Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 11:55
Static task
static1
Behavioral task
behavioral1
Sample
be89e69973fd55b7062f35763268432e_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
be89e69973fd55b7062f35763268432e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
be89e69973fd55b7062f35763268432e_JaffaCakes118.html
-
Size
2KB
-
MD5
be89e69973fd55b7062f35763268432e
-
SHA1
43ae2105e83770cacebe61326310f5f4aceedede
-
SHA256
c3f66c37c58cdc1eef4811a122499ce50aaa2e359e85264ae9624c688bb25275
-
SHA512
a08474c0586bfe824932a59ceae4c5ab7e071ea24bd7510820034d3795115349426f7263d1ac33e70b42c122a9d64e9d16be72719442fcc8a0d4570157a3a8ee
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0c842a71cf6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D2CF57D1-620F-11EF-ABC7-72E825B5BD5B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000b1af9c1227bd68ed8d424722766af2c4cae195f38958a295bd10471ef9451053000000000e8000000002000020000000f816b43ae51a8c1af500a8d8314d6129c5b6477a2794fc3f943700f3dd36bb53200000008cd2cca34c48d7a23d5e9d115c925e0eacdf1fc039cfe283e3f570df9ff191c040000000715e191360190a0b7abd0cdac0cada6a98e4132c3f6c7112bcdaa27a5266992e13696c68f43921bb9722d18c75a8811ffe6b2bffe3c9f57a8afc3dbb53e799d3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430662424" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2396 1984 iexplore.exe 30 PID 1984 wrote to memory of 2396 1984 iexplore.exe 30 PID 1984 wrote to memory of 2396 1984 iexplore.exe 30 PID 1984 wrote to memory of 2396 1984 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\be89e69973fd55b7062f35763268432e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56967c026e43f8414876412d67a3bc98a
SHA1565e122983f8a7568c4645f042ac0e79b52c7ffe
SHA25600cb4bbed8876811db18345698e696f0224b5bc86b2ed6010b0faffdef15069b
SHA51275867ed94c6343ebe776b460c9b5cf8b95d32047f20879c808f3e837d7c1b1b962debae20ca57dc65942aae4b71635a1ad3ed5778b7e009224a15e6234559ccc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaf42eb351485c1e961cee19e761ffbe
SHA1937852eccec9bc254466c193c74f09887058e722
SHA256039a10ee6832b9bef13d556ef3f47582c36c6e384f732b6c09bc0eb4f8b7e86d
SHA5126bd8a9a74e17203f0c58c9ce869d6faa17dfd18b6dd340a9584245c8ade7b00a4948849a7f332705a1d313194e22f46b235ca81a32c70cd09b0d612c3c03c813
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8b9e835e4a13db9879d8afbe340cc1d
SHA19ed518b380de570ae301eeea0a9df802fef5451e
SHA256e5af537e4664875bf5e9e8a21e08cea4424eb062bf25d34cf3b55aa7cc1e4018
SHA5129e68b3991791750c18b81e3bcf14a6f3a93ad4a18f3ced894422fd4b8c86a7d24f10008fb6fcd220350f961340a313f8567e31c4636cb5afb13879b5c7f537a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508f72eba83c8880ee011e429d633df14
SHA12bcbfc7f3d7417e4c1ce98a9caaa959f7ddea7d7
SHA256190660ddd3e5cf7c8ca78ede0f6b144e048df0d18b391bfce953fa88552e0f43
SHA5124dab340713dc95466f4844e74768b87b6ed633f8a4c36becae0f7f0da1e0e3b9effec449cf2b68368de6916695a15866dccfb15612136061946ee8bf13b90e48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a20f369a1be6f3af72f39c11a887e2e4
SHA1fa775f795a38321678b4cc23aad05ce1db67b997
SHA2560912206215e5a8ed2b7c8aefa9084e6dbac15a118d1fab75cdea9dd1463bec74
SHA51269458ef2aae6c6a0ebd9fbb70c397b91d0a6080b3b9565a4c7b6c41cee8b8fbf90576e64714d5c1e7acbfa71fd991d94a7194c981b257213b43ea919b2116438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ce5cf554b2841f2e1915f7a2b92012e
SHA1d7dd15c3d9569d826defb9f133c0ada3f68c4e21
SHA2565515240a32b44f8097c0d5a987a0311e436091be02a90545a50e1c988ab83f8b
SHA512cbfe00f6cd41ceb2b713c0c9ad4eaf5dc64488148be5d870958dcf9bac9be07421c50fd783c41358b09757b13cd4760a4383657a25bdb74864f4889bef6af69f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f979af8af7b19dddfbefc5fe84964de
SHA161be9c652a54a4b086cb31f303d4815ef419a41d
SHA256bb78af93122f14c6ee5397f525b44d15a497a82b4d92e532bae0a4f84bd89f91
SHA512a74eb1e112c9175c78914a1007e13f9042740738198ed07c97bc9f2a6d355644d8f69c582e29a052fec46c91eef2464876fcbec7f6fe2fef515529bbd5a5da2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53754123c0168e50fdd3ce946e7af103b
SHA1381fbf1eca1c8c07ab51d296f1cef89af58ebe2e
SHA256db4b04866645ec0a79fdcad310725ed873a6f94311747229fa2964dec0736f97
SHA5129e3d4affa74218c9866b95348da5ce88fde78455fd74a135564e1e5483717dd21c8df332d467e0a7e579e31ac01d82b81d2ff39b186cf4743341fd3356fa953b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f25c3926a3e88a8f415e20d5fefaa6f0
SHA1a0913cba67a2884a515d688c2e9010a021c85e04
SHA25683aec371b726d69007b4ac87b172144f0bbe56a936d9efc0d06aadbd4be2c04d
SHA5127c12a9b822d1f3449c98ef9b96b3a17f6b39c25812ac8e5db10dd915c765996153d158274a868b38bb1aa217ad83e0b29ba16e2a59df40d0001da52e02be9e9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c0a1f43a4c26ae2ddcae495464b7411
SHA1ee79cbf1b5dbb37bea3b599656ebea967334b609
SHA256639529f9e62d857d787500d9b5e78ec4d6fedd34b71e6099289ee0bc1320a3d1
SHA5128fecbb00d1d89421f93a71933b984e8ba9013f8274043c8287957aa422fb550c132f87876b785e49b9c374e0284b8b2c255e475ecee18ab6285f29b9f360ce1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f210c752f2fd7db0896eef6bcf7b399
SHA14f7a59133761f28387912952125af6108f63e5cd
SHA256e38f404f1271e3c016fce4c14fafc8b1198e3d2ee2b96871b4fe03ba3109b2bf
SHA512daea26bbffd68bfa6d5727b73cbb45b0d25485f252487f5aabb3f2f011c85258b95de4d304c57d9387316db6ac4619c25228368e1e8c256fbdfec3849ee717f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565c37c990aa2b4c9c654e124d8874950
SHA131a3d6983323b7861842bfd66a73f80fed4fba9f
SHA2560dd080bd58d5531d61f16c9634557b7db9c440de041a50408665d2c7ffdd0b0e
SHA512dbabdda6c4287dcc4866c9a60292c3ad0f8b5b7d7bc29d83dc4c52f346c62855db9d12aa24fee9a9e9a21089f511dacc3969eca93478e425a54b86db308e9a20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546fa07ebb1377f89cac1f663c78c1001
SHA124d745e3522007d271f7333113c1ef371bf737fd
SHA2564e845ad597b04bbfbc88a20d4059e0bb564085f9bc6f951caafc17308ed913ce
SHA5128abe0e21c93f28b8b309f41e10b53f85b653f05dc5bb5b1512de4eb4471a94e54a124cdf4e44380d4fafcd2f712f41dab96b8374aed8a87af1495feace8632ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d83e12f04ead9a0c444456d47bc5da42
SHA19542aba6c55dff220a4e232ed283b81498cb2d65
SHA2566bebbbbbfbb8eae464209a87b91c2f8dec6e4319c33110ffab939e8da230339d
SHA5128615c8bfa3e92474320f0524839aba7b02a65e6643e802e8ffa87be3590eb7aee4062590bc9d6430303291e255eb89c4775d45f753c7b2973937631594ab6800
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563db63cbeeccef54234d5b1b13fe846a
SHA1e7b036a7b4b400db1256dc3debb563972073bc2a
SHA256b80a9a313303f51aff449a3f06be2c5ea44e428566465391ffcfd2c05eb024af
SHA5129472e825e5d67549fdb7d33d48ecda044d03df47b4f70385e1bbee1ea26f3d9c0cafef8d58515acf52c82ce3883fc2b9a9d75aed4500ace5a78dc123c1394abd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57401184e12fe90a8bc778786a119a67b
SHA1095f988e06cca5b61d419aa86be9767290b53cb8
SHA256419feb4ad9058481a826f23670c73eafdd85f7e1edb3dc573db526d49373aa5c
SHA512e9b2784dc611fbed98f6a97ea0b3e37a8df6744dddc5336bdf132226202f481a0232599aff4ce0ee5773be4e64e9785e80a1507dee11cf4f9beb0ab91330c4c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4b51d19171e2c4a197a64b2535d9b85
SHA110275477ee22de55ee4bb51c2bb25787adaa1539
SHA2560da59fd98c193b5abbc1b1c26c37b4f7581aef0bb46f0ffcb4726bfb60731d78
SHA51244779f79d9b3f4d6c724b026218b6fc9e9cba2f12ca8d16ca057e126e0f6b6578f53415b077b8b739dc73c670c28eb9c0eb3468eabae0bc6093dc69e080d983b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523a7672976553b0df64dccaba9dcc59d
SHA156fef63c027ea575faf4b355a7dfd997e77bdd62
SHA2560d13e09d380b1f69388ec93f40c17c09c8ce02dd0e36eb81987e525dd77a40ad
SHA512c7632ac0c849b528a376284f69edbda1459dfa684852c019fc25ec1ea9a96c650c7fffba2f034c9c0b58d67b49a4f57bae5d7bb5656766589b470eb277270b44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566b66d83bbf9cb198e043b245f7b9e1e
SHA179daad7ba06e646170d73c579e49607a5320073f
SHA256a06edaa66aa114bf59cc2c2bb164c3234f678c37889ed3f3e71810b59a855e78
SHA512219de88ffb0d2f196988569a2f2cc44a2578c8cdc29aa7ad6b667d9ae8fcede023f0a1b804291e5e2fa1cc4bc5f2ef9882a9c4f5e324ad13974ed54d07ea4753
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b