Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 16:16
Static task
static1
Behavioral task
behavioral1
Sample
bef9e9cddf88c828cd72b84092d74daa_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bef9e9cddf88c828cd72b84092d74daa_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bef9e9cddf88c828cd72b84092d74daa_JaffaCakes118.html
-
Size
69KB
-
MD5
bef9e9cddf88c828cd72b84092d74daa
-
SHA1
50b08b557773e9fda8d6d3fb1c0a631a6a5c7a68
-
SHA256
853af614a22332c4cd20fad3e01f7993b7e13ab74c4daa3c17c9a055628cc709
-
SHA512
fa2bc1aafa17c3e7e9f02f7c645435b22c3b1bbfe554db30b7d0e0b1fed95ad81c7bb1f5a6aca8fe030fbf8282ae6492cc173105a10735a0452f19bb503a4b06
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6s368boTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8sM:J3kTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4556A371-6234-11EF-8153-46FE39DD2993} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f0000000002000000000010660000000100002000000098818516df7e01b57b33dc2f0d8bdd3dfcb22b796afeb45d7ecaf22c69be5dc1000000000e8000000002000020000000d35b75ff3c9d9156bb58f623cb70c4fae4e95c38bd94927759ec68047d52aa8520000000073c7d1d209285b4788bb1ec1ceb5cd925b132b2beab89c99dc8cc985b196cde40000000c5b6dca6b351df37d26315df80a03871f976354512bc767e08503086cc7d7964ee124aa4f137f5d0a9661b71b7e809ebaec58bf63b1034ba2f53266e04a5b775 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430678079" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2066b31b41f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2412 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2412 iexplore.exe 2412 iexplore.exe 1656 IEXPLORE.EXE 1656 IEXPLORE.EXE 1656 IEXPLORE.EXE 1656 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2412 wrote to memory of 1656 2412 iexplore.exe 30 PID 2412 wrote to memory of 1656 2412 iexplore.exe 30 PID 2412 wrote to memory of 1656 2412 iexplore.exe 30 PID 2412 wrote to memory of 1656 2412 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bef9e9cddf88c828cd72b84092d74daa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2412 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53289b11c93702e90e48fc8841deeb0c4
SHA1bb897a89c2db9d291d16fb78f6a717fc83e48781
SHA2561f5e3171f3764bb8752ff04bddb81c636b96d4b65647501b36dd708f546c1c50
SHA512f84e9894dae73bf12e5843cf021850dd019a36909629cb4ea8598d906e9d2dd9fd5db33a056cd571c589ee83ed88f1e7f5608a70f4e9209c9798f7aab7bd4bae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a59abf973aadd625a2d6fecc70277bee
SHA1a8668cc07baf343f59202419002b6fb7045a836f
SHA2567c5a534bcde6ee7ef5052b9ab2787d66f68215dfedef0cd2c7a2e6473b98193f
SHA512393c227d49c3c118dd355c40ad792b216a94989cffb48f1ec6cfb0031b2ed48d5eb18dbe1f0c525528b0e29386db777b5364bc4a2ba893b712069d3e98a909f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de495220d6b42963589774b3880fc16c
SHA1e73a74e81fed5f00193f11587e1fcc6abdef64a1
SHA2564f55c557f5c5601ecd276e56a0e11b719da79d3c9d324f43db33d4dc197f900a
SHA512b633a9d26e75a3ce653a61dd1f165078fe9b3b2295b81f37cb807e9a4723f5e58f2659fa7e7af4cce3beccc46cd92e4c974173b8ac79e75130fb4fd20f351dbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5415eb2d0a07eb6dc11bff01c70f323a5
SHA1e375f44c221756a1d9fc86016cfe46e45ce9270b
SHA2566421300027290a9e9d22d012b34d67c4d3c3fccf69b12ebe1d4e7da7caed91fc
SHA51224736e21f7be10008f1aba300c04bc79620a562414b464810edf205d381ef77e3509725d2678082dff7f597806bc431b179404492ae37df44462653e5cd8562e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551dd11e348204f3e47ea94e9626754a9
SHA125655b6ac5b485f961833563be50d597d5bc5b17
SHA2568f8666452628240fd836361e8f52de8134dbdcac0b4bff1b4d0f2d83352707bf
SHA5129eab37442d8fb5ae1f6b389160b47c997f7d246ff9911b5491a288ddb2777debe300e644db7bea42808424740606aa7b864d513b334b9b6676202084fceedf7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ee9a49e714b44155e1a216c330f055a
SHA1ba19effd71fd98499281be26cd32c24a3564a3e7
SHA256916eb2cc0246d54d2313636983e2de5d752b662b3ace969bbc8ba3f345367e53
SHA51267db78727d8b8a6195c953fe13fe0c837f56653a1f3bcd945d59f87d2bd88957c50e84c7a5a2bbe9051038ae23cb412ca2effaeb74e3e70ebfa8f38fcc78e0d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8a248ba043d797d1838466f7b6016d0
SHA13cf0b58a3f196d96eaddb8d120d99f40023599bd
SHA2562b37df1bc13b1905819aeaa3498bf9374c60496c992f483387f5684eb4956fc1
SHA5121e6bcb9f5dedb0106b722f6538cfcaeb182f187db0b63cb3f27bccbebdaa63335d3ecae33a85a2d747e86a0102643a890682a811083aab4ef42421181afef3c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd46c10d88d97df7639d5f19fea16193
SHA118fbc067b17aaec2ba8c5991b0157ed901688aa8
SHA256fe6af434f4e75527158fb22cd815cfecf81d317f0c42e7b1075f7e994ca27c08
SHA5123a70cd96c82128cbc640da33f3db48aae284bd4283bdb26638270bb7d14e73bb10afb83d0808df82846cf5863aceb0a0729255516361df4349218c46584bc695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54df947b2a1f52027343898a9ac712558
SHA18626f4ab6b4c5e808166cb5e14e7d3a388681dcd
SHA256d2308775bb33d52d511f80aa45c7cb38c458502447a73183addc4ca7e58a596a
SHA512184433e94dc98b81dad0c861d9fbffc63844ee9e3edfc659d418b825724c98adb9b6b725284411fe5c8fe0ae2b7e26694dd6e71402863dcf559291f85285aa24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cf01290c3d63bb8872f72f6a920f5f2
SHA1b10e300d4fa1ec3f6d16eac7dbeea603d394d51b
SHA25649d08cd6a68e9b03dccf3ada21e2714fdbd57cb30c78641a5c68c31b2f7800f6
SHA512d3f4d5f791a8ab1054e36dda2c7ca5a1fb90e192da7b43d11dfe228b907b2384415eb8c6666728a93d35068669ee9503ac9047dbe0c0fb7cc2e3a0141a515013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534aeedcc4e3e67415da64570eab199ec
SHA10b726f6e96b1121a405aecb6edd7586a778e5a18
SHA256a5a49b3c76fc16851e10b6c9366b3004059829f31312ffb941ce7e11144e1127
SHA512d039fe0b1fcd94044c01aac05642beeaf6cabadfd2e365f9df80a2a76c0be6e0402372acbfb3fcd1113dd06908bb82baab3183edc5cf92fcea5acb87d45ae037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d8c08153b2b7d7a8c519c371ce71468
SHA1bb8cc37fb86b823543ce8642519b338ccef0df9b
SHA256be5b51ed765c21d006574e1e51683c6f9972e5131423c45b9c18599ad268b2a8
SHA512d1b48caded2ec7f0879cfdef2a2fa145fa2ba47f9365a2ef01c6dcfdd6bb9b2282779ef1ea24288d105aa168378368791a9248aabf45dd62d89e326db0a7ef65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5289034bcfd99012284a75d45fc51f02a
SHA1701e0e0f0a1d7a838e6e52386afb73702aa046a3
SHA256bf0c0675e6eb415f79812be6eef265e4cf658340d0e35652342e4b3b8728f048
SHA5122bd0dabdb326d2f7e7f367a7bc9ac9088a21c875831406180aed6f82079a7f4f591f9206401e83a6988c0a259ccef3d6e811dde4b7f184b473dc864f92e7211e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505ac4dab835d439652f93af6b710b18e
SHA13ac380733490f3f16aa40805169a91060780f47b
SHA2569136812a0ff31174adec70d0173acf71b259b610a270179322fbb51d99819cfc
SHA512dd5174e0c06dc03193b86874680dad401f504e4db961d2fe246723083ce42f140d2e0bf31f97cfc55be577fb7555869dd107a11e124bf865bc29f1418a9ac046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cec9bc60f93cdd125561c7bd735e8ae9
SHA1801de79997bc547636b12fe851e2a2c1c70c50d7
SHA25661d4dcc178b92287193d4b836a506c8e6c3ee6d5936fada33030ec43646b1793
SHA51286e9d6a91260e2dc4290b5ec9347d9410d032ac89fbe6a605f862ea49813cbda295edf659deee8ea670cd25b649edd796ee61c45c0ec4e280c6623e1f62d961c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c1a03b145606999fbca042212c49838
SHA1c6304a36eb85f6fb05c60e81dc075b08232498df
SHA2562b975b3a73263e4848faea58b44f711694450fefb46738f8748f786614be67c1
SHA512f31409db64dffa7d7a1b38eb9683a5571fe56b2c5af8ba8a721dc930bef808ce98f7abab1114de4646b210ffc593a602199f738bec763d923dffe111d5a63309
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e7fdf67866e8854d01e6563af9582b9
SHA16e0edf4d8241d8a4aad50a9acb0883586f582d6b
SHA256dd37450c4f9fb2b407b377ae0852223f73002e400285b79539e7005339c07d05
SHA5122bbffb658476d2546bbcb6fd8e35cf13d12ec2543aa288d3403cdb112702a5fafdc3345472d7cc98e2bb21e74782d974ee250387f8339db36ee65c2676108e0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571f5f90d171060def0376eaa3da05eb5
SHA1ac84804472915d5b20a43d3521882379f4f57393
SHA2565a69f61f1801abf89aa72def31a53e19f0c3803c3cf0dc6429fc14f9393bdffb
SHA512066944079ca1acd302333c42c8040b40ea528ae382ea96d23280c44bed934d18473c97a4c53e1917e9eb947460cba4a8b595b578412fbde7314592ca07e94102
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f88421aaaa6b00f58397f5c3e6c2bcd
SHA1d60359cf27162ccea361edcb0999b1cae7649da7
SHA256180bb379aefad4cec956308c1f948df1a91b494c5a5d334aa5e244b541c673de
SHA512dd4889cbcf39bb93cb880cb0d2e3b52d0eb0e72d0bed3721407811969156e00086c3431f75db8b23ba596d04c741f794d71d8cbdc11ce5f59625717eda84504c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b