60ae1955e74a68643e0b9e8f308712f
SHA512b6b0107065f2d73e13ccd19b21b9a79c606b8c179eea0fb34915ee48233202ef9766ebbe31976a0d6c0053df0e5f78ef676ac3aa3d527c6698702a6a45979325
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5710756017f879954bda0dd4da16db30c
SHA111806515e91aadf4b3de1e84a6faf430e467c7be
SHA25650e17fa3d5048aa3367bdbe7c9f4fe49e2dba2af8c1fa368a2173af0e5222f10
SHA5121cc6f0ba5b2b2b11deb93735390e64436263a0784e91d9309ace7c345bc49318eee9433e8ad5f8156d56197e8777ba367beebe51e0be8b23b617ec82bad7a773
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521db19e0f569d4e86b73fd1bf815b746
SHA19b042e4387bb621b71321d0472885e52bf43051b
SHA2564f6c0a880248f00802f04cf9d3414eb64fd66e46e715bc7bab179a6d94b236cb
SHA512a0f0dcb25c73eb21509e96cbe17245b1541344e6a86cf579dd4b28347f2c3b0eb5bb87a6f015d9d8af374e6c79acfa6b5dee94d25c09c3e964ecbf58dee79097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559ae8854ea438eb08b370b987ca8ae48
SHA16ad70781e0f14f599bc332c25cf789c3d27723d1
SHA25621271da4060f470df3d7c323a004ffa742616440827939c50fe318ad29ebb1e0
SHA5122bd444dd0da3e7b6f39567643cd9cee2935a686ea352d1b00b7b3f1cb733af3c3b70fb9dda89fa7d8c1993b77adfb47e296c2ba22cfbdf62b837c8221252a798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e93c1118b4c0e7c83f7a53ca6539fbbb
SHA1855a2152d2ef7cdd5a9e555a6fbb388fd17b1328
SHA256784892f906c09f302c20061dd28933096be4141d08223a52308896f4286e9fbf
SHA512ee161fe507292b378abb796b02ba7365ff4958fac40e847487660c66da1c3c77026faf36017fbb6f9d31927cac1657f0010dce26433bf4158d8dcc8db8f34dfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c195471ff7ced9e26e3c93b4e213b30
SHA167e76df665e6b869ceef6a7d0c6da40d49f7316f
SHA256f5b11d7fab95b06e04430d6be25de72199fa13720c3fa39fc80b0359ccb72d3e
SHA512182cef3a4b48bfa23ef0d4bea2875f13e378a44bc84b78d208c7306be294693ac27e9a10cb204f62311dab8ec6b2ff19f06eb01083f1a2a74cc7410f18afecf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0f95197c9bfa33fc0cb5a88e12caa77
SHA1cd0b64947ed3b99de9f42bcbd974d5af3c2958d5
SHA256d3191dbb2d04287e13c8ec079d63eab08ab13364f76154416bbe92b4bc7e9a55
SHA51261f761c7aa13de8df359c031de9480d780c08aa1392493b947c86cfde12a8371321cf0cdfb80617df8e33ffcb9c192ce76803682bdbc9d2b095f546e5e84d8a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dd5763cb06abb30725026ce6faa1e0f
SHA11eb7b44bc325ab5378fb11ac98ef307908952f12
SHA2566b79547822326f4cc0aa300c1107c798d9fef9e9fa7b26ba8e8f4f091308968c
SHA5120796380849953a918b0d2df13e8713fbc7c105ed5362ff73de9ccc3a8e91a694130e667d9ba23b0f5064b8326795ee359332359e3e951d7c6a8db9f2d3085c0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e53c0c39c0a2fb71625689ef3408726
SHA10a49e2801d4011f2dd5e62e48ababa08fe33ae0d
SHA25631864f0dd8f75a914b65f608cf9628c52ff0466390ffd1bb96739f143dc19ab8
SHA512ff29c11bb3429c459341ab0d3072e5c2de221080ca56cc185b0a7d04ef75bf9ec47e674e746d16a097bec39ecc28dece619c35b6037ea0774b727ba9b573cfff
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b