Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 15:02
Static task
static1
Behavioral task
behavioral1
Sample
bed8877611ef0e2dc62fb31acc3b4840_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bed8877611ef0e2dc62fb31acc3b4840_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bed8877611ef0e2dc62fb31acc3b4840_JaffaCakes118.html
-
Size
22KB
-
MD5
bed8877611ef0e2dc62fb31acc3b4840
-
SHA1
b15f6ea6200fc4016f1c739836d3b04d80829d1b
-
SHA256
3bd222dab353fe8485c6769aac1c59520f2d42a540be273faad005b8ad2706cd
-
SHA512
8e803f187d9966f0731fd1cf8490511273e5ad837933de30399c6ae843dfccc9e7dead6eab8e7d0b85d13b8aefd3a5580fccb59f97caa0e48f6939f8b02bada3
-
SSDEEP
192:g83GVwYzel5iYzel5+eWnLzyw+U6lt9Xrn4babDgdvJfHVp0Td4/zJfZOGXpsEB0:GDiN59CfDgdvJdtlZOmpTvuZYaaR4/n3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000cc1206e580e11c417eed9442b168acc9105073ddf587dc66c78818ad90f62e24000000000e80000000020000200000000ea4c52b4e48130a6278aab4b80d79e20d66427f9413c5d0e253906506499d262000000043ba33f29ff0db9d430ee9cfe736b1942dd5a803dbc721bb60c3917c807ed4c3400000005bba5789bc7f803d21ce5969f3862a6363d6fa41a662fbf1ce65e7fc8b91338de7a668b1f78805049cf1fa25820724a30cde766752f33cbb87b5896e0fa87d34 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0ccb4b636f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E095D641-6229-11EF-B8BF-428107983482} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430673615" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2968 iexplore.exe 2968 iexplore.exe 1452 IEXPLORE.EXE 1452 IEXPLORE.EXE 1452 IEXPLORE.EXE 1452 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2968 wrote to memory of 1452 2968 iexplore.exe 30 PID 2968 wrote to memory of 1452 2968 iexplore.exe 30 PID 2968 wrote to memory of 1452 2968 iexplore.exe 30 PID 2968 wrote to memory of 1452 2968 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bed8877611ef0e2dc62fb31acc3b4840_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2968 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507b8148ae7262eb3530c98604190c96c
SHA1e014d350cf231005b5751b378b7dccdb6354d80c
SHA256536bae72d2979992dfb423ed4c3693a1ec012d35d583fdad87f2e33ab56fb27b
SHA51281217170d69b7ba72656b341154738a11c0151aa00f77d59c82301972378131da9995f923d98af58efac05937217cfcda22661cea21748fd065026d81ff856cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513b487ec2b1c876e437b6c4a42d22be4
SHA148617249949c01c758f8bab6b96906e1bd4d0645
SHA2564f7fd86ffc4d47bbf358a1ff3ca3c8099e409dd0f4791de1bd526ddfb89f3197
SHA51205e61a4defd5665af24f930840e7eed9471d188c5c3d3cb8cd870b8b92689db51254fdefe171e1bcb09526e19f291056c9c0ff7b4cbf4a6e6a33a8bfeba6c96c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6f157209f80426a5b2f12ed01a62db1
SHA1223aaf5255ea999144430c0699294cf9aa154e4f
SHA256ce80f1bc013c71de3962ee3cfc4787e99e341827398f714d33dfda43caa1bef1
SHA512148011eee223c1564609c8d15dff3ab1385d7d428d244d62bf69a7a3bbff3aeabd7e8dded02e18a55280f8b71d3ecd37b7dd7fb7bb9c3c61ade679a309f7564e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a25775421297c5041106774a4a66e60e
SHA1d590ed1b3c3fa284208c0c146a58da411fb2b542
SHA2566a700c3d0dcab3a75fb59094ea0a08f13d86c47846bd82d20e914f1fec15436f
SHA5129af17d7f707e3a4ec972643b37edb4ce6e5f9876b4b57541b6e330c1b28e905f17b7ec22fd5c560cc24394f8582978bbaf8f4e945d852a115bec9436ea708784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50823113bd8e1f33bdcb0bd62c580760c
SHA175b536b314b06b2c430c56cecbef58f6352c124d
SHA25679951ad4ce6edcf54ba7bc2dfbfcfd15ad0fa56c56ab9c33749e6e61ac7981ee
SHA5124c9faf847402c099d3bf17c8cbc7eba014c01c2b766f9e9fa5c972815604e5189d1ae74dbafc70806d77ac3bda640921471b31ab6c086606671ed1a6f3829d32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5175548c88548f3f3cd88d26f87a633c6
SHA1afcc3c7fc71e42181febb83e2d156014354c127c
SHA256697ac5a33c38aae060876621ef535f39151c419ab2d4257c0d1b24c7ff979c87
SHA512f66d06e6f161dd0c96fb09a01c29539c0956d957d9fcb36abee011578a2306b95ec268cc01e3aa3792cfac6a4bd1fbd4fe3e3420c49b71f400ef1f4e092c8646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a1bbacc5b3c8d4de80815ecb78ba709
SHA10c74b68eeb08a5daf93b9c45a70af8b7bad7d267
SHA2562e513c58f5126a17350ce39f00c18c875e7ac477c56390df6983ffa1aacc0181
SHA512c5586924f0dc38e5667c0075dddfefdb830765f90cdbf1f714c37113ff7b7e5b49477633c2a9bc248b795ae504808305f7617c264be91d0112c589dc1240ea05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c4f3f2530a2a579fee5b6cf14229d04
SHA1c4a1a07faeefbb584c6aa7b49e7b2d49b79289a6
SHA2561929ab7b9996cd391ca318433961e195a13b8e2b16f26fc31398daae40d60653
SHA5128aca8af37330d83eb4884d0b89ddf07448092b8c31f7fa732709e5f451340394e67d534077dcec9d76abffc73d18032a3be0c7be0a585b5836b08558d8aa8d70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534f74855173861b7e78b7ea3272dfe00
SHA16a22ed48f6b134dbd6baabfcc8c980ac90f99607
SHA25622a3b69902b9f8db64c39d383cde51d0835825cf07ccb6b4e2afcbbd6fe239d9
SHA512aa266e4288932def53501b82c584f77ef0804ffa8972babd4e593cfb619ef1f6d4f16137b9c3adb418f63d144d6fbbc660d153c1a71b9084a964dc7bda30bf6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a181d4c908263990176efdc247e8189
SHA19d9c1ee6b74debee3433211e860e6fc1075ecdf4
SHA256c5886ed43f68c5c61f4f06e0e040ffa9e38c2154b98dec81695904529c19ff84
SHA512b5cae5045cdc6c912fe0dced232721a2e907723c194b51770e0fcd1e835e1d3137cbc16c96928a95b1ab92806dd83e0db54a4da684aa016ad4e6fb4c38d89930
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5004f195ebc91b68b2d7ed9c8b36c3bcb
SHA171b00b230e19b4318e129e8349caca7fcee3d33a
SHA256531e3755b84adcd884abad9d944c6871f72d56939301819f61ddc016403c2fa2
SHA51298982f0813786bfc5b13fe6a1e7fb7787edee1f39f96a4f716be64cc6f008c08ad8f45352aeb1b2436f7dfc781a5834c7e2d67b8cc97e580748f9fd61ed86572
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570edd50647eae4201a14ed1917e6a54d
SHA1ef57001af1737ddf3d4e53d1318c73f1c7984e5b
SHA256520ab666b702054ff0b17b3cc77eb85206425d8d4a581b62d500b66227eaa523
SHA512294a7589163b393b188d03587415887808a90d7b5047d41dcb457bfb339f3b7a10a288dd38a8e05dbf29ac7459142541a77a9b25b58107cc004e8d5887a4fb89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9fb332e7cc84c05f9420be76971ef74
SHA17e26190b7add9ab1630eabeeeb20431a1104798c
SHA2561e83e06a90796e64de5ed74853d1b18b1cd9584c723114292ee27a97c8ceb4a5
SHA51237711337fd8989b697aec1c99dd404a3b4701e69993f0d425b31674c0f84029ef67ddd6adc631f91cba53d7718381182f062bb6c4a781fb3a17cf28f952bc94d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5860971975e5b081bab08a7725dc384b9
SHA119c4364c885a1cb79d885238fdd5d3438b8d61e2
SHA2563361678d82252192f8e20d8f2ef18b3d45851691c23e593a04c5c83c5e08ea75
SHA512576a85457cdc198967dadd8df8b81c6fadfb0547301f53a095ece7403db359f2f334b6810e6fe01a80dd40e0dd0f875da125a7243cb262b8c7c6960fc8ad233c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b67724e8fe430a840e690e4c38adbcc1
SHA1b27f64899b65230ce07f216b8db9ea6cacb0357e
SHA25656acc22b2905bae8be74fa455433671eedd0bcbf4396215ad031cc1006469f82
SHA5123f9521c3f95dea78d17a5941a2de36b15fbbe36cb8ecb933abe063f85ea2037c654e571ba4e40999b391883b846450b214b918ece5b77d40c27d6db82dc2d8bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b17a0f547b0461be96bc4989bffc84ca
SHA135ae6bbad5ef3111589e8d627f8b5f32a45fc3a4
SHA256a75289f7a05b5263ce442db122acc784f52d26d1815848f7a68dfdede1cdd3ea
SHA51239cdd13f44ef849fb6be68034822f02a33c5857ab087f01a016dd4bc47853b4b1d0bd20ff69e343718025f20ae24cabdaeea3bd040d3b30a7abc8e4de434c627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51850664d7fb08db2fa798fbdce982dcc
SHA188c966c98bf9cf96ac2cbb9ce06a0a5fa6259346
SHA25669673bcdaa7f1e1121940ef362d832c054a96f9fe06593f34befa45b4a47713d
SHA512f07458414569ffba8d0234e530ce019fce7def818cec866c2e8c24402144dbc2c0233e8fd9b5071b446ae0e7414d57944e9329d979698a88d014ce2c48c9af95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51914711540e74263cc174c1d0c7f8bf7
SHA1e5b3a15d3ac23dd59f624cbffb0b5e3ddfe4dcb4
SHA25627adfe20d7a4450afcf18e21ac30b9530151a1a39e9135358994957f66cf923d
SHA5126d76547133d378caabe6514334a68ea12f6247a58eaf968795e2d4e3565be8af53b8339f25b482e58caa064e18bb74648c186b086025bd566397ac2a6db4f676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5615071c01655b720c429d57071e86e7c
SHA1ac56b443a246b0a79f03493cc3eab21a73274886
SHA256640c1318ecfa50b7e688bbd5ac387fd386cc92722006907a0c09ba3966d691ca
SHA5128d6f2e2dfe9a61b9154f4754a6fcddd0d1af336507dac80d1236eb87875ca5fad9e06a215e7d5bc3b3069ee7dba9ff62227d7ebeeb086ea9d8ae486f0d36105c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b