Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 15:59
Static task
static1
Behavioral task
behavioral1
Sample
bef22fcd50da2870a3eec5f845d5f78f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bef22fcd50da2870a3eec5f845d5f78f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bef22fcd50da2870a3eec5f845d5f78f_JaffaCakes118.html
-
Size
1.1MB
-
MD5
bef22fcd50da2870a3eec5f845d5f78f
-
SHA1
840e979ae02467e1f76de4578733fed34a9ba440
-
SHA256
b89d1290b34484b2df76227322694e5ba644fbc4b8f26cdef0796723b3f2fc5a
-
SHA512
f9fc287e2876721ad32d4c741a437902970e4b6a3766cbbcb196aca39eb05216e937d1e5233690f6ce05e0d61eeee322359efb4984e1903d59dbb951bb89dc40
-
SSDEEP
12288:AkcldJoRL8aNKlGB66BDRl3LqBZ7xq/1q:qmGlXZtqY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CB28A9B1-6231-11EF-B5D6-4625F4E6DDF6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430677019" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80b13ca33ef6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000bda49e13a2a4fcea21eeee9b8f5149013f5bd13c1baf5bf02058ca37cacdd36e000000000e8000000002000020000000ab57b66e9f3ce841e7438c70f903fca73bf94411ed4623bc88956013b944fc74200000006539e63345f60b2d1c0b28ca71701a53867bbc99856d65fcdcb74400806411e6400000005ea0011a4c5c20cbf742abe8f2513e55c0c8cdaab00fd67a184b191d144fb1edc9dd3a01446922aa24190a505d56f3a7f2bad760da84da689ecc8f789d79abe8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2292 iexplore.exe 2292 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2392 2292 iexplore.exe 28 PID 2292 wrote to memory of 2392 2292 iexplore.exe 28 PID 2292 wrote to memory of 2392 2292 iexplore.exe 28 PID 2292 wrote to memory of 2392 2292 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bef22fcd50da2870a3eec5f845d5f78f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD572d32337ff94bcf896cce98d6858a6e5
SHA177438da925828eadf05b004265680526669253ba
SHA256336e274ddcbab437f1f2b3651da3fbc96c85dc28aa519d7f7ef8ffae38039fe2
SHA512b500eec4b15ff79bf77274159f2da101d824b8b6c67c3160806c4032a599a59017bed8ebf98d68797f895b7846103a40682ccfc5b7be6a2ee669d44ec4594acd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d789f91747668ab996e7c2a8e801cc44
SHA11560a2c5634d5e0374dd014a7e3fefea73561276
SHA256e1c7380077198c8ed3fa04b00d0d63d9eaf288d721614e632d28721d1a024076
SHA5128cc381979bc890c21ee7d3af65c10732533dda6a93f29140efae40bab3a40a7a6f50b21b72f2b3cf6ca16c6fa436949d1cdd5304c4c1d3e01cc350cf408788fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5498491f11ece1906d9dcadc60ba8e120
SHA17fb1df4a098e60d140275cdac7675bd30344c3fd
SHA2563adcbde66802c9c9ba2bcf4ef8971d137f14aa616fab829229d954b2eb47b913
SHA512d64c556af643315252011207b7f9c3e7a0acf509d6e9e1dfb49d67239382e0ad60f8fe561a3656695be71f96df4e563e76c24cef73aff5c73d2f21899713b43f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570478cb4dead4093d36d72442669a09c
SHA1d994a43dd772f576f64b13d806ee6f09a66e4611
SHA256af99c982cf12335c5ccc988c1b74f3e74089b767a64b88024f9e246cf4e01745
SHA512d29b22f80e96f9f904c7356dafbcddc846c4bb06e0f4afcd444f5db786c3828157567089dae059f1ac11c7aeff3097745779c6af4c07956b973717bb941ee2b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ef4558e4611dbb4801074007245396c
SHA1fe0a2e5f27d25bcfdb7c7bd5587ecb86bb192a08
SHA2560909db42abda77481a632d27cf35f4a69a51b77de7ecf1f82757c8ac56e28bfc
SHA512148689009e977cb2c89523a2eff8a2a94dc131a86181bc40001eff861b0b0be60ac46b72c6acfdfd9dee69f09c781f698cf991217ea0772daddad9269d4e75e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c11c9b5bedf6ac3e9b78b928cc78129
SHA17293f98d9936c3cf5be70fac20c908a066d709b4
SHA2568e6c98fd3c60a579297cd0fb8c96908f084961df3a0c9b21b0487c0a4e6a63bc
SHA51244a956871453902e7141d809ffe14e7dee8355461909e4a16794e46fee3f6075868b6c3930115dc95c0caec4db1426d855a618cf4e34300aa9d3245058cb36e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feff5d4269a781d6b112de4dc4b2ee81
SHA17d98d08b7a264d6b158e2546dd34296f66c48cbc
SHA256283b53910ed2a2578384614c353d44bd17b973451ccd21d59c93db82f788ecb1
SHA512e8d96f93c64181de658bbea122af62ae63578f35c8274dda5c1c71934deb61a922f611ae885ce457736923cb67cf6b185396b4edd198d263033e3b6ebc68ae0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ace3d4e9bd14971c39246ed3e908bfc
SHA138a511afd6501441f07f666970f2373d70c9d53c
SHA2562b55494da27cfc62da2bce3407a66c29399592b5808ccac198775fb0df818f23
SHA512b8a1a82872915a610d8102d364e0a29d606bfac5d2ea9965a77b6a89e7f0dfac68a2ee45057b20d2e862fb641e4c7c67686e3a8a89c69891fdcbb65c9d13a1ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53467798c516aff868fcc6ecb417ea0ff
SHA1b3fe87f58ed79e47ff24bf6fc0aff8e4344cd867
SHA256de60f30f743eb3920a2719fe5c426408040c0d5a0f2f01356bf79a93e73db848
SHA51243cc49d8f895b9ea0811e1b26af0088c9aa61a96c412b02a4541429671b5be37fa9af0bf2838bb166b818e827177b3ccdea44b1dcdea33df8e2a915419d4e7ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd7f8f655d9fa170ed31a2e95ee9019b
SHA1a0309015d095f243774555a8217f9e293be0af24
SHA256710c26e14bfb23b58c512759fd3a200b3066772d6995e9a18f71eafcb3ebf0a5
SHA512bff814ef9fbd59147636e2a408bc7b084e71996ac9001a13c79a985253b3c98927d7627a11a962f56bc8f0000eceae94fdf0667f9d35bfb01744a032480a4f9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54935894b02edef91456f73e71ddfc8ee
SHA1bd57f8e6a66c10f66e0f0131bda14f62877775a9
SHA256fce518df14f869d919cd678165e187725b3a12146faa3bf907478e1c0df37ebb
SHA5123e08d5168b380df943e1d6301d310f48f61688edcae8c3f2b864ed7424987b83b2c779ad82ce8e4d0d36543618f1e6c4feb75d7c107ac03fc781b945825d0d83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5065f9c83110d079e5ebbcdd9051c1f8b
SHA113c28119aac6944a8243bbb2a26b4f65c45a2077
SHA2562eeaf4a90f084290d141e32b10672c6d5221ae28e465bc1ec4bbcf5b80e087ba
SHA512cfddc86f1438c42ec6cf939bdac146a307c64b4031a8b6101e47f28c847cd30fd054d99d90c7f438e973f6f079272a2615458723992b659e4248ea7b2b0ae7eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5dc39f13cc27d92a5151a27b75e3c3d26
SHA15ef16d60602309f3820a9b55d9383e5de9e66889
SHA2566e12ee654bc6ae0960b8b3c7ba4357a6012b26634f97d39490830923d642be0a
SHA5125e47535a63e9f17efa1e469282b75524e4e89d47f3ec1d643ea79b2146cc212e6c67a3f7562afc06b68e34b925e65d308d64b94cc639c40eae2ae23fd6d2c9ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5eca98d33eb7c1071a2f887d20f5df507
SHA14928d05e44caf80c21377ddb930c4207666fa0b7
SHA256499d3f854e26e6f73f85ff75b6fa3276b764c291dcba83a08565147cb2941b44
SHA51229aee1458e33db913e37d002fb0591bf360daefeebd8c387785fca5468667aa493e2cb003f724ae5a5ce3f71c3c772330d6ba9cd573b992f13bac467fa7c53ec
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UQFHO95Z\bwypqJGPI[1].js
Filesize33KB
MD554285d7f26ed4bc84ba79113426dcecb
SHA117dc89efec5df34a280459ffc0e27cb8467045ab
SHA256b0754afe500a24201f740ed9c023d64483ca9183fa6361d759bb329462d25344
SHA51288afabcad8dbb0f49cdea27c64783ec98ece295f139d50029d524950a5b40a7971f033529f7b60e5acdef5f0576bdcf107fa733bf439cc76693b654ebdd9a8df
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b