Analysis
-
max time kernel
136s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 16:42
Static task
static1
Behavioral task
behavioral1
Sample
bf04ee44f1f87889336ab3cf9b794a04_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bf04ee44f1f87889336ab3cf9b794a04_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bf04ee44f1f87889336ab3cf9b794a04_JaffaCakes118.html
-
Size
20KB
-
MD5
bf04ee44f1f87889336ab3cf9b794a04
-
SHA1
6739f020436d7cef28b4a094d834046a8356e43c
-
SHA256
a9a6cde01546df8190acd11dc679114c8f8f22f52c9b5650f3c82bad1b68ef45
-
SHA512
c2fc928fc8ec928119f098849dddb7dad5df58aa030455e5dc4bc483121038d1b924ff6f9e683101b1765cba5bf19100150271058c6c9fc265ddf6447eda48bd
-
SSDEEP
384:SIu5ijYwdcBvN8IOB/ugkjsfKnIUl1l9TMadMkSOivyJhdp4g4Y/gU0C7B17/fkL:SIYwdcBvN8IOB/u3jsfKnIUl1l9TMadW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430679589" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C96864C1-6237-11EF-BCF9-7EBFE1D0DDB4} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000047bf8ee5d94b15f7f7ffd98dcbbe7fb033aed6b604d3c861da74120f55cdd042000000000e800000000200002000000035b5292a8d268d42501638d0df8e56672e13bfde94f834f65a7c7fe894991d5820000000bd5d96ae765f56b79479cb21528d165af62819be2f4845ee2735363a9d971b6c4000000077aab0c1fbc339ff8901b636f0d09699829ac9e0db5aea5174ee84dfce3e39de87e0a4b5f46a7a6f028b3b60a89d0b86ffb652e87f5e52f4cbff948c8f0cdede iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b08e3fdd44f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE 2656 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2656 2668 iexplore.exe 31 PID 2668 wrote to memory of 2656 2668 iexplore.exe 31 PID 2668 wrote to memory of 2656 2668 iexplore.exe 31 PID 2668 wrote to memory of 2656 2668 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bf04ee44f1f87889336ab3cf9b794a04_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547e28710f128d7ed7966a11de9e575d9
SHA158a55876c46a126558fadce0700b98dcc2807fb1
SHA2567f8ae65fb7c4f5772908a31c05cf93714f88192f6f21361865922d192b4c6fb9
SHA5128dbd751f0f8d573f09b5e3506f9cc24c7486cd3f7d0fba54a83377a7104c853315b63c96d0fa7230363848a03d352853ff3134a45e53003bca5efc59fd913c37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b39768f311e16d2a8e95a572f5ac874e
SHA13bf6751d239d12e40988ec8bac17880dc5cb7242
SHA2567698ddeb47f7a563cfa2dda1d1283198ae643215c90c7522f6166e2390edad53
SHA51265889d2d6a9c77bcae5fe8c84c7ac529be65935508c08e4119c9c8b8cad999567c3e219805b4e3dbcc6fa3c75827e71c0d306f036d0ec17408dbd8838c65f213
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545311166c6b2ff5b341de6e847685433
SHA1215a3a7ecb6f3e0936afd9078a6d0385314dd114
SHA256377993070e181397d039b55ede65de1f33571c5e360bebdb76adc5ae7bfd927d
SHA512d89c6896f1ba3dd11d3950d075dd0692917c9b55316266d2c444ddd96dd2b20db208d86db5b8200ae4262d41d6f628c7376b4d947c118d2cc599be7efbec6864
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feabba88501971eef7651ef2a54e5997
SHA121999f66ef4d6dd8f4b29e4b20dea63101d5db2d
SHA256f49c26874656497c4e7075d56aa3d59a19926e035f524059b5df5ea510cf43fc
SHA512634c68c2b845c4c4a7b8f991d27c164f27c2ce6a9c4ee39c0179a406d2a127b6ca716ad0b829b7c0bb086bee109698dadbe00c228e823a91ada25185a9266753
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0900f472549e5903780be7fe0c77d62
SHA11213b9e5a2bbfc41599649f34adaa8b053a78f6c
SHA256da8711ba7a4ac9cee13c826cf05c2269daf327c7cfc79da8a223b53d77f8ea87
SHA512ae3b310f138ce9e2dc2804ad360730371b89dfd221dd754aebbf5fd72b3910aa79fce0cd833aa619f5370639510910d2c6ea79c327f3c8336ee906d13cf6ca27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5553008098234fec60269b548c1591b13
SHA13d3694237eb43c94a26208bb9098a3626db41e8d
SHA2566996b56e7314a2336ed62148e83d71a556a5395ced9892ed8bd6a55403ab318c
SHA51239bb4a9399e247963bea973563b5f4ab69747a42442bfff988e6126d2b8e4ae36c0a970131532d15873bcd35e25be35a32218780521e8c28726a0c0badf248fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5608a92d4af000b52d67c3ca2ea14ebc5
SHA187f9558f6f4ae3aee037f880488ac1a18593cbf4
SHA2563f102eb537413adda35106e27ba89efb411e505df950832f2b02a41b6e1c4a8d
SHA512a6c14a6f14fb595f354bdc2dd5a8a0eb73426e39487601de4d7e1f0b65a08ebb9566966ea32d814e1c1cc5ccbfacc85ffb18f252fd3715c62a4cdff746fd2970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daf2e48c4ad42c69fbb6fc084cc26cd5
SHA1ad990c78775b57274b1f105b38ec1c4a4c3c83bb
SHA2567deb8b341d54ed2e4de04af7103c2b545a41fd42b4ba9f017492cc66a1685d21
SHA512a7b621122751b8744d924747b5c72d5ee84e8643767e6ff01d82b7c76fb7ae2d4d0f71ea02d438087921c6267de29e59000730478deae55bfeff63a5b57366e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592e6fbf0198110c7e3a1aa461a48f968
SHA130d15fc6edf3e499465dd5f700f9ae0354742c80
SHA2564d338c3d0481b49ecf60c6bdc9f19c8c8110b1d257698635e6724fce6c25a39f
SHA5127e722e89874fbfd2b24f67c1d56e0191931eb59b6a3358e6346f17605e4a7342db6fd24e0f0e716f5824e03b8a8cf7d69433968d913e5ab29eae17169bd59c6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cbb1112096db90a36c56693201e9111
SHA17c1b010949a0ac23ec81d91635c8ea178a937243
SHA256a7bdfe1af4e35644df4b49ef28e1d53e7938c91b3378cd5c7225ec4029bc9b8e
SHA51261e850e09510c81e3601d1ed2497f8aa1de8ab59a98de07567ed67ebb051d4d9375e933a10fd5e705082252702272ec409a528ef7400d07e701f5c326c47064e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e9686ea923551b5ca5277aa53e5b4c0
SHA1d06b81e1deda2edfe08fbb4768b9cad7d3276545
SHA256ec8939ae94737d2960e7920a81712fa66d52cb88c1067503823448c5eaa696f7
SHA51254ad61af561c52bbfbb7a621c98a23a2bae790665e2dd97d7fd2c1dac8a329e94d1821d89229486bc42d5041de0499f8ac6915a0aa0d0b72332daac8d3ce0da5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540d9b6c969225f90224f2a4fc264408c
SHA16199d1c43f91bae290fc9dc72cf4538ef75ab05b
SHA256ff5374aeae32f344f77615c71d4655a3ec573c7749981d82c5c8dfa62619cd81
SHA5120c93325115adebfe60833d11386e1be3d7034397c20239917f8ef8f0987f2e9d0d0e34b2cad628a44a74082fa4dde320af905a98ed8f8ad65331ae72ec5b1f1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54264a508350ddd1d784fc6b3a24cf62f
SHA107477a91b59c7e00c29b2abc9d5d53ac7cd0d921
SHA25642a0af87b9429595dfee8b6873a0a2610b717e7fd00421e7c77da8a7c6980799
SHA5122b3e806a2410dc07fc130f318ffae449696d405377e47db8055679a002bc04c0f61c857fe5ddac347d36520e39838700531f61704f8f5ba4e933533dfdccbdb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d70877437d552aca0cc74a7ae8bbee3
SHA15315ebc3a451974562a11972d0a310a71b7b4282
SHA256056eabe9b4c531b1898eb24917ed2584eb1dde75c64952eef6bd01c9b2a224bc
SHA5127be6df5ee0eff528c9e18fc2d6916725d0706f45ac8677dc7a0b2b5808cadba783a49b11e6f334cacb5f21ca2e76b425ebcbb1da711ab4cf7fcb0bb9405cdfbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b5f2ffcdd510f53737675d4c2f0e3d5
SHA16a5a3b19382f683539bcfc044736ff1fc03983e6
SHA256608e2c92203da3ac0753472ed4e50d0e27afab9a37a71ae22816ee9d46b35110
SHA512bd42af8a5a42b1a067f4c5a9c57fc0b2a9de55438b43213b7b2fa058aabd8f2e761876ef84c9440e7cd1037e38cce0142a5f02fecdd7662fb5704273bbba85e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ec089a0731c9e6185aad8f3b6044d56
SHA1be1a56356d7f4ac0dfc134af51833001ebda1226
SHA2562ad04aab810f0dd84c4dbc5266adcd3153b5a7e5942151c9e806aa9c1feebc95
SHA512771a87609824dd7244a616d081748bdc943d2e7e646f262fa67f760c3aef5f162d141fc64dd8054e4304782c0f7951c626e155fa60ab6168c04f1a60a9f7f583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3483a13e742d51ef16e700130f321f5
SHA146cc36e24fe60569adae87b0e45682c70c7aa96e
SHA2565f92ad82e810ecee72922eb7886ee7a670033afef5924033674df2a17e43ab9f
SHA5122dbf9e6668af74a16771eb021f7720921a01cce8cf89ffd8c6d0e5d876278924112114618da873ee03b5efdb368152025e5a2be062248fb7727699a5dc4f1fba
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b