Analysis
-
max time kernel
117s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 16:06
Static task
static1
Behavioral task
behavioral1
Sample
bef59fdbb317c8ae940d820be71f5477_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bef59fdbb317c8ae940d820be71f5477_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bef59fdbb317c8ae940d820be71f5477_JaffaCakes118.html
-
Size
4KB
-
MD5
bef59fdbb317c8ae940d820be71f5477
-
SHA1
1a4c23df762b72e1d23c40ff58a5b10959c71bf8
-
SHA256
51cea154611931b51f6ae4970222e5b3b658d553787928460c91a43f311492e4
-
SHA512
fc9b38a1b30e122344aa35d0af344cac3b400b768c9bb30d071a3edb3bfe0846de948f19aa1e7f1caefa31fe5bc810f8d944496b7ecb2db95e848372533dc1ed
-
SSDEEP
96:ziEUMCmV4MSEPBDvV0n47ej/hgOKiljTR1QnynePh5HaQ68exlfX:ziGdV4GD8/h/KiZ7Qn/Pz6Q68exlf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C87B5721-6232-11EF-84F4-428107983482} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000f74d44f9bfaca3125cad9303e8b55561b37c0dae7dd71ce1ce579ada463ba519000000000e80000000020000200000008981ca4e5b4b2d73ecd8a6199eab38a583e79a5fa86b69063c0fd582bd303e4b200000000dcc12e63b96047a14f6271ee0a05d573fbf0a2f6cde1c4fe4a711fb3201be7540000000a3188689870496d1f7824031994e7046b38d3e746ce10b45a0874fe580e07c30e2b01caf1c66f23c1bcbc91c72d3a3f396cc5808994220d390c1dd22e67c51c7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430677439" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70e0e78c3ff6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 3052 2372 iexplore.exe 30 PID 2372 wrote to memory of 3052 2372 iexplore.exe 30 PID 2372 wrote to memory of 3052 2372 iexplore.exe 30 PID 2372 wrote to memory of 3052 2372 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bef59fdbb317c8ae940d820be71f5477_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a90b477bae2b96bb6e45230cd34cf95e
SHA16f2c95a47e3fbc153ce0066de62446bb1c216faf
SHA25699098a012e54ba4ea3ed1785378b9fb1701f1b457cb0f9d3364ad9dafb73ce66
SHA512e42b164a5eb3869f15cf0a42faa4a4335bff149a16a252f72cf3f56d28ff2de4d95aef1b3146f24908cc6a9ff80aac53ccad93eabb0d9a8049a829f6610f004e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c26609497a77e7c68836b3e4391a947
SHA15b46b7d762d955707c26cb6bbcf281f72851d460
SHA2568e67c926f213b78d208de26ea46a16ef27dc595d3ead790950af7506ca711829
SHA5122103bcc4668962fc1ffaf47b09dd33d7165a977671191bf597d8732f1c937fce08695a2e5ad79a447d6d9a1c2be97b949f0645c037b4b0a9d85b095cdd6c1a23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca228f9419f1cf0c7cde4ee7f23e145f
SHA16a4bd599baef61163e74895e14f829b73bfbf114
SHA2560b13a7f6db299b803eedeaea7dff00325c30346df3f0f8c492fcd2dc753c6fea
SHA512036dc46be1df125b802226abd8a07164506838b8d6080da6cc4c27b4ecbd997f81df6cccf3e9eca991996e4836fa45700cb17bd8812931233c36b94d543be6c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571fead4c0bb97e6ae58d0fcb29bdcee8
SHA11752702b1f75b4d00bab35e088665f5e5f63bab1
SHA25697b514dd100d7d0c5d66da9e8955e9edc4e4abf6d1664e37f9a9101941226560
SHA51267ca245655d67fb940d33db087b710b4a1526b8c4c2aaa677a37d9eb93c906d8f385d5614d38e1adb500e9248dd45a70a7bb898f63b9eaa4c11c5b1a1e6fcb10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feed4c1a887d7bae1551c37dd4e7007c
SHA1b468d9e0365d46dbdc69897d84c49044c50ba124
SHA256115866c04692c520ca589c3a9c0cb54dd03c9a429776853a4405cd5ca3a662cc
SHA51228d53099edfcfe53ec7228dab75bcd9d9c43953440d3543149a76147cdac7fcb7e1c15c8a7c84d820c677e6b9147d2cf5f9243ccb4485f8b89eaeb1c7a2c4e37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f618aa557dca89edd5761d4e6527082
SHA19cf073641d6511d298fc4d63178b79bd5f694264
SHA25628e69b04d78a91369788cba92565061cc27537fd30f9f641d39d91e5f93a5e20
SHA512d9d5e3bc858ec04666cdd155375a038fa00a8a7b3326b27e4dd7964812856311ad0bcd6efbcc5bd18d7ae8527695ebe37e3bee26a30254fb1199354eff5c748f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a287c33a5f4f3de7d3ac060aad281641
SHA195c624ad1dc6fa79ac0d5cd6c758d9408c7ff055
SHA256119fbb7175e39fac7fb39bc2b45bbc2c7b06fcfca8e7a3c93b66cb5722f286bb
SHA512f14db695c8501b77c153e680a4e83f35f60df2da95ee4c65f15755a50658a95bc7261f54c78f554d0c3f70e218654cd6b089def17286fd8882bf6df1276175a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfd0003d99d5718966dcb7521adbe61c
SHA1c8a42b009d12763d9316fb5a21fc8cfbc2e9b6eb
SHA256ce8961b503fbb8e8ee2e46a5965c8b9a2158e69bae25578f05482637c43b0324
SHA5125831493177766b35f9d25e11feb26a337991a3d86d151c4b611da9ef7bbbb13d4c6f24f605f1be63ac7b176fb3f8d08b654bd16c6bba91348aa2f12d6496a182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b464334b31b5cf8d968eb51c50842c7
SHA1b821c2913ea58fd13d6f052047c3a855b233d7ca
SHA256643e31f1f240a5c199169e9460228944b963211e7af795307c580b0cbd669cee
SHA5124a94feae0fb02ea5fceb2d67639ee3155b4836eaff686fa9fcb0fc4d5e66e9368a0c50da4c6426340243dcb8a158027d35038ee38767f019513b98630a209363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e3c3e259b447e3e13df2e064f8f0ea4
SHA1213928711bb15fbb5dbe5cdef875b7170f627aea
SHA256da2de954c911986961d65cb11f1f435e7d827e980d71361d5f518846eb76c2c7
SHA512d8a7b49f3a94b5cdf8fa734b597f5c91622f66de3f4e643f52b0699ab11b1a10c9473434733f1a11f53c418da14f4f430e2a901c9571e7d0a51634a66cd71bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533f40877470e7fd48d62e488bfc3e4bf
SHA18bfc9ab58cb12bd718318421ea022082cf793566
SHA256e8f7fa286fadfb6a1204b5c49f5d6c76eaec0e6c5f22c6e6c2fbd234d8eade59
SHA512fb22c2c9d95454694ebae450e8b286e79620f60d3df05d45abcb85806a5d52289d0d43813a5091499c35edc45f16a8ad7f5c8d98a88fb4639db1858f9e180b3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fe4956a69bcab73a6aee0961c465802
SHA1f26abcb92f4b391b909fa120b7f5580da8121693
SHA2560be07a736afcb93bf0f06d0c2649a306ae4cacaf83f92aa6068e5262bc332b5a
SHA512c0602a537879f245579ccc3f38ce6b77b4c15083fd604a2114f76928a4af11b50b07fb6ca1843255f02464945597606a3c07d2b2d9d75527bf099c142d736dfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590b942a1b1489a586a12e00fc8f3018c
SHA142069d31fd4027a35d64d736debf533bb3b1992c
SHA256be7b577ba06f294408d1d7ebf31ebf422cc8b55905697a089663734f6c4a3522
SHA5122b42f9370d3da74a2317df5861bde1495139924d238e76ddc83c303ff7e4a31a50473bc36cadf4d128c119f786257de6db49540d49409c3828815985af17b8ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5375ce11c362efb8ea542a9b9b2b255fa
SHA1d287346d95e578a2304d22ff832227a17f457889
SHA256a908f03a6718cb9f41d9b286aa13ae92c450333acf6f014cc825d4c55f6327b5
SHA5127a3d332077010b47c2e0b6c28494a3b35abbf049a44268549a711f689e3b67150724c4b8a693fbe92c10ce5e567f694f20174a743761f039f3c99a102a132db2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51390705374091ba2207e3488a10af53f
SHA1a27dd7c1a9ddb5cc06342235b5a2d78c7013c3aa
SHA256912c3c832bdf491e07c9113f0c5dcdd95f804757df90ad6617ea7604d5f3fb5c
SHA5128e03d8c8ca1bcae45adf6c2d30caa920d352fafe56fd6b5c524b155ff2b44af7ccddf40489eb9b8f18479121d36d3170557980c3e7f81d1d0874b3f2f9901755
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587123ccc0c619c4f1828b41274a44ee7
SHA16e17401a8b7002dca1083e6bd1fdef109390f1d2
SHA2560bfe46167fa7cbc30656c70a3000d333b5c5379532146f67905b420e9356eff1
SHA512189a3b21edf98eaf3273f8ab164d2a005ffafd890a3f0bf47aeffbff8f0dfe2bf75ad98916dcb79015e88570b8ba91d76c7d9cce813726d73be0615f92f584b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b835d73151488b557af5cebaac212f8f
SHA1299ac005fb3c7c343a725ad9e105a0f03ef8e30f
SHA25653f015b07ea1a7deeb616f57e365f42e85c1bc20294eb364624039561a11e4c4
SHA512323ca0efb3a6f29361dbf93a81e51287cfe26e6219a81bfa27bab9b74df19e3edbb78fdd6a16d5f008ad8e4d625b612f73a105ddd81747b3a44656924f4f7565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578142f428bf7f1488600163241d1eef5
SHA1ee5471c5f4efd1fdbce319da30e5f7de108cd33a
SHA256250b27e4ddb116e5f9963a50e05be7798d1c4b02917af1272064ff54d27ada87
SHA5128cedc70f0de53b12a9d45d9ad82d72e45bf8470908d30f735eaef9d4e3b6e261074d55e5d837afad070bd869d6e2aaec0cc8e1f56ed040f6c352cda040ae28f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4c10d7226903df2a6688dcb5a3d4a7a
SHA1fcab21dbecf47847bc549fc67f49975545250152
SHA256a8374f0a46c506ce9f6a6f9ea65dd28b1fdcd36d93c775d4f34d12acda78fe2f
SHA5121baaedb270f7a6405caab306cc610e4284400bcc4fc1b0b3b3d09bc6743726ba95a6902d910c3e34e9a445f0b1f469e2f4841a6ed20eb38cd49dac0945be184d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b