Analysis
-
max time kernel
138s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 16:25
Static task
static1
Behavioral task
behavioral1
Sample
befdad4e8dd6003d1c7806a469c6402b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
befdad4e8dd6003d1c7806a469c6402b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
befdad4e8dd6003d1c7806a469c6402b_JaffaCakes118.html
-
Size
24KB
-
MD5
befdad4e8dd6003d1c7806a469c6402b
-
SHA1
01462bfba24d671aaac191194a79930a0fffcdfa
-
SHA256
2a26a58f42e9113bf5374afc6ef050ccddb31ada036dc8708ecd552674b75b55
-
SHA512
62e58eba60c086b50a3efa381031cba00d17dee45f88cb0b26292f2b7be9d9b47e6d998efa9241505f048c8035f61b5c7a89138e1ba9b424e3e3df47f8fa0853
-
SSDEEP
384:C0oLqP/+/OCBY50xQWs72d65Is2PHYQd2Bxn1LnOnvnjninZnJeOdiladiJhb/zu:ZOdkGeSQk+B
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430678608" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7C771B41-6235-11EF-AB71-E6140BA5C80C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000029af411e1b3d0fef528181eec34881a351ab3c4759374c43ac64dd7cede71cc4000000000e800000000200002000000048eb15dfde8f4888b7833b093a96302df003fedc17b5eeda73ac5b3e8ef79eb8200000005cd9bc38c41733440d6ef82e5e952b87022be0c9d0d03f3199cfe46e78e34a6440000000c6f562b8f7ad6c7677da1646d90e93ad7211c0c06a378fbbddbe4257097dc3eb6d52a2199e717d7a54253ae5618caf0a7ad174342b00097219da0880cf889eb1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8085756042f6da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE 3052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 3052 2072 iexplore.exe 31 PID 2072 wrote to memory of 3052 2072 iexplore.exe 31 PID 2072 wrote to memory of 3052 2072 iexplore.exe 31 PID 2072 wrote to memory of 3052 2072 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\befdad4e8dd6003d1c7806a469c6402b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD53570fe92aee1854302c6d7b502ddae99
SHA11cccef1ef8f577777aa5346e74685abcfefae2e1
SHA256f2ff3a224fc536c126fa92277e2c4e9d0055d659c488998ad74615e3525b3185
SHA512960dba90a6a06a21ee2ef638d7354c371bf209ac954aac20ea0daaa3adc97dd750b3d36e0e88eeb558f600b8f43c09bc529c77776b2eb3f7907d5d939f38755e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53108f188e6056e155e6562429d86ae54
SHA1af72d11fd8e6b248027ca790591ae23d66fab817
SHA2568a8c8657722b50d045a200f563b6570d2fb609a0336ca316669e922d0b2b2d65
SHA512b942a442974d960c3d398f9e213d5ec8c021425c039aad293b42ea5275fcf4709c627dd549a8e13e90d3054188376511cac38691d5606871a825b63ced741349
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552cc6a77033002f875043d9288b6dd62
SHA1303f2fb7d4801c6c528fae8e36d1070d52ea91f6
SHA25656639756b7ededa7c7ee33772bbbd2540e64bea44a7a935f98ab5513bcd477e7
SHA512561a4b2a5691f2ff7ffa408236d9c5cb39ccdb9b37ecacd78c0e5a3a107845733a8498e6fbed30650a7600bbbde4abc6fdd3e3a635203cd485c1289ab8e328c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5de4d4772e6f0ac24b3a14a56b59f5c
SHA138b7246c5aa5ac4408fe6bc96234ed3f73ed5846
SHA256755c13c48e1068a70fafa145927ac8ee42890f81232dbe4c3dd5d0376c880737
SHA512c1f11d9287070bbe8fa45978765ff3ebaaa1b38586f658207495b6e48c6f9b8a6ff70b670d9832b89953747fea6dab813d4899c7fd551b08931a206491e76ea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5628d4be65a9c4331eff53459357dd052
SHA19634f84fb39b321a8a405802142a47aa0524a340
SHA25620ccc35bbde46022962b624927749cae1ff1f57a08520b6f255ce9c28c2fa1da
SHA512c77b7ff272cfef0e031648f32e31a61d207e3a2f01cb5187945f9ba4ef723d852f417686bc1fd722a0dcb25b524931db2f1fafed79f863251240f90791f4b1c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1ba668da96c5b57a4e99e3bc487ddaf
SHA1222632d8d70eaee084376a4a34a8cd78361e13d8
SHA2560a92df95f4841242271849a3ad12d2664d7f4407bd030d0d4aa8c6ed86dea601
SHA512e78ddc0aa0bb99a0ed8cc26a5a37e21a40b7b3e70a67f48ddb9c076c68fa7d187fadea436e735749f6bbb8dc7b169b04745c2f4919e91f6603931f976279cf54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a7ae1039b92fb6939a562282f7d358b
SHA1f753f1aa02e43cc459e6253a8f4e00606ca2343a
SHA2561b93dbbe8eebccfbd358d9be6c1c69e372a2de7cd6212f53f1b38684655bf565
SHA512002b5a6175d0d52c0c4c3d26cdff98bb7d0d3bf94070c29db22cb5f2990d0c104b7252e38d92fa6e6029658ac82109811afe5d5c87277d96e50ea4fb9fdab571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ece1245ec5b4c808e22d514c4fd612f
SHA1e40e9178e8701fa369b7d3831aca5d2fecf02dcd
SHA256ac84ba4ac6e86f7a898090b397a81d907584d4492125b707e08f36882e8c1c17
SHA512efb34ad826b93fafbfd44d68d2909d3673332d97a1721478ca0b636737c92cc964c0c091ead1d3f43a59da9699f1f6041ab8747aa4c403952900ad86f70bd9ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514a7482144871697bd896d68775632f0
SHA17ee852e4b6e000a628a5cd1153cadc1aa4003ab1
SHA256d9c996fdd585ba056c95b94b9bc02dba2fea1285aca5c1dee79d45dbf0589a7c
SHA5129d8aa7a9822dcd9f4af757bbd897a79ed1de05895114b75ba8bfcbecf0612182de12b341431113f8695b113ed59577f3600b8cdd9a7443642abc791c27cce1b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aca260f1e118bfda959de4566aa7e48
SHA123bc4fdb561ad590c3ce65a072b395fd78914e69
SHA25663956625f537f716ceed41471096edbedc9c38f624cac345fa41349359706e0d
SHA512b6fb9799cc0a89cde1b24bd03fcb0636e3df8aa9b6cffef256e73ef108f6590bca74244c2d17eac3a1e6c7473c8ae9c04a7fc541df2339f08dbd2784dbe74303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5ac4ca049746a802df7e1b99e1d7801d5
SHA11ceacdff6fcc7541bc374051d8dc7311fe9256a1
SHA25673884b3607ae41bdf770df90aab2149cecf414b96735cacd9a96f373635ba06d
SHA512f030a46ed6300eb8e3a5d6451c54afb1bdf27cbdedd69323661a7bf7f2f4e83e81e70b3da93aaba414b20c71783ec8a6acbf1913aea85367730a1778ecd19e31
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b