Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 17:06
Static task
static1
Behavioral task
behavioral1
Sample
bf0fe8481687a5375ad832ae8279e556_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bf0fe8481687a5375ad832ae8279e556_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bf0fe8481687a5375ad832ae8279e556_JaffaCakes118.html
-
Size
7KB
-
MD5
bf0fe8481687a5375ad832ae8279e556
-
SHA1
a619021e01d085624744c69c839653c1a4d48a5a
-
SHA256
563078965f8cce469813af137db8312f40d5f6d98855c8df89527e2f2b4a0e38
-
SHA512
ba5bf3f8902217bc50d1a8ab6b688decbf121b6474f64687b1011ef73b33d50cd028d6de6d953f0741c9a1e7a83b012d0bd2396791167f822ba54f17f320db08
-
SSDEEP
96:uzVs+ux7wrXLLY1k9o84d12ef7CSTUBzMcEZ7ru7f:csz7wDAYS/3b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2F981FD1-623B-11EF-9BD3-424588269AE0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000b2e287332062d6da9fd9243fd9872f853b289fd3708b36a888f12adbd489887e000000000e8000000002000020000000ef891ccc9958f845bef53abc6b14e75c767f501c011e41fa853a600abfa37062200000009c9d78d9c175168678381711353a1b5c26bd34f5e2b4e66c7f7be7a87acf74f240000000b55bd084363f54c63e900e9d3d5daf9f3053dc8c968653f111366d38aff02a53ca627c56a594e60d0ef908c644aa2a8fb9dfa82086bcfb555549cf101b8c1bc5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c023190648f6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430681048" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE 2552 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2552 3032 iexplore.exe 30 PID 3032 wrote to memory of 2552 3032 iexplore.exe 30 PID 3032 wrote to memory of 2552 3032 iexplore.exe 30 PID 3032 wrote to memory of 2552 3032 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bf0fe8481687a5375ad832ae8279e556_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551ee7d9a023b58ee2230be15de8e1487
SHA10e048ffa97a391cfe72d25617fca9a3c4a66cedb
SHA2565ef9a8962ba8270de55d0ed5329375fa6ed5e57a6ce2eefcc5f45446630752e5
SHA512fd6cca7dac898230adc449d041aa61bf59da6944dd706228ec87811cb5d655070d39f89c0f38d212fd85feba581e7cd7569cbb50531be0de15764adb3faaba26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1ee38945fcfc3ada93233d5c4d013a7
SHA17f766e2d235c6431b2a71608828acfeca0fc5ddf
SHA256f757d5663463f729a6743ca7e62fa441955edef732b5e450ea344b577779741e
SHA512b82d0d960167049527118ef069f1251c9ae7f12b14343418110ca83bdb290a35d91f4a5977107d5964eb3005d5057ec4ddcfdf1cc40f4e7a082dbb4ea9e3ef9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dea81534784f8eb01db12574361dec2
SHA1ccc88673358975a86e3cecc5ab8adf9e9071f03e
SHA25633de16fa8f70b7513f82e1715126d2db77f31d108b3a637d7be91005d22e3590
SHA512942828f61c18203f9fe554192ad02d8ac109efb61fd00d5d79c9ee907ee5d7f0373a4d54789323e69d581799671fecf86aa9f93730594fb945c8cc7f601e0691
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52beeab3453b95f8dd15666a9d56ddf35
SHA13ee3ee9106f02dac5045969af4503d9c5d79ed25
SHA2564848c077b5eb806851eae002dde701814f117565ea926fb4c1f2f49e2fda498d
SHA5126f69a20d3f72a51e73c65aeefb9e8f2214da2ce1ee5463c49b6a1fa01dfc2b4edc522210a37e2e720d51a5c5ad6ac21098134355622bdbe52489ae123081612b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd060b833b432eb891d21fef04225a39
SHA1fcfda33a2cd64c19f89f47c61a5e8d27d172b550
SHA256587408d8b04a7e37c316ca74a13165a23812805fb61a47436687cedd1775dbc1
SHA512ed26f5c3cd035a977caf5b23abbed13817238b7ffc1dbd1cc8efccabaf42c72ff68a36cbaab2a5fdb03d96197feac0afa6ceb0f5dd75bc6987466d83afa7d22b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f95dcb5bdcbec2d6992d97839fd40e30
SHA1c0d202ed51ebb11c40c4a6fd8cc020a308e0afc4
SHA256814b262cc10c7da3614b4d0966ba8cfa159ce5958fb82f827d568e4762f19641
SHA5122b0a799b609e1139aa1a518b237cd783bb748770c08764e6c57974464dcec363046a208ed7de76a26c60bc014bcdb6d14101d3dfb8bab49971e5bc6814086fa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e41b85b98cef9c53146715649827871c
SHA1f3ec410336bdf2d3d206e0cfa64e6165b561f663
SHA2567febb59a2f86f3e162f21384c35b6571da2cab1d0e26adfac0fc298d224a14a3
SHA51266487e715f69114aaca9171b1787f426d1038632323f3b02055e93527ef1f72f837bbad0fd9eb584966566f2fae15285745243ea6dd68d93ec62fda51c13ede7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f81252a87fe9b727fd4e6a56f031c8ca
SHA1f57fa656ed0704e2fd9d9c73fe05dc3006cda3e6
SHA256e44e8cb7c2b5870d6e07bad7363779edc48c4ff255dbc98dbac0112d20eb50cb
SHA512489e38b13e6f8332fb4ebe82d0188b2587b96b49360844c2afc261aac4a60bfe40d749750c17b89cf1f2650d118ade0af1f845a80b3dd6ebf1a1276614c6e58f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de2fc7a22ab37024158f06ebda4c3d7e
SHA1abaf0481d20ebba078ae2bf5261d665e44157ec7
SHA256767b1f789d558b1cb29d690d5ff78673e6e16c9f2eb594149c86c399ea779ac3
SHA512cab34574c0bab589209e1c0e1d02520041d3b8131ac7fbdb3b972f475c5a986c6e5c9b1c726054e7012b77631ac9a5adac681e0f8bb6f8ecc1f6e1a90429141b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8473873d507cf9f0e7f3f2c5dfc4f11
SHA1d525fb57f6f2efc502dcfb9a8bbd4d235f08b181
SHA2565c0611080c42ada3042b245c4808e62388df6c0e971e57a6ca65a4c072134752
SHA5124ea5831726c483142a0deaf0c28f82891a5ffb7fe7112fbd28a5971b12d50b3f0768120757161e5be9414cc08803dc25d6951c9001aaea64d7272814f3c00e59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f908af34c2e730cfb163f7821296bcc1
SHA1d00b0982831566c8512fb66959ba1c285d815bac
SHA2561f301bc37be140a40b272ff3c36a99451106e5153c8da51eb5e278fc5c00f37f
SHA512264f230d45c1087b9181fa9e52a6069d9814ac3428698268e39ccdad39cc8f44b593aea85c58bae61959cf95b491e9643e25a1f3b2cfe795270b29440c8efaf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d9109f4896f945ffef2f3c4db71f862
SHA198acfcb1f91b70f3d8d81e7f9c14d011b6e9aaf4
SHA2567a6ea43a32692e2b15fe1983ebbf682d2cacf0503c17f7b96774b2d151177b31
SHA51237becf5d33572128058303946d90a6485ad237c700bac1bd18ffd96864d601e40e054933484920024360fe310a952ce670643b4ebdc3db18cb9d741488350939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e997f2e790db72e10223f04d30f7319d
SHA1cd504cb43441f9ca4e9b5ed44fffbb9a21e9f189
SHA256b89343a4561d34cac8358eb8d1bb9b5f6ffdb1b59a7199309de67366799e9025
SHA5122f3964cf4b2437c680d9a6298936dcb87bbcff5b81cda852d1814df684454ad88db0ac7877df173018f2bb050fd8ba9fdd142aa73dc08fe94b3a01ab4f7dd693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a86959c03b3f1bf05a3052414e36ef02
SHA1660cb1f82f0d3c359b8a7642bef2350b1f972ecc
SHA25610a13559bf94b2e61797791cb79b0da60298c19ddb5d26c5c932b90f96c73466
SHA5120e16347be725c5e0a76d237fbf83eb143a5b637c4158354be809b7df4cec85b4a868f8f7ff6b2273ad3ad9255dcd2bad27779cb210c3964c47b4b0a916869c1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572465fa23eb8f2e722320df6ef0cd311
SHA1e1b8950e37bc16fb2112827fba472dd53a420b83
SHA2568d264afdd343c956184d25961cf107109837f80e4e4424245fb1b41f76d41f4d
SHA512d072de8359fbe85afa7545ddceb44c7a4e7d162a04a844ec79716c9756d288eb8398515a1879df55929195d71823db695b73c244260e91c86e9018a023669ced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa30238b5ff289565b41b8e749732641
SHA1084bbd70a11f9c201a570f0f54b9055ef7d432c0
SHA256cc2af7646d066b76ae5b980f323673ae9a596a973db22c58701fc802dbb5deaf
SHA512e9741ca01aafad42f16fc206f98c122c4e87068c7361bd7302393d159451ed145671b21afc1e772118162c6a7c4ea7797c558dc83801a52a3a1f82a29ec9f290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5431cb26c9df177fdaeddd97d0aa2a782
SHA1781599373b03eccf16e0dff5b2532a4fc8473ac4
SHA25690c0d0ea84fbe34604e76e1564e529941beec316b74d1aacba0a10bcb395acf6
SHA512b6987f574f074aea84519a7d4d9420515a0f7b4de36b527ddcfb40edf5ca02397f9a56e11b2489026ba152fd77fabf1a854396a602ac49d974a80023ff0128be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563fdbf94aab9ad0003e47e7b593fdb99
SHA1ba91c755dfb52d0da0a602962d5a72c048d36540
SHA25616f0269bd3c63243fb881b7b6669d678a04766ce32102ad24b302d8928aafa58
SHA5121ac734c3e92f859b45dbba0a017431b6e89e2e07d3794aed205364d4ae051298b980e61612a71e771bd2c54fc14a08b3ddc6051dd6587a6e5d8f33daf8b5aa89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587be103ee09341130237e76ab4d4785e
SHA16391926370bb4b0cd16a326290ac4966cd979784
SHA25662fb73a9ca5c226011388643456b8fa68d066d57a929df777af9b0617cb9358b
SHA512cb8ef8c23bce5f33284de2d94444b8a4e688389237dbd788b3a7bdf3d5750727b0d5b271291a968ee7bcff167df5d492df7bf69a33f5c1ea4336fc50cba71592
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b