Analysis
-
max time kernel
137s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 09:08
Static task
static1
Behavioral task
behavioral1
Sample
be477209f436880aa55b78625fbc965c_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
be477209f436880aa55b78625fbc965c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
be477209f436880aa55b78625fbc965c_JaffaCakes118.html
-
Size
50KB
-
MD5
be477209f436880aa55b78625fbc965c
-
SHA1
85a62497653a504421cac43c7ea794170aeff572
-
SHA256
d3d8570fac5735240bd125c3b35ba4e5ddb44a1aa2242b63ae03d9c9eee20d4c
-
SHA512
af40915f3b5b9b3f9250c9e1a4df0bb78322a11a13b1803923eb154329a57523f02c994a60d058b90ba083c4994e59ed9d394998ab7258c2beb283922a0fe379
-
SSDEEP
1536:bqF5o/JbpQQ99nS27gKsLtTgyvLew2ewFewfew/ewkewAewBewbiewleHn53aIn:+F5cJJJT5qIn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6866ADB1-61F8-11EF-B892-EE5017308107} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf710000000002000000000010660000000100002000000095577269ba9c884cce48e5fd50be8ce6bd433423468023dd268fdfb7cb59dbe4000000000e8000000002000020000000275d1d0ef2e62ed7f05b067623b5cadeebe54fcd4b781c67709c93b120da69a62000000024502b7250eb40446ce256fe55e6ddd695bd494594e9053bf10e68af792fa059400000008f0ce5265f4f57cd397d079cd3a486f797fe627a6fc286e665cfee7c9e1ddfd8654cccbfd49704866a94332ae06e16b3191bd91c465491b2eba17e933959fb17 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430652375" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20094a6905f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2524 iexplore.exe 2524 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2340 2524 iexplore.exe 30 PID 2524 wrote to memory of 2340 2524 iexplore.exe 30 PID 2524 wrote to memory of 2340 2524 iexplore.exe 30 PID 2524 wrote to memory of 2340 2524 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\be477209f436880aa55b78625fbc965c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5337d380d4ee03bd1191d84ab5d53f163
SHA152be49e831d2a8ac041055d7ffc0747613255963
SHA256471d01d11d07349417d0de738ef6449b9f15bf48f633710e2b2a2dbeca5af883
SHA512439ff2e23f116c707ef5f607a3a9c5702c369278a57c2def570a2f6415dd026a2b68d75abc64d2e3460dc07263233df48dd6072b54e3090539f4829cbd98e1ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d9fa6da48aa36b99c3ac3f41ab38b72
SHA1c5e7d0f931bc1eccf19d90b1f9e2a97025116741
SHA256551cc95ae67e8ab158b09b84df1eac89c6e944e3dc1e5604854c88d4f8104ff4
SHA512075a7169ef6bfccef95d77eaf6b7521efafd0950a4352d7e528df62de4d541888abf52845ec80a23ddc13fafcf949cdc1c49107b081400f175d67593cf8b2888
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b676b8bcee1c4afb355ccea40d1105ba
SHA1c4e08de53ab1df72e38ce6777950cb50a74127f4
SHA2566337accfd63c04b6959b4655283f0c19f4453a814f83358a73ea5e76894f3a06
SHA5123baf2d7da4a7686d58eabb1f47aaaa953cff2ca110415114efcb0dbc745cbf88c8c1469fcbf9fb06dfbb6ed78e8a9f1057c9f04c233ab803af7f6f2d835730a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a94ca491e36fc8779c4acdf84c079d83
SHA117ab66303ca4e5a0cf8df0a9756a1ef90660be0b
SHA2569dc5ccfc58ef06b3ae71b4cc79a498db1b07ecefc2b3c4fb61ed6ed05f215e35
SHA512b53a7aad33d8159ec14ea006ae44e8ad7717b37166b3103c7877804e41f7333aeba9661a292cc89f82fd87f6a7b7ff6b730954f0e67ce48fcda6f307f46d4de5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514fb3b9f399a4ad7414c0cf28846e5f8
SHA18befd02f86839894376c2562d9fcfc2b739dabec
SHA256ac090d4e6728ea626f51141330d48f4540813f34566638ab6f582bc8631ce215
SHA5126da485b39c4d25de22aee3942a2f7a4cc7e6c2028e6c2552b3fb15e5c8ccd7ae2a2f5e73aa960b2901533955fb6bcec4fc858ec8491af759bd293304fc87c017
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572dbdc892bee67a2f8f2ad78dc04ada4
SHA1500388cff7f16e4bbe5f0aed7b5e2008c87ae149
SHA256e884e01217af85adbcfd4ae7a08da624a142d5ae335749ecd7bbd6e3aa18029c
SHA512ce11210648d19a1cb15033f6098532cad215b11acddcaf44b84d52cd0d5d43eb8c6d780aae95f3412d0f92bc9b93b14a37b57950f5ca6ecf79f0fb12d12a019b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd757f7251064f6d68d5d90306c8feed
SHA1eb066a28f77cf7eae97057252f90ac9ecaf4fea0
SHA256ea165bbb252bae95fb20e394a4657c8342c686d5e3067a87e82211df197f82ac
SHA512dad1cc931051d549ffc50c12ac242c1be674518235d5e6e0b6087ac7691676f9d89b939bd1956d34b60a1c47ec5e77a2dc008fdf108248658f3b08e380489ade
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51daabc419110bb8a8b27083ea7bf1127
SHA1833f648d0d087932665c203fc5a8a28da15548eb
SHA2562fb621adf931ca6f668941cb810b3dc330d46cf1c9ac9eac1c534d93c2550cd8
SHA5126a9f2df29f7e50e17ec0e9a1a79d19c3d9e4dda2b8c30ae56a7368ad0d18e2cdf696a82aa4ce3f779a783a9af21b89b839fcad59db29ac003c1a638a9cc41f4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c95346fd0ce9912725baa6d05dff6030
SHA1ffc26db9260fce16ca4f4091fc71e2aabc699556
SHA2568d66bb35c8dd6489c06f55cf27ab4262cf2dd7f6d98e1fa8aac3fcf0b71d3f9d
SHA512116812cf6c186bc0538332a530bf06a7c83d3718e81ba1c7e563006a352e2f957ca88a364a4375fc18fce5c6fc1ca4f6a5b12c12d00c6b7d3432a0e2961db830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50816adb64f4d5f8cb2c499f5443e8769
SHA12db7ca95eefb33c4961888794d836e3fee70dfea
SHA256963d5ddf45ed130ad9a157e3b5f8e566461ad4ec1b62cdf59bd365fc02e7c441
SHA512cf422af5320da772950951e3a3b688afac6b0db285e3d8c47fe97c814400246623f11dcaef0a4502cc354da61ad9497379bb3be7da9b55e0cc5c66736c7a6d5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517b39f60ba52e4adc607a6e3cef60690
SHA1ba1e9640b7ed3ae400f10afb15d52c1714417a3f
SHA25694b415562461471b4eca8f1868d966aaae5021a7df3a88e121e24e3e8e28c233
SHA5123266a18aa64bbc5d85cdc89db49c696c7f45f0485b64b95b81d55dc3ca408f4bf6127ed5666287ea1c0bdd72c21cddb265d1d90808fbd5f0d8a2cf5cdcb6d3a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d859685890aedb1c0b263b6a5f3a4e7
SHA161260bc4c2ac8dc7ae01279171a1461e5faec4f5
SHA256d4031f85d74c31d2bf64b4d9f4ae2a2a55448a208c82b7af327034b79f8f62a3
SHA512f958f61031987cebb66b3b733936c7277ff3bed8a7f03a5155b35e246af751bb9ab61975bcc67ea734455a1c6cbfc606e0b6ed88dff34e7e05af31a35611b6a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ec7a0b89b36e79a199caf00ebe6a061
SHA172e3c726a804ac53f03a3751d64f3e01f3a3f22c
SHA2565792792288eb4d530aa50f99653db8573ee09f6abdd998fdeae649ef7cba3406
SHA51234393bae97322ce2c1b0c4ee25d127a2b5449dc78558f9e6c8b8af8fa81322c8b8df241f9751c7464e427bf659829464d4026fe6c0cdc316a2dcf23b077e3f2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5a48d3f86513ea128f7f851803ac53c
SHA196181d1e161b2bf66287eb2148fbd1e4c495f2ac
SHA25646b12a6098a08454c64d05f7f5e22a8d02f47139f081203db848af7a1c52bace
SHA512daf9db904254bb514524d51a3637d4a6d60938e1a7eb7dd91f107c3b83a7dea8aaada0f637316e92186e731c9e3f788a19315e2c4465b54548c302e937a804b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539d77a3264fde1c1a1b163a1faaf20ff
SHA17c72d475b533d868d3846bc9b9529bfbf41d85a1
SHA256c912194ece2a321380c7853244e5102cabedd9f691bf74292218b168baf274d0
SHA5122f664120b8c8364e0d65e02ee3ea52e09089b5e28d4bc1541d1ca252061ff8ced3dec860a361cd704092235ebf6a61732a71ca79e7cc1561be15e5fd4cdb0cdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a7c3807152d9ef93b26b2c49ecc6a37
SHA17da00badae3b490b82857770d7e545c558676af5
SHA2569c7bc6f0f7db176283cd3a7622659b7c0df4be3716fc7b445dafe87077e57001
SHA512c7ad0e6e970cd9bfed16f018f61ea7106008bf3949b7b6ed654c4cdf0317e23f6a3d8e7f929ebd776f1a63f98928d89f693d3f7f7d74f23c0f51d4285dfb3ff8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5ab2831c1a56a26f693ab87e1443c7f0c
SHA193e4383eb133bd661831c4064d92245890d5a696
SHA2569561ca322b6e9d0d59c6ec9b47a9b42eca6991899c924e6bd65445b83f4ae801
SHA512ba67baf17119b9f2f97a5a6d6022bc9142d194db542496142b07d1a7102242d24c3b4c767b30395dc765f5042573193b427bc4892bfc2cbb8b4e47fa0a4044b9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b