Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 16:27
Static task
static1
Behavioral task
behavioral1
Sample
befead19cca8f9197c07dc985113bf6a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
befead19cca8f9197c07dc985113bf6a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
befead19cca8f9197c07dc985113bf6a_JaffaCakes118.html
-
Size
6KB
-
MD5
befead19cca8f9197c07dc985113bf6a
-
SHA1
6e42518e31c4b3939bee7fd457e60cf616b65878
-
SHA256
43fae15f7917fbe2c41da5bfde6b105159491f3c06c89c3adad267f10eb7091f
-
SHA512
f0d13ea614dd202c86d5da7dbc58a29d5947942312a2736796affa9a64d3b77d6d9e60f4181996cbdc3b6c211a4264a9bc8077ad4265cbe84f48c1976041f66b
-
SSDEEP
96:uzVs+ux7DSfLLY1k9o84d12ef7CSTU7yB/6/NcEZ7ru7f:csz7DSfAYS/9d4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a08e97ba42f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000072f53c5ce2658984e8e85055cc3e9d21b530509c077cd0a791f56aa8a9ce469d000000000e80000000020000200000001ee5830a387b5dcb221fd6d27f5cba700fc6ded15c3571b9545956a643d43af5200000005c74ead13e512b4d1ad4b04450ab71e936bf972e7ed81a738c9b1cc54bf64d5740000000207f4832ef2e98d009bb3359aa16295ce22a98ec6f48af724c209ac057c1c7a738c52e0c92598a2b2bf7fa996123f50bec789bd02e170995531bba6d37dee292 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CCFE3031-6235-11EF-A3CD-E6140BA5C80C} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430678736" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2760 iexplore.exe 2760 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2772 2760 iexplore.exe 30 PID 2760 wrote to memory of 2772 2760 iexplore.exe 30 PID 2760 wrote to memory of 2772 2760 iexplore.exe 30 PID 2760 wrote to memory of 2772 2760 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\befead19cca8f9197c07dc985113bf6a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2760 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b8c1ce19bee046959611eb25ed5cbd9
SHA1a7f740e1d1d3cc33d52964b49196f789af54b4ee
SHA256b0a3e774ea19985e709b12c497ddbc64fa8773030a976ce2c7a6e8a9510a34a6
SHA51276c28358b3093b6627d62cec9fcd04f1a976e2c2609087cc8c6e98c1b92d29273cfb3ffafec1fd3d1ed211e63fe6ab455e5b64849706c4e59e122bdd3d67f47e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53820c3233804c115733b5e403caac12f
SHA1f84c401a01e4e77d9101e47ddfc43c8939d6301a
SHA256b7c3cbcde6563d2e675802733117ed9df720ab8596e29d1385b03a6b51fe15fe
SHA512d51fcf8c1e1e859093d554ea7432839efe62d3da12647e51f40baadfa7acb7439d6f9f1fff5478ccdb45f0c77c1b5757b7a523da4c96b7de22a3e5d26dd95c83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e88a161bccbd2f293a0ff3015304569
SHA1728fa107b3a4bcc445a7cab853dbc484d71e6ae3
SHA25617f90479baadba259ecb58102c2237db1bba571aab48b28fc5863121056d3499
SHA512b20f30b07ed528b2e5b8731c9bf51dab67550dd57582241ba527bf93c221875b3308fd218bdccb3336d26446ddf27eb5b966867f66340d7246c921a1893453dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d275e2bf36dfdd83093784860ddb589e
SHA13721e09c649bc81a68bea167a780b21cd5cc888c
SHA256ff8ac9baef6f0da8f270731e922591007c7effeab61610f3f3e091c7692fc83a
SHA512c1f1328ab94229a657035e9b13c979dfbe2876b79f6597362653237c8964fb405ebc8a99d4ca46b5a190ab81f9ffe30bceb066a581488bddf24b0c6e75ceab1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552d91c437aa343aed3f0b8d5393f1df5
SHA1557bb641b799f27c98356007516f939c4e5361d6
SHA256309c7b185d37d72989ffbd3fd3fd1a73d5b8858f5d4ee0f3458031ab6e649d08
SHA512428d70b869023e21d055c8565ec16f839c2d6fe299b7fc1d4261baa246c26a84997354660c2f1cd4a45ac2fa5db9cd627eb738dd559254585ad39932bbab864e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0927ae392b2df1881d5ef5f952566d7
SHA1f9478ee216b9163d91fe056d6bfecea88b2ec03d
SHA256a4de7258a8070d6b91f7d652eee1b288c016ef802377f94a3762b0996db86332
SHA51201d6aff99b3c0e8ceb7e1dcc42321687602789c6a38157e52f2acd4a50293904605dd49f9a9cb0ca919352af587e931dcafe58f037bf275426ec19d7879a71b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558cd5b863d8a1a84ff0b00d3afd44a3d
SHA187c236d8d4d45a16b4561ea604b07069d85aeac2
SHA256b4a156816a370ca2687cc9093039b6b6654739ee8e30506b9a1a4cf218179c9b
SHA51258ea2336d7c924560a6e12ab9f3ac95494713f91de5d798fc062846342f074a42dbfb1414ab051c9f8f9d0400f1c5ebd2396d358ed8fc3e24bd6c3092d3c2fab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ecbd1225c783167de8f13d02ddd2744
SHA1a14c4971f411f002dd1e80561aa416a8364b689b
SHA25635e15dcb8e4202faa8bb24d8b82d665284cbdd730fd3d3b2ef1bfbe98fefa765
SHA512690320a8556eb5086a0c8ec8c4c8ebf1a8d629ca3985e96e1abc1dd372369c55a1cbdf72618384ea5838474739c4eddbabd444bd5f882bfcaa351af4d5c8d7d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56233998827c812129b812d207c6fae92
SHA1fc158a53d7bc037aa9e02d5f8593a9ca988cf931
SHA256ef16c895d5a06bbfcf0cf885a346a7453d258848af058149b7cb3de6040bbe45
SHA51265fdbda58c18aca0739f90ef142cb5e2adc20d92e487fa217e8a9530fd07936fe9f4b323a2d84c663eec087bc27d2824c361db7cb9dda24fcba737eb58ee6838
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554571445459e5a7fc65dc7036337a0d8
SHA12af68179049bac1ee7272ceaf7396ac08971db9b
SHA2564720dc2fc5abbc98c32ffa1ea824b4b21a0561280cdf78cffb5f9f6223e4c02c
SHA51236dbae8a573e0a9cf9d56cddbc829885925d1e912fa047e6005cee5daab6d726395177aeee9fd6203b65c2d85df778135b0eafcb96b3c7327b19dc93bc15aa0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d7d980049db52880bdf3472d278370d
SHA19ce29adff31bb40b6ea4bab8bd021e81a0b648f7
SHA2561c458a204954ecfdfff8483b12c4d034303cfc334d697f35d849fd00dd66f22b
SHA51253f2956e18cbfe47f675dff742f8a27f6e507ef947ef7c573356251c938f437a993ca62425121296a899343bfeec77bd393e4112655c9b69a9c3f71a849fb396
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9f355599e1772aa1fed2d1c37ef8721
SHA161fdba90b0474f6534b5f5859f93875d8dd8faff
SHA2569931fbe6a1a23ea6b6ba295eded8e4f5b514ff13d79e94fb766a96068c7d5f5a
SHA5126d380497e552b5389eff43e1aa5ccd254fa54fc92196f2a84b29e4c1c3891288436d530a217f8d81aecd58447f8223c5fc93ceda5154d48725c910bcb04dfad1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5140335eb1f3cc1960819926b7e7fe2f3
SHA14ab158bf174c7abf59fe0356959dc4d085b61b3d
SHA256ad7370b5d35116e2714d1a545349e253929d3278ff239ca7634848f6cbefe1bd
SHA512ad302ca720e8916085b184ce694ad94b9ae5c4588dc29cd4ece678a00d4e0c8cc75bdc8593e7767d88a7c90cc55dad0b270c6389e48ead234ea759edb96b61aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e82c3992578bd9377238262d082f21bb
SHA12621d9ed1d5c1f777aff59e69618dde3e9b944cf
SHA2565f502438b97fa8cb2525c7ac92349b17dae6c20dea51f78fb974d0c9ff413ae9
SHA51209dbae266a077f8de79c5bf7a3474cc10740240ddef2e1fe16257be440f68136ef4bbb7f0859b61e875157e9e15546558b44b9eefda50db90f2dec07fb536564
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593308372ed51d3a6df2b5a600730dfe0
SHA1026cb7c6c97b880eedde8baad27765e3b450a86e
SHA256469e91aa6cb72c914e730556a0fc6841fb8f3a5319a446611baa60eafd068a9d
SHA5120a8230c27f5f3574f8f86126cdb06cf666e729df877c9e5bf0d1fd0d5ffdea5eab598b14dd4994c5a4e99cf6a9ee54bd4293ee7e50c0e6352310a8451db022e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f4d47106b053dd3acc14f84e6605425
SHA1a47e60a2a044d05196c4fee110009da2efb7fce8
SHA256e3232883b18be4ef856e2730d57db92f82bc88f6203e179d5480fc1233747df5
SHA512db4362e11fe930cce3288175c76fb5d970c903367cc441d80f00117e39825fc7d45c6aa7d119c3ae72f7b608b0f3a4ea0ac8f77e3908404bbe0e4cb46e4710d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb28baf62e950d5ddf91ac0f3f24790b
SHA1430cca48522d465547477482c6b9042e951cd2d2
SHA2569af2eb30995f2b78fc8a7bf26953ba9c49b826d21dcd959877cdc78c9e45195f
SHA5121f6cea2c0be70f3a0788d7a9ef5b08eb5ae833acc7008068dcf5b171de1e2144bd0690465aa8eedbbedb2c5ccc53998d3d4bfc382b89c4dc2a1ed3c37131fb7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee8b0cdea26cca074d5dcf69a07803b3
SHA189d823dbc5c5359d49bccc7ebc664fd4d98d688a
SHA256d368c0e06924273b5ab8a87d14d2860d2ae18ce39d4bdf1dd2a6456c919da957
SHA51233138a628a4c9e98c599b2105082fc6ac7aae1683acca8cd66012ec4daefe7208be3223d53d6663e0aa35832ceda27ddb340d2cedc746ca885d8731d3477d5d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58069d0570dc4fab703cff5d9fb1f0a27
SHA1ec28d0709691ca081a8ec225480a70bb6d36a8b5
SHA25681800b93b41a7dc1fac3a9fe6517d7a6664008219c4996d26304769d7d23bb22
SHA512546207f36da52636f96489497ff0349416f5c5b688e09fa012f438e748be7fb5a14e85b800243a18465c7790e85f15d2d534c12cce914924ee91c9bc766b7045
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b