Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 13:36
Static task
static1
Behavioral task
behavioral1
Sample
beb47513858439963f546b17371afce6_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
beb47513858439963f546b17371afce6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
beb47513858439963f546b17371afce6_JaffaCakes118.html
-
Size
39KB
-
MD5
beb47513858439963f546b17371afce6
-
SHA1
e61b2426dc82174f3b08f4ab32c7f1a9c801c61a
-
SHA256
8b538a98f432a94e97f157020c629910b8cd593784feb2b41d2afe5121cfe897
-
SHA512
692776277d2d28ae7b6b9ae8da08450ed8af32c88970480b3e2c741b958a15346274c49e3ab58636d8973f9b6b2ab0ccd10e9a6cbc007c82c893740c40b912f1
-
SSDEEP
768:sLc4SXR+z32ObPghz4WZ34bp4AbYxXqvUpvKF0rBi0IYRgQowiuUx4/JeLcGUpJd:SSX9LhkA3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EAB2C221-621D-11EF-9CB4-D238DC34531D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 907976d22af6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000008837f6c28fad2e27fd559dca0cc88386d4c86bc972338e0871d74fdc57772d61000000000e8000000002000020000000208f4af796da5ca569d99b8bfae749a87f03b23afa4e8c096935d00694d5dc822000000087fe26c5472485c71bc6d618071fe97eac6825f1fb59c5decfdef86582df097b400000000e776374c0dcd0e64c83dc8f115886e33df04c908f89b0cbd9622872d19e37d52504d5b7008d5d6ff4de253ca9ddbf3ca970c86d4c6bca1b26b3d30d26dc5bb0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430668478" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2360 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2360 iexplore.exe 2360 iexplore.exe 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE 1928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 1928 2360 iexplore.exe 31 PID 2360 wrote to memory of 1928 2360 iexplore.exe 31 PID 2360 wrote to memory of 1928 2360 iexplore.exe 31 PID 2360 wrote to memory of 1928 2360 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\beb47513858439963f546b17371afce6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2360 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549d3d615561852096f5bde779ce4bb97
SHA10bedaa81217a8bd5565dbd76a0ec33af0d2c64a8
SHA256fd85c73f75b9b5257d318ab05be2d2114912aa963d5a1486297edc69779f0a3c
SHA512d55860c49c2f70cf5eaae6c86917feb88ff742e63eb83be566cb580745bc8a70d91dca4838af971a7b9a2236061cc0568aae922d61033e809e97a97742a068fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5774ed01f4c6a40c2427278d00c80d997
SHA10dce0ee011f942c978f761fa0efdae5970fdab67
SHA256b8d01ac7a269c0fb794d5cbf2eee4805bf48355def2f8b63f7e083cf66771a33
SHA512b4c853251e070588ca52980d9168889c1302df725418f94cc1936afc7891f4d05e2fdb7c5c41bb8d58a16580370d7ab889f75a7b0b7e32f6b3b6d6ec2972f809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b130a048e2c44b8f62d128d14c2da2cd
SHA129b318f2c0ffbeb11cf760011f62260a84caa8f5
SHA25604f1c3b0b5662c420b712e69ce8decd4814da2bfb3a32c6e5fe0e5566716a10d
SHA5129fee8a0b410017bace30dc760ccb4a602a8ea86ff9f46ffea40e09c671b4e712907221694fc3e959ab1fcf3c65790c81098fd7d302314bb2ab78408061a57430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52022ca8fee937cb97c5b96f078fba1f0
SHA103f8dae02e975764158127d718722d0ee2c998a5
SHA256e8806c3a498a83ee433e302753bb362e912811c2db836be9f28357f636cfa4fc
SHA512da8cb6065c8a016ba01e81d2d25cfc184a6a37dfed61373be2745600e56968ce23802e05e56ffbdd1cf518f03f54f705a43b4081c1d9ead0ac6de9adaf393c3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f256813b047aefd36df692a21869061b
SHA116bb7c9b8b15f17a2731443833c470a029d6c77d
SHA256fac2666170c16df5d79c1f795cfae5bc1be2efdf14a4c29e27b360b25aff8aec
SHA5126c30cf0ef63b39a6ff3b51c08a9868d9cd85d7ce19549bbb5aa73f71cb14bc403186168666bb9058753accab485182a8e340a66d33c7968bcf7de84e06ca022a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5847ec4bcb80f09b11015fa6a1ef6a147
SHA168a4b35862c98d61b1736beb9960efc4cf7d35d9
SHA2561d291e604ed3b693f8e5dfc5fd0343d1e11911bc1338ce0befc6a8f319e8713c
SHA512390140bdf4de8f835e9152fb28530e81be09d31202635831d0f7e221509574308bef40754b7ca9f3e45e4b83042076f0c2a04b2447b6ee9608cad60446079d52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c0026bb94c0e875355eed130e6164b0
SHA1b7a277c753eddd79fddadc4ba26153c46ea77433
SHA25633ab21fd11ecdc3ccda9f62c03b6ff1ba2955b30fbb6344b20e820aa35b31e49
SHA5125a821251c823a274a818dd1f189df7da9515c683dc1f209f6733976eb173c3e8933ae07f293dcfa619cbbc7c41cdc3b566fbdb2371a1eec251f0d5982ef5a66c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cca2750f1c07b40955c67a24ae27269
SHA1c1b6931966520b0cadeb10294f0fba5f9ee4585b
SHA256e9e57663dcf3039359f50b0eda45528cf68a575af108ac7fb0713c62f8df66ac
SHA5127d20f5a8fbce9d6946542e2349a9b35c1b493267d729c48d12631ce0274a8fcdddf61ed0ff4ff03278cabad126a54c75654d66103b8f5d2ddc6397d52bafcb99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5335815b32975ede061673d992c9b0ee0
SHA110508e5f29104eab1cd2c2b12d0718ce960710d7
SHA256e2b1d47ddcc27eeb8afbe4b83a6587892d8bb978f00cde770588a93b43aa4e09
SHA512be6fb64a996bf463164a5352d59facf285701722e573791baf422f868c2d206c0e9c4cf55ae860d506e32019f8295aa5236e2476de66872573005636b69c574c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bba0fbe89640e837a27333f00644d2c
SHA1b844e8e5d5d1a2dfc29ac8114599e79c49452de1
SHA2564d5b951ab8a01a16c573d10c4d3bbd8303405920f627e3fa319caa0aef7bd0e4
SHA51290f2cb754741d1d13b843bbfe5519dd0cfcb861d12d6537e7a5416193cbc6a82e61516902cca8af1d849a9d7ba70b0d7a62311cb8973c7347ad66f145c162a1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db632f9a93830112ad87fc887e9569b4
SHA1d9fa53c82466824734fb4665f08a5597f344df49
SHA25600d605fe7936e0c7578fefb2e8f41d265edbdd23c79cc8774375652b6faf00df
SHA512ae5091b2bf7146daa898553aab8e02b570c320f46b67315cace73282da6f75e7ef8217db81a2cc6b095db06a60ade48499f9d495caaeaa9c0cb4eda89fcb633a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575521eeb043232ac7e9c7810ee979e1e
SHA1ef6f90ce54063b1db36640654218fb9e52e8747f
SHA25689d2d45703c8da84120315fc346a2b472d3222d3c8475bbf84e04610f14cfb1f
SHA512ad0ed68f242191d0a7a3bff2e4867ba3ab77997a12a2eb0cd102cabfef4ba7c6c6720b850c512c77d1c697e9607e8546d91cb846803f6d8b0657ffa25606efb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b63a51ef58e5c3050b870018f19fd46
SHA1bf326e924cbdcf6ba7b6e4f7f096c24cc6ca05fd
SHA2562db897bd8cee3a976efcfb2699f93a3c43583f9743144a7271508030ec4a4f1c
SHA5122029c9d87c9bbfeb626fa6402161f4b46031f8ca1e1ee7db9705451e1464a5b7bea7cb10ec260643a7f9c3f0a8b132498c30f451e5c599cfbaf8923e0833b995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5496d0445d424f48a0a605e7811abcbf7
SHA1a0804b1f22888e1aedea2e82b0e2e9a97686e4e5
SHA256830bb202e7a3279688bdeda1908b862228c03881d69f41ca70e9576999bc064b
SHA512b7472208bf12479fe136252337df6bd2a9bc0a9d42e3986d4326d72d8cb02f3fecb81e7d716d5c54b63aaf556ab06393e30e2e62b4ae5aeaf7e18e387bf29eaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fed5abe1cae4a35a5a0884a6143ef9c
SHA1c6301bd23b010997e3ae280d028d786840f3c0b8
SHA25674788cf5d08299f51070682aaf86e8d0bdaca39dfb97fce10c1e6f23142d431b
SHA512ffda49145617bcfc4098dd3047b6dbff7045d504b4eb0a3a11d3d047af23d2c3e246567072c9c870d31bd8c3775748d0d5dd7e93cf6a762ee9b78316749fb4ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e802548b7b273c5f96c3a5dd42609333
SHA183036cb115e9b72658b5f625e144a70dcd1dd4e4
SHA2563fb277b8fb910d59db020537bea69f96b84230bf757211faef3ec5a2acf0ee2a
SHA512911372d360404ef11bba0785aab14b9d0b85933b874898f824f0f956442785038eecad308b14d7215e02b889a2132271599ea4c639910a3bba326917e6b9434f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b