Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 14:32
Static task
static1
Behavioral task
behavioral1
Sample
becbc9930d229329443c8bcde62a4afb_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
becbc9930d229329443c8bcde62a4afb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
becbc9930d229329443c8bcde62a4afb_JaffaCakes118.html
-
Size
7KB
-
MD5
becbc9930d229329443c8bcde62a4afb
-
SHA1
08110c67485cdefc3e5998598ae3c8cef05a4139
-
SHA256
ef00db93955a9d01e301d83e994c6888d1df8cc98ad968a1d2057fbf40231709
-
SHA512
a3e10637496fefb197437444b82280a3e9f6722e4b0397d214d5b2b0188c8125c1d32110780b6c49e2002515cfc3d314a00d784f6648ba9d984a5b518853cdd9
-
SSDEEP
48:ImMq1Up8vmbBsaggAiEgVr+CflxYOZAyNGWBXtz44xt5YWDrWN8D7LerPCSt4I5u:SImDf9NBXYwokSt/Igvvw91dRjcRC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000615c42c754a307cdc9f4413e529b778f6df3a1c073848da98201babbe0069002000000000e80000000020000200000005707fd7c507b30c3b64ca86c5a79da22e25702fdc09c97c51908364eec02a58990000000870061d6b66011f373d5279de0aa89e75c5767c6c279fb989acddc3ea2246cd60ce722dad2bd3c4cd2d182a5c523a2a00ba7ccf715e0e8497a73a9aa02df46e447277f4554837e0ee09d5e1190f9cc4f2787066f9d2d0bb8739b5baa7e763e15658c4432645e7878d56914bca04232afe82d45f79bc40c2f44d1b63ec1456a0c7780eb38a9ae438b028426c8fb8ac74b400000006768619522af2356d7630dea6f2907c69e72000561e3ac1cec476cf9e556a00e67ebe8464f874cf4214fa68e904de2d7360a11c27575a957a1737f8665b976a9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430671811" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0291c9c32f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ADECDC61-6225-11EF-BB50-D6CBE06212A9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd0000000002000000000010660000000100002000000021798953e0819b1958d1d0f08cfce779f37e774c7e3ec5a351d8a06114b5d98d000000000e8000000002000020000000f955d0093e46ecfa135662936b88df2c8dfef1b7ba746d21c422977e95645c0a20000000204bd20137e700053cbbac6afaf27f722b07d644301e02a61a392808b0c33ba7400000009a4fd4612a2ac1f2b9cfe03b84af5b65348a0a3e8257eb5ac8f319737372b08f76f1e04bf7622d07b8c7ada3bdd833f8085527e29a0021af20d52d6229902aaf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2748 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2748 iexplore.exe 2748 iexplore.exe 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2784 2748 iexplore.exe 31 PID 2748 wrote to memory of 2784 2748 iexplore.exe 31 PID 2748 wrote to memory of 2784 2748 iexplore.exe 31 PID 2748 wrote to memory of 2784 2748 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\becbc9930d229329443c8bcde62a4afb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2748 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d09c5ac58d773ced0906ee360da911e
SHA14cea66fdbe8d893f2ae2139cd7f65478839a7d30
SHA256a3ff6816433fddded138185f16d086b8f771544e893e2ed1e723b3d02f7ea99f
SHA51261c389deb5dff5aa9612fe51f555aa588d8d7470dfa4238c0ed001ad8eae57221b0d7d36954fc10b9f776ab709249e483e95f4b6d989d9f7a0e083602b64a29f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5407f3d307e6aedb466f7c1e2429deba5
SHA19a04caf699011981fc8eafc77b9a41f1dfb503ab
SHA25689dd64d68497aafaf850d3b31f54cce6c9b4544cbdbc8cb8d9f3a376a34ee3aa
SHA512b7b1c7d5d87bab3d62d6ad1b08a11c2c0b68be04289dab1e1db286e32474c9e65a908cfd2726a4fe43b88d1a3d6b27d599c6044db1cf5b987f7ded8c79fd7b16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529a2409c92b27ef8c77272f2d8908444
SHA19d9d6b909ee9fbd99746cfcef94afe494c30b1ac
SHA2560df93dbdb76c38e99d8c9fe3a631925159a9c18059070e5a215175b6799a8f9c
SHA512b7503ada1881f9fc9d0239d131c7440e12d0886eb264fbb39552943e7d12c6dd179136e6657d23eb80e0f27d468b22824ea689dfee9237a752dcfa91820616da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58489b34992b234298b37caa839fd4deb
SHA1c63b5948240e43febf3b9de2fa61b53113d94124
SHA2565826c495d4f005287f5f116e65a036cb696e221d09323f11fbe6c2b4eb63a9c8
SHA51261df2ecdbf65c4cae03f864e8343fc4e197bd232136ae35870f4fe035d2e4688b37bec4fea1a1975a829bf4423b701c1a23d92a03eac68eb8be997ebee4e640d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcc593067ea517a5791605a94585cfb3
SHA17013c2e54808bd58c3f3291f8d914c03ed5ec94c
SHA25657ad49273795fec0339379879dd64eaf317c430cbc7aaa5d1edcf710d527a83d
SHA512190e0de4fc655d7f9dd9c34cf18524f1dcf54b05fb68818276df0abd8e850d8fa71706600d64f08445b06c43175f6645b006091051c06e3ad7c4ef3e1eb69ebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54631e2a9c593bfdafc67e63748c6cce5
SHA1175e2842b1e0a80a10b5a7753bb2651a68fc1134
SHA25680ce96606804f323a540dd6785af7ed442a4669191e1bdda6d84a8ef5fb1f7de
SHA51235b5eb24748dfda9ae339c419ec3caef42799ebee49edb86b0e1b02821b150a1ed110905bf073d8e1db059fa030cd6afc58a1baa45c15eb5f7cce375116f9701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574f8e7d80eef5b8a89850086333e864c
SHA125d710cb130383e8f40863e1913887a35cd3c1b3
SHA2567260a1325dd4573e0d89cc0fd0daf85cfeb8b00eba06507b2424fc4e9422296f
SHA51230d340c94b01d927cd8040fbcef7eed944dd3c49fbc1761e0fdb87924f78fc9c40f3009faf549002ea8e015ce11b4925583d6e424360a68f96f956d95b79eacf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a61142e3d304d9321c1bfe4cfe8f5d5
SHA131c50aad5048d85425c20fb637763b415253c8c9
SHA25603ea33ec8b6da7b72be55e21f404a4b370f31b170c60f2e35b2dab0be0b81bd3
SHA51202965b57ae45d16ccffcc425ae46b6f5b34297e46394d2595f3680586b542712003f57fcc103bf264b38722da7e01c32bd620400c1b31d2b67ceb44411db2fd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9f8529653c63902d627661544022244
SHA1f090721b927341b9638eab09789438dcd00577ed
SHA2567f2f373adb391d3a7014fe5a296d058f41a7d30860597ae2fdcbdbce5992a8da
SHA512e9321304c036cd0eda5473285e24e65aeed6cad2a38e792194cbc28c8f6b732c49561f16f52612a754c2821fb2ec4071f983a645f1e01b8499c2fff019406d3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5063e42df15a416a2dc5221b76b866ee7
SHA1c45dc2620226cc926557697813bfb6628e707cae
SHA2563091b1f4418067af04039fb757f1d0fdcb920a0c608105220de872dc9f2d5d04
SHA5125abbda2cd9454f714364ca15348d796bf1e987f1b801aaa5e5877feee5f2fd56274011cc59bed7e15a49702deab6d3ff81b1a3854dd6357c307fe31e7bb923d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510e75774035492fde55f980ad157b5c1
SHA1c304b123bfd8659f40c635d6d27480e363c5e2ca
SHA2565a1eb7ad046d341319f04753d9bf02e1d1b8ae6f7ccdcb1ff58223a0126f0d40
SHA5121de919182da434496fb1db7037b243d877cdd70be8a243f55ef974c3af689d4263eb9d8c229cbe59eb9961e5d39c523b839d645d1da01a9d65173f54f920aa08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a45f1fa846a4c61e403f95c80c2b633
SHA1bcb47b1850396832ec883b31cfa7bfd57b65a0dd
SHA256210b8646067c30b53c0c7326a1d366b945762d5203c5e069e8ef84b62478cc06
SHA5127579f99b9ec9957d554f4540174efdaf76de5433dc5683c6bb5e3982dc922094012801f5b4df4f571e02603e07e1643991676ee6b1656f0c87fd827e4a2f020c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5727fd7ca21f9eb14bba5beb2c8193b51
SHA11106df5d92380418c44061b06e816b8fcbbaee4b
SHA256df3fd9c09516a1bfa1d844165c0e803a9dd3a3a1a59b79f6306129de85975491
SHA512bc1100794b647f6d02d9b41abb29df7aacb8e1e46038c03dc360baf03ad17f04c04d051dc6ebfe489990ab4dfb3b4c7fc4d650f71b13f72d361478abd57c8da4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595f74ad4e98d34f3d9ed900d8d52c49a
SHA1a95d4fe06a4ba60089ffabe999c5a72b1bf2b305
SHA2560f61945ef79912ccfb615cfe8459e3fe67e24efced82853785ef530d0b12e289
SHA512725a4174f55861e9a19426722fed92f662ef43bb597e351a00aded16ac60a99f720b3092415e14cb1f03109e5b035a772495e9d660ea28d8f4fa6abdac7265b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546ca7ca00d23ddc1a369ce2430f9926c
SHA1d0d4b803d3bae1bd6978a0535cad7b4c12262d02
SHA25605cd80d8758c6782c0a57f65db2ebda5136fc10a8bab3a4d665f82fc0a7ed965
SHA512ffe45cec5d62c7be665cf8ea4e70189e0cca293d91c8f7a1719969930b3c197d31fa4467eb4c4e687a52d27fb7855e482ef27e0f54400d26a619f3126a5e4091
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556efd58d254ed4cf4acaf049f6a1488a
SHA10c06f794c0fd9178dedc499f6d4deeecf263b647
SHA2566952403ce013f0ca076fc6c3d53b4c73b679e84ea0e60db11b9e8708bcdab478
SHA5125da198deb8aa5553001a8f71c6acbe3430ae3f02695cf67d461263e2714bb25d2fb09af30fc8ecaac7bf8fbdb09cc6778ded3ff8f60bb06211b534bfa3175438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582c736f3c3145cc43fd2cfc45ff59360
SHA10ee8eba8bf43033272b2786b1365570833097ed9
SHA25680c0477284d3061c3475546263dc9728ec0533f93f5ee54b21c276ef42d414f4
SHA512d52c5502bf9399468f28d504017561a413bd7f9cdb659af05aa9a7381fde137c39942c59dabbf51f825cb48111c123a70333084106a46ecb76694c48714b2960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c504bec598a01790024acbe9e682649
SHA1a5b475f673ff19752cb22a2722496c86b7bdb960
SHA256385a39c31dd637a845cb5a158530934bf8217996205efae9b5efce319e7c7403
SHA51246a00086516aa5a149bf299d0dc595be0bc073d0337b9b85f5b67c0547c27e9a0ed8762c5e303729bf4fe5385a47be4287e0270a51ccddcdaadd807fc89a2302
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b