Analysis
-
max time kernel
67s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 11:55
Static task
static1
Behavioral task
behavioral1
Sample
be8992467d2e9c2ca2c0af7b6381f919_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
be8992467d2e9c2ca2c0af7b6381f919_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
be8992467d2e9c2ca2c0af7b6381f919_JaffaCakes118.html
-
Size
461KB
-
MD5
be8992467d2e9c2ca2c0af7b6381f919
-
SHA1
2e657c3d4f9ce675c1ee4ba97c9df2db8a64d4bc
-
SHA256
ad643cbe8736ec36c1057799be0d2cad59383dbf484ca1dc2f00c4439a5c282f
-
SHA512
e30e0a7076f4ac85b2397b71c54d2e8cf595c8f83c01a2f60ac44e6a85f36fa6d6fbc0eee5d9384ff402abf7a2075532fe16c784f3bcc0c1b5d186e41d85226b
-
SSDEEP
6144:SSsMYod+X3oI+YWsMYod+X3oI+YJOsMYod+X3oI+YLsMYod+X3oI+YQ:t5d+X365d+X305d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430662369" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000a9a50cd6ebdfa4f9f570ecabaf0c6b34ee883ef824191cc4199e5c2acace791f000000000e80000000020000200000004b23b73a32b3071bff3a251cfda1d6e5a7915786ec4334d750658724baba71fc2000000002914bb4023301fab96b9b5053e183b04d103de22625b06d2952b17644425d9f40000000642c8373ae6e8ea4bcf9d5d264fa496040e8a85334ce8becf5e43d05568cec2b1b216d7bb679c7efdc1a2ac4ff91697dbc4c9008fc5f7a05c7217359ebc655fe iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B16CFCA1-620F-11EF-946E-F64010A3169C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80fcf0891cf6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2024 iexplore.exe 2024 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2540 2024 iexplore.exe 30 PID 2024 wrote to memory of 2540 2024 iexplore.exe 30 PID 2024 wrote to memory of 2540 2024 iexplore.exe 30 PID 2024 wrote to memory of 2540 2024 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\be8992467d2e9c2ca2c0af7b6381f919_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59904cdf86f37a81b65bd12593af0ecc3
SHA1585a6050c667263030c5479989f1c5064a062ff9
SHA2566c4a5c8944f438f25ee91b59c58a93861fa0601d9cdc46ec5afc7dd7315d30b4
SHA512e20707c9b95bd10544f8f0c4f92a411df08b37a8f134b6e5acbb4f2f228c66045498e58ca7f76331ce6f10f02ff540fbd15bdc6d2126a938d809364ed37e83d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51658f83bafffe34a098adc1394334054
SHA1825ab31f5819264cbbf50bdd6ec1b26e7518552d
SHA256e7d4767e3d7f9c4a7b3d90747a79f0725207740cec896d11438c9df25a4f5565
SHA512613a65f3bf1ebf0896b6ca41e4569de614dce6960f70cee462054feef3112533b6853316fe6c144cf6975a82829f8e099e39b3577bea31f10a9bd1012fc841e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee3d3c70c1a05855b2b60d4293329ed6
SHA18d0c0bf942626f8b452f6af88cdd0173e14a2b5c
SHA2565a14bc1e3944d82d1278221ecac42658ff68c0be52074cd098248c92e0992392
SHA512b92722adacf5dc03f8029a7bdf78af8184ecc77ceb428ede95867b3635d11d72e3f9496a3e8fb0293b9ed7dac475f2347362f522c76445c3382c842ab5c4a6a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4cf4cf5da303f60962a3bda95b803a2
SHA19e19d0c9808ef03cff9c717ee7f2c892d86f8c4c
SHA256625345c5fbb6fcb934243eb71661e8ac224571557a8aeb4cc42921e383ed675e
SHA5126289a6c8c3f15f69f168c285e90ae69d350acb87fba20afa1d4b002910f3674b173015d40ff46d8c13a4b08eb735743bcde36521b2ca6ba44c04c3c2df8405cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516dc123d28d64f36d8148f3eacafee03
SHA1ebda9cc5431dc4caba6965742c2593bca60ad722
SHA2568c308efe4e26856906be089cce21c977e53273fc62843835019f0469832ec7e2
SHA512f48f561ecd66dc413bd9990f52eb4129e2f2fd4fb1220b157840339e3100068901817f8de2101f22f7e9d75216cf2b13a18992350d75edfba37d565259acac2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521833d57242cf973ad7240273741622e
SHA195c88f5219e4551823a3da3fc705295f4ca687cf
SHA256462b8701b2915748e1122b24a997554453fd1848b9489316796bc1515c7bb4b8
SHA512602a2f9dc4232102dadea17a3e99c9832f551ecfa04dc129109538901a5d9c1aafbe014151889d43850b21fb204405b2c8bc667dfbcd471224117945a08f88c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ebb71c170a3b26195f9e1cdace1b437
SHA1405ecf0ec7a225e955e09e10131fcde0199508d6
SHA25664ae4a6e290c1884ac54ae3b2cbe74a0ce0dfe14a46f9e6fd7e0004d338a74ec
SHA51203760572d88c201a204c78fa460d7c0b1070b1f9827c3d7dbfdd2e893e9b0fca59e9773cc1b0ec2f0c554caef3d94794d1fc659f4ece2f7a3a83f7387c5861f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c5176f3c020ec6b2436075385c56c0c
SHA145c4af36ffeb49cb2a55b52b99e2e934952fad32
SHA25618bd34eb150e995a392bb9a13352b603ba53f4a477c15ac8a65409c35b3aabd2
SHA51206ee7ab6eea60329ae7121375d4403cf2b58bccf640e7077fd42bb40a0c61802d4f8bd2ee3cafb06485b490a5a0418357852e24dc4cb81888a8b3a0810f7848f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1abfc5bf1c1e8aa61f7ed11b849953e
SHA1cb31eb8a4d82021fc194f6c83d7318a6a223abeb
SHA256c65d0b9dabf4410b9aeeff0b7606240fddafe47301c9e3e4c9494e635e9ca6d8
SHA512ae8fe0a85ba5e6c06c8a5a74748cec391565ff41c516c9f66805f595d91bb3c199984f2e3a302fd7fba28797168f56f50d7e179ecb0f7129c1bc7c7d42a6cec0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed7e42a17acc898e0af640e9a87a3308
SHA1a84c39cb3c6debf11584a460d88b987bf2f5d1ae
SHA256bca6a33e07e74168cc0d119af7d99948e18dcaef9de398857813a5b40c038893
SHA512c5b03f50eb431a6e96f23f732767efbec0b5e87cc68dafdb70fac9afed7c2a99ae32311627acb095c4a6f0fe87b10157000a8192ddabe74abec23f7902b160c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592c06218dee286a7ab157062a880d684
SHA149d2faf16d02ba4bb78e6c8937a893a6872d6cbb
SHA256b28d47c4f8d12a61b319c1220066e9b6d2c5df9ef4a92aea488577e9521447f4
SHA5126ff21dc3405da247ef4396e335bce5a358deac5acd9a48ad284c3b9270b14c16d80acf3d0a330b06da952ab1960505e83d94bf0db36aab2b4f5fd06f0ff0a2d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fd836945cb64f7f002eaef20214212d
SHA1680e40c3b166dcb153a2d8818bb8f4d8bcad06d7
SHA256a4efdaed4b39eeb315a3e83a0068952bbf506caed1b4bbd301d41e20baaa33dc
SHA5125540b41c67b0270ee129d90c5443530bcdb678356598d594b4dfa21a9951711fe4b600e9cb9b53a38ee44dbe9200488211422c4c15d753f85e7bb6c582119ffe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5743d14393f00ba1117ae9386c642d7e0
SHA18c514d3336677035e9504b76e123eacfa2c41507
SHA256b7b4f4bf84e67edc1e9a6f0e5f43023253b14e6a8a14505bb6d86d921b0675ed
SHA512b045cfca23d2998c456af9afcee0b34d1fbebeab0a609096dfa9e4f66ca4060be250584c0ce3b3ffd73aa46bab5ed7d5dcdb5103b48f6333beea326117630198
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58772593ff1af12c83f7bb6660de36a13
SHA1f9a13caf596b2cec86e3e72f5fc2d7bd899faf4a
SHA256e4acc22e013a12ddaaed1dc8ade70fc585ea006b439d2c0e58be7f5313f7526d
SHA51297b8ae26118707c57f86db02cb976b474f3e4f7de361b2f7c18be5203ff538b1fa1dea5a8bf5be4d215160d465340b0fa66771931f21cd52533e176ec411ac77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53318360eca6ac668301bc3925050270b
SHA1a29cda96c7958b96081f319bacf43e99fd9e259b
SHA2562ffb574e5c58cc13516e580f7044c7dc3259cdb158d8d959073ffa2902bd8492
SHA5122b5e3578566e86fced49a71ee0ff9a5ead427ed99a8ccca322a55b0fb9306401aaafb40c5106e75e48aa16c232d0fc064ad4956d86bcb8cacead92ced7371e6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b3f1c1d19e298317282ae424ac6b059
SHA1e3556e553e9c22bdac781d9e515f7848ff971919
SHA25692a5474c179c24672c3036ed9e6184a5ef7df10ede268ec7c048a08021a1ad18
SHA5124b2f9cc10c32274a1abfaca37af3749b39a87f515572c056ffaa0f8a8870fe1b9d31877bf6d01bb4991c01034b24cddd0cb3e4e22b6f0c9b732898439ee18c6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b8d844c64cf8109279ed2e1ce0511cc
SHA17a1c3803a656b4a0cfce80bda8193eda81234160
SHA25669a5e499339f53c81288e9a6d548dd6dc182b5f68277707d4fe1cb5ff85f13bc
SHA51203c2c0ab44d2f3ad273edf2a6a649991bc3ce81e977f35bc750e7df6cc2591da7d8769e277105bb215dfed88b183e613304a3222fb829f7b6a74020f4e30fb13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5522f0c7b986ca196997d7fbe6c512666
SHA1b916fe9f047c33fd8b960737ef89fc3c78c0acaa
SHA256b2724d143aa3519a029d79312edaeacebc6bb6e843f758f97ac0b3932a3d3def
SHA51291773995b78eb4592a3f1ca4b00b4f9751fa8634d9ed7fbe229b5e1002d00897f556eff5ff20300b9bb5b7e90b4d62cc7051957cc82dc84df7322553f1972fd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5793fcdf31b17c6137a849a64eac222ea
SHA133ef4a357acf953a223f1b442b998265f60d3ee8
SHA25649446996b0412219c62b5c4251012c4b7f1cd78d0f7a0060aaafc36bbeed9ea4
SHA512a50a4391aea9b6ca1a4fe3d2fb0e9d5f3c83de6a5896677f5fd635aad45e593381267cee0264db22f64eedbc13f4fc58c5ac2fc04809d2aeb2f956dd9d7935f7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b