Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 14:41
Static task
static1
Behavioral task
behavioral1
Sample
becfc0fadd2873c00c1429d03771d975_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
becfc0fadd2873c00c1429d03771d975_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
becfc0fadd2873c00c1429d03771d975_JaffaCakes118.html
-
Size
70KB
-
MD5
becfc0fadd2873c00c1429d03771d975
-
SHA1
c10dbcd506123b6fd2b3249f6aae6268525ad67d
-
SHA256
8bbde609c7e3c277a5c624b44e2a6edce9beb14fa2468869f37700bfd66c1a39
-
SHA512
e1d4e4c530753346fc6ee9a4b34f677080db81e40249df4c45bc80a7207e1c9459f411b9a0cb0caae2516136eaf421a38499f3b2f920bd08d493d71a25c1a9fc
-
SSDEEP
768:JiMvgcMiR3sI2PDDnX0g6sy6RtcTwcTuoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcc:JusZzTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000d8d348b5725bcbd136967cda06c50bdc000ce718d6e74b8743a1af88d189e7f7000000000e80000000020000200000001f9bfea65bde7c37d7cd474c20559f9414754ce2c194eb4ff737452c7ee3c8aa2000000074da4cf1acab19206fe36c1d41252598e82bc95ac1c6174be0f5a2e295419a7b40000000238e3af37ac35b9ca59a1074c0efea3d346e6e4d41438e44a212abd58203137f0b5ef352a5f0396f6ecd3fa7fa65536088ba08a32d6e96a1d494ee81604c0f97 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FB142741-6226-11EF-81FA-CA26F3F7E98A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8010c6cf33f6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430672371" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2680 iexplore.exe 2680 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2940 2680 iexplore.exe 30 PID 2680 wrote to memory of 2940 2680 iexplore.exe 30 PID 2680 wrote to memory of 2940 2680 iexplore.exe 30 PID 2680 wrote to memory of 2940 2680 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\becfc0fadd2873c00c1429d03771d975_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2680 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5688c6352116ef268c93dd515dbbc187f
SHA130e2c0bce7ba7a3778edd0c93d57e8af1fa5cce3
SHA2560c5b3e2a9fcfedef942758430a6163454559e9e0008369af36e4544fdd32a78c
SHA5127617f9be3bb458ce40abce9f3c9fe1d419ed5d325a327da6083fc9f3c1fba06768f52730e70f47c89e17ecdb37ffbc87db2b7eaf856e1054fd6b316742d624c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f4cf77957350424ed33fcdaaebd419f
SHA11b1f6f8217dab887fbbf4dee968850d6871a981e
SHA256fb885f02bb77f25fd9ee6868234553154cc32b392745cfa3b86783c5163d6abb
SHA5120636a50672cbec7bc976dc4ac1ee1b15db1d83b2a975632ecddcc841ca6584f24e02df54137720502a3e6972839b5ece179761b9f27af971cd5dd8c0f15c2eec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8180405bc97a62cd3bb83b8c21207f3
SHA1f35f78ff64edcce9c971541344515bc82f4c5617
SHA256cbcf3c7cf209763e1f62cd114d7405bef9736761b85deee3dc8c16dddbd99245
SHA512d4b640c7d80d7ba677f382fba01bd43dc9a91e80c57d8ba5732254bd08703b300bba494702eb92fcd7c06b1232e880a8bc86e5957ac2d281128e6542f8c45deb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b907ad261f25ff53da0f3cf1b831518
SHA1ebd479ed51060551c8cdb1072c1bcdfb699486e6
SHA256ef904ebf72d12da8e3047141f8bfb0b726e166e6ad438282207ba5951cfd3d18
SHA51288b0930a95037a9f539c65da0834835d6e034d033fec03dfae0e221906e26b760c3d9dc698505797b0927530d13997c0ebd2f478e3823e990f6b6f42c286742a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ab4251ade5adf0d1a42a359f07a8d2d
SHA15d6ecb5c65e6807292e7cc41a187958b10a2d750
SHA2566b602b7064779ab90d155c5c2a7d7975b781284df99880222f8d707b80f8934b
SHA512cab6d1e149ec5fdf2e7ebf8f079472154e5d2b571a68387d28055ff754270d33f7331a510d23eccd792b60628304dba5e0a1d55b34da34a7c5c2ddb8727b56de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5026e083413b84562feff35e51a9bec63
SHA162a7248f1c7eea4508f4de12148e06257f71304d
SHA256a055cd36a1d0796e6697e906e3a794cd6a7535bd23f747c9b177ec0485dd35c3
SHA5125570067504182db2614508ba90658c7c9aef30e5bb719df70c3a91099932d8f8a266cdc3114987aa29cc9f467f058b9238b822f42ddcd51ad4453dc9919035ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b00e2fffaafdee63abf5ca4064e0e3ed
SHA1da3a29e9d0d1d75ce96268571edffd2232c45388
SHA25620f31f85bbcf5927f33b2019ecd983449ccaa8e6daa883dd0c1982fe6efc9076
SHA512766ae983aea9762746124e42ca6ee7a3baf9bb17ecdfaece1b9581cea1242015647d064b03828101487228488240ea327b0bc231d701d9cf49270aa5bbdf0507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbb3bf3b90db4a44748d5c0299a12d7a
SHA185b1124e6d4d2d561aaa66b425a7b892ba962528
SHA2566715ba55066fe02d31eb451c05b37858b6838b5386864546627aec56a4320ff8
SHA512210159b8c93b114ec1505b3e9635734076a8ffa68c80276da81bf346d9b41ad43da5287505b248c72f39272b536866d10b6d58e9107363abc68734bca9be3a15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd5ef7fea3c943a28dc272aeb7e5f0f3
SHA1c03fdeb6a8eb536fd7b06fdec59e85c65eb14386
SHA256c6550e40af03c32c26db3b5b6e55fe280e277023e7afcf9210a69f1907524e38
SHA512380cc6e768fc49997464a39a8b1a98f3269d81aa7545b2045b44bbb8195dcfce196540d439968be8963f62bc965baf06e8bdc58dfc9a7ef222767ec7c1fb356d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b2af356ccd7381a277cd7eb336fee2e
SHA1f599d40185a81c71bca46b069d8a75f012c00bdd
SHA2565b3e11cbd4ff37a70493cd83358b6b00fdd61a7acdbc0363d963058b9314d721
SHA512442d9a1c942141c0b920b0df869d709a29547113edcc4c226fd74992b3b89b66ac691eeb8eb4b4f54a927ac91348d86ce3565b3400edb754ca3b19e5b52024f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559ec1d74c60156fe7a3fe522a93cbcdc
SHA1bdd7485a273abe2f84219c49c4da29f3f9450a94
SHA256ef5ce8e8882d2aed3ae7e5b5075b3cc8702e89d71c5dda43ba76a0abb6171f6f
SHA512f53810789e0d899170d5238299b7c09b8cfac07bfebaaf1f9a3d039d81459ffc449f7d38eb11aaf1a24cebda792d7ad77761a833cedca563b3b3253ac22e3d27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5e3ec61bda7c5cb08b584ac187de971
SHA15c5b1b9634af105df5deef6ce0338f89f698f01d
SHA256153ddf9c2d226334a95314a78cf97203c7b49780078f13eaf2a297ee899b656a
SHA512376c58c21e4c33e697714c84062b150d910aab7d716133fefdd8fa37b56dd4a0b8e6008174424996047c8cc01dc4116d1470d45c5cf7672592263cd417c5c00d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5319c133aba4857805b96a7af7fe71ffa
SHA1c604781e3e1df8566af878490501f4fa838e27fa
SHA2562d0fdb1f7138ca60eee3695e24719295e5cf55bfe4b0ac37b57b026209d3d6df
SHA512d3b4579c91e5ff7b4160676b12e9278d1308f0c2bd03a030809c5fb49cdc0a90eeda16cc423905eecbb04cf46e35560a41bde0b7723e3c67637d3b603bc77971
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f70ef512454d925fdd1e00f231cd7cb7
SHA1d38454ad3c0c17c73650389a6d99811d7ede7e09
SHA2569c6a9dc9d6ffebc5533d95b49e80e4fa6606372d7c39782eed351f329534c870
SHA5121fb89e01b7094284633737f76ec5f00795d2a53a71ad74fe514f3d1e96eefd26e49aaef08ea702d80cb6b30d64e44475c00710f29285757a5dad314884ed3573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba5dbbc79c55d070a2ff6369b481019d
SHA1de7d899534b8a174e57357c673a4360330b669d2
SHA256bf2ff5c668dc2a28501bb8ab01c58cb33882d22ee88b63fd1b1dafca64241ee5
SHA512d62523125f63ad6378a3165d09e7857cdca09bc35add097d632f200c8cbca237ec65a470b3b599513a9ee2e93e38f4f1a5713ffb4f93c06b8e1e12363bba8754
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d48ef4aabc61aee7036258c79fcfd1b2
SHA1c00e1501b9953bed7995ef8cfe135d3931c68eac
SHA256846e0d34cdea2f29662cf0703e1da720c387cab6a5697821722c822e60a53fef
SHA5129e3bdb195b45ef447e8845b78c8a3d6cd8f0962ef5db49091d603e34137d0b147d664e19327a421a1e3c6d858d939db9ecb27f439bf45ec89bcf5faa39c9dd2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faab0a6ff3acfde185c704b8051dd417
SHA1df4ec76cf3c7aba1f74c58c9ff8170b9ee93279d
SHA2566e2733a059832828bb0e1a25a12e8d3f7b602a156c8f693e7d6796491f3a3123
SHA5124a5356a1db9b846fb855a8460bd237ce0ad480382382c5277e28e13260f7d18c70936bf616dabd42d00aca05a0cdad3560817636ac444e4c73b5c8d7de5747e5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b