Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 08:43
Static task
static1
Behavioral task
behavioral1
Sample
be3df11b3298f664cb525f77e927a7a0_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
be3df11b3298f664cb525f77e927a7a0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
be3df11b3298f664cb525f77e927a7a0_JaffaCakes118.html
-
Size
139KB
-
MD5
be3df11b3298f664cb525f77e927a7a0
-
SHA1
3ce100e4640f6d9b8d89c52bae121684daba5d1d
-
SHA256
b2fb3436e6881cbd19071728484c5ddd766eaf785f3d31826b82feb38ba2861b
-
SHA512
7f0a6f0309b1c58748b34240683d5b484d7da8f6588dcb37682cb3415a9a27e7aece50d79da3f25f50419b83f3b7dc8e66db652ce754b39278cd38212d1d33b4
-
SSDEEP
1536:SKbVQJvlUwyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTs:SK1wyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E5904AC1-61F4-11EF-BF23-EE33E2B06AA8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0caa1fd01f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000b9da0c160522e7982c7487a79ea1cc562967bb6515d3b51067cb7a1a6019e8cc000000000e8000000002000020000000619f1d0f7588e15f6f59f0193fece5ff9d009d03fc61c4dbff0be62bc6b476d120000000cabc976d29b696f898f5c3e66cd0656ea84a69a317d3dd3b3da1b646942acfc340000000ef5370f577f7e1171e4a295ead6077bc00d6d1ab8698ef49b44799b21ec07d53fa4d468af9e49d11f03fcfa3b0c9518ecc954a3814810ac3395e31c729fd6187 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430650860" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2568 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2568 iexplore.exe 2568 iexplore.exe 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2568 wrote to memory of 2284 2568 iexplore.exe 30 PID 2568 wrote to memory of 2284 2568 iexplore.exe 30 PID 2568 wrote to memory of 2284 2568 iexplore.exe 30 PID 2568 wrote to memory of 2284 2568 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\be3df11b3298f664cb525f77e927a7a0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2568 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac485b0aca71f1c45165addd8ee96a75
SHA1707f78bc32bacfad1a149be66abed7368099e7da
SHA25617e0b326a5eae08a13c2fda3d5935bb9c6c58a6aae620dc11f8ba6da5cd5f923
SHA5125d6b38cb58cf84f45c15adef83deb9921e1fc614b7b5a5cba459dcd0eb70f8c5cb604adbd8c7402790c0421de1631811457c6953c1ffd4405cb71e418bf4f668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e82cdd96df49b33d88ffba46aa57079d
SHA1f98710cdd282bff4e4ba63c82c39ae9c9fafc98c
SHA256ac82ec3e7738872fa5450f92cde184122ec4aa5279042f55b60208752bd5b605
SHA512c427ad4499cbe4cec893b27a215654325fab09c226f42fae7a75de5b45412aeaa35a6797f307049bbe4e0196db22feb2be5056ead067d8873c1679911d9f703c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5021a64fa18327390a51a2a3d586aedf1
SHA164af5c689092a550fd614884aa2e6be3619e4f23
SHA256b1541d35b59d4df6debd1fea97ffd762a92f7b34c465c4fa8f3568b9c62eaa62
SHA512a5032970973e09dc1e34f96e64ef358b4f5784cdd5cb1c788174b9fca6c0881ffdb747478cc1215ceec8b0017e6f2ce49d5712c750656e6861ad8deaaa62a2bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cdacaa83bc8cb793b8d37a8c0f68f70
SHA10732eef957d9312c2b1b430fc7e9f86c58d0395b
SHA256aa1a0cb0e6e43e43abeb602bf9c41a61ecca4233687611c88a9d5697e4447a74
SHA512ec2ff65e74516b0ca375926b1c1f359f9cedf05805a9dbd917fc8ad7f0a4c631c76892d882ec219e289bf565ebef8bedd8e760d3da4d272d64a848e25fba9b76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2c07d503ffdc2118ce07958bab273e0
SHA174c46101b20a009710fdcbeda57a27b0d3f0ee51
SHA256d09181686cc779c9d127f908a9316186448828947859eba19db7115e221c1421
SHA512415106a341d272c7c86ec3aee48d01822ddc0e4e63ede984dba4504b424f7cbd2e63ab41f2d5443c2df22a2d6bf8d450734101a3e96e051269719b464afe1c33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6b9ae58f69bcdadb7260c8c24968dda
SHA1f4e808ec4a159a5f055f610259efbeb8e0d33b9d
SHA256f19b4e65a43170f8ce97675901213548466f02df2fb06dd84a49b468358fa83f
SHA512234bd90eec7f6b9e44f41b3bac3f3e5877fa2c093ca2535b4f5d556ada5329a5bc4fd7f640cc2117340a7662a6d29cf7c9f7d2b79a37abbc3286b2d8cb86a2fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561198b633a41cba9509a902a4bcf2617
SHA1a416db9dea360935aff760c5cae58c7c27ce4286
SHA256bf55faf5e6334fecadebff7f55a43f62714eb64835f8663e80a946e7560e6092
SHA51228479177b0978402970b4ea04cbef1e8d59f4c1576ca4ffb573d70c3378ef1ec2ee17994e4519e2dd2d4359505e7b2cc4812813fb4c1360fe271fa5c1692d88c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58493c9eca30c98e85bebca589babf0f0
SHA1fec92de74a47021dd7fb99bc8b1e0b3105c7e768
SHA2568fc472bd8a4d48ed7f0f7bcc5a46fcfd2ddc92e3fe3c344350f4cbc77968cc9c
SHA512eb04a3fc06c6be1bf2f6fa5433631f3e7cf6efc1a14c82eaad7834013739b9c61e2c32b274a834f0decf866a98e7a171b6b18265bfc609f6eec34139a28c1e7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1c0c2a09e506e48b1df0adbcf474959
SHA155c0a17a1bc77f4fe1697ee325d11b5d5905b769
SHA256809817f390b17cd54fcd90e47100ff9a9b3fde200b6a319b0b266aaccb75a001
SHA512826d48988540139d5498d54a91bd2a06b55067c7e9fd1702768a682ccd771c7c8d810c010687c43c3f280e9670b65050e6f2a3bb0ca6f26651dbe3699eb0235f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a248b1be005e166cc6e86bf3ae306c3a
SHA1f9201b52e9ccd47b1f98e139b8878db1ce9f9301
SHA256235cc7f2c607e0f56e33a07b75afe3c8d37e0a546017be395f503bd8b6765e4a
SHA51294f9f580d12596814bafef58f53548ad3cb9c4efbe7a92f5f8bd852376cbd86301fc929d2ba29c641cad9c0b6459d33b1d007f9c884d546e004ad0a0f415b13b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ed6f1c9f9aa64b2f52d99330769313b
SHA12547c20f1470d7d66742070297003a2755976e7c
SHA256744653b6f20f1cf0ec887ead7e194277bd53be3d6778f9375d5d4aefa83209d7
SHA51260679c49e3607805848d6e97cef100ebdf9bfb2e88e752d33d4b10584ef615af93a608e008be62fe56c05aa922a43fae9192d517dc75a274403d38986d57d4c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ca24e6ec83a7e3c54545cdc0b57979e
SHA1f4245a25316fd97148c41e38536d742440017923
SHA25641538695449043e853c7c64eb45ca76407eaafc6b1e933d5a47f2fd97738ca5a
SHA512f0806452a79e729bd2cc833aee8f07aac2d6a00157ffae6b879765a55ecea4f7f4c1088522a526de42c1db2ee25920c69c3d2d878f0ffde0f57bb543b96d6264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a31abbd44257e473113992b1b66d131
SHA1be21d88afb75ecbc3650fbe9eb9089a9d59fcb0c
SHA2567c1d920f96745195fb34899d505829c56a087e6d1369e6d3e383ac7aa24dacbb
SHA51212d871389b2414db11b65174d9eeb927f5a569bcd9a0562beaf333828813ca5a3407da1b76a8e20ff8c86f6b934e41b7825d2eaba1026a6086e81e87846169da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2787d5fb1d96667a23b3d388cf9b565
SHA1744f39d934ee35b7862d4ebd8baa428a5122f357
SHA256798ea57b0303ca8cb9c6c4ad6463eefcaf85be7bef875c103d8b1da97cad1ea9
SHA5124e0eebc9e059ed6b37944e8022ca091e4969760734d9fda678b15f0adb78703cc49c2edff9be33d458ce8ebd1281310fad86fa2d08d966eabb96794cb57000e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3b9c4b9e5b4fe06414da751e092151d
SHA1601a3cdcf454cd4d70c6485dda02af86b352f765
SHA256c483baa2164431d72c05442f15334bc3ba00d331cafa2a1ee8f58f0f47e61a47
SHA5128af600d9101acf99a86e2cdc20d37c32e24787cc68b0c772ac6052b62c29ed7eeb3c0475d0e4239667642491439dcbceac9fb860becd9134a3cb90c14eca8a5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f86b7eb8621782781746257f43d4c4ff
SHA1469f2da11d14c9d31ecf0d2568d415a13b8a7f86
SHA25602ca10b13954ddfdb5bb8a2132690db1908f7733388455219092a483c9697172
SHA51238db739b645e495b1b8e4098243cb5ad8e8977e8cca1a9ffa757f3212835fe1533b9fb8b8350b62e11b1e73c2b2a640ca07078c1dc7ab1a3760a33b0c7e78d6d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b