Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 17:46
Static task
static1
Behavioral task
behavioral1
Sample
bf23119ee3c862ade0473c5b47fc2e20_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bf23119ee3c862ade0473c5b47fc2e20_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bf23119ee3c862ade0473c5b47fc2e20_JaffaCakes118.html
-
Size
13KB
-
MD5
bf23119ee3c862ade0473c5b47fc2e20
-
SHA1
6654561d06c9f0d72ed8ad5ee5e84d0a3a3d6943
-
SHA256
1b46b44e53ba2ee9e46987a782d453ff4bf548a1204a8f8d998d0acb7e13c836
-
SHA512
ccacbb6e2ee2ef21b25c77f951302cca1bfd2e57474b11ba76761eb18d9edd42f6a862ee89691a5aa2a68a21497411aca36d0fad64c2d222bec4c012ef16c298
-
SSDEEP
384:rjCqmte7vYRtl+ooZDJBoZIY0gDsZgvYHdBTSBQJeBoqLLZgvtmPvTLogvYHG:/Cqmte7vU0RQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DC29E991-6240-11EF-929A-5A77BF4D32F0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000efdadc649cecf2f42b6e543b812ab580efcdaa6da446f9f23888a8502c751ef2000000000e80000000020000200000001c6b839e4e717474a27cfad300cb1472b4f80319245c8c125d9d3f238ce339ab20000000ac650f5e144b8b8a3453d8743d6207b9ce2ffef499de29a149b74aa3cede563f40000000cb8b9fdea9f60a3879707ba1788a2eb24fb1314a6d230b05b227875e0a760e491f37ca1798599ffde9e457609d386b3ad253da4811d1e8faba536f7802315eee iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8099c4b04df6da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430683486" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2848 iexplore.exe 2848 iexplore.exe 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2612 2848 iexplore.exe 30 PID 2848 wrote to memory of 2612 2848 iexplore.exe 30 PID 2848 wrote to memory of 2612 2848 iexplore.exe 30 PID 2848 wrote to memory of 2612 2848 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bf23119ee3c862ade0473c5b47fc2e20_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2848 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD567bb5acc5cb146627fcf6115f8c0a9d4
SHA1da970f2103d1fdaafeade04608c896c2ea1ed499
SHA25631de74c5b40461847f4087e87022a6f5d8ac47f8d35333a790588df2027d6f22
SHA512ac4ec1ecdf85b813326cbbb92b31561d6c1f55f47ad469453d8bd3f7d5004a93bb5053fc6b60395ecbe66cdab112e32ac907005b70c306426640d7f81d8ecc0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD542e026e4f2b52233fd4875c125d8b2e5
SHA1e984c339771f78e46882ebb5934e6e5973ffd5d3
SHA256e55d0ba312f19944e9219bfbcd81522e51d9f879500f37e0ee003285c6929692
SHA512b610343f5321da538fd611a6aba38f05859a23de37b542431da06aaf0b57a0ec091cc57c01b02ccfe107188ffd6808633663c7f1ff5f5dd01added8a0cc2aabb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD528bd8255bb328817a8a191da5830a8fa
SHA11106721e56aeccec46930ce0062a002e870ad07d
SHA256fc4be31543e686ac3f5e5a99cb2daaf763ceb1bbf319c5188c426660cc8be6dd
SHA51243ae806dff5a7ac5028b1622116424ded1d6e0a9ae4951bf35df5b166f4bfb5c21bcf8a4a90d333a9aa77c098a0dfaf81e5c50cdaf2210f8ba4d17be9164a950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50a4b15da9ef6b4d636be8891cc65b008
SHA1dfa4ee0b111b4524fc80f6d8bfc914c9c79b89bf
SHA25615c59bf548757bbe9d231e5fc7bc7bf2d3eb4f99d38b5e00ba80b2f805be48bc
SHA512623d602a09f20c61550bf4ac1a38dd4fcd3f46a35b3372c28962716fe7ff05cf10039e00a55db25f883b53c90ce06702ae47b31799d03b1976b9d728ed0bf34c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD562ce0151188500a7404a0b4b1d6d8b47
SHA13a3cbe558326f7f0ca4a03e8a22fd6aca7192f4f
SHA2561807119f82445f2862969e80a0f8cf133dacec0e83e709014aee6f1be4a2a96c
SHA51269d73329261891b7af157455d453c5568a06998f93a915c6e5df39c768ba8138bd2cc0d9148ef735225bb63b9a94ed88ee490baed44e490306d44341e9b6372c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD500f543ece23bc4e9d1ab99f75cc006d3
SHA10766efd11898b2462388cdc5d70c87d1198d838b
SHA2568cc6483145f70b8bbad74c88b55ff1cdb8eff1dd63b8db5014fbf46e7d4fbf0e
SHA512eb1287806b6934d83d65e6f662dad3c58624433a83f273c2b1c555824def6f29b35513d9258187b37770392ba8f101f8a7818f51a8d1c4daeea3e9e3c4b95466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5609b2180cfb01f0722d040f3b658d002
SHA1aee92288dcca11cc793f412dfbe9cdf317accc75
SHA2567872dd2521a8fea2db64b601b6f9eec2269dedb3030778b69995a3932f0f2606
SHA51211490b778b6849685c8e2f96e88a1a88ab3e4592cae97b04836be8224aed3cf05689098ad1b40559879048fb7a84780da4ca4afe4adc15b473dce65422adf2cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5abefd41fa72b225805272fc564d97c86
SHA1b913fae9d5c1d5c9b8257f8f845a8aa01c646f96
SHA256cef95f8d0d6410e30d6e16d1d4df037aa6e32b873006f2a528d4e021f57641ed
SHA512b359a9b7c43c9d76c04abd18c7fd5c20635e495320bade5b946af0436bdc70ef76f346fdd443b3b2942fb7f18648e33e6994cc6c10ab245af4b8793e9b77dd24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5784233c2639f32b7a5aefc7097510d0b
SHA1b40b7b0812a319718dca9a64020b71632a5004d0
SHA256e0b89ec9bcb4a7afae0f0f8139e0c003b7efa9f31f27c2a3628d6050f0dd1c42
SHA5121193f4d1b87dc54af8abcfb30a49cae79f72fb4f2d0f11ee324c0dbbe104fffb9c87cff3256dc959f6b6cec937e181192c73dd129385110456008d791f738f30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52d6accc713197b2404132352edcd5e9d
SHA155f8b01012c9caa7377fb94c7b636164eca98bbd
SHA256f785630938f6b31094018fae327bbd1afe6ae59c33e3c01d467dac4b478c5f06
SHA5121fb26deb8e316f77bce39cef1695cdb41ca1c01bebda88af1a3997f9ff980bbba3135f7a27656686155b0a522de1cf90012f809dd7146054b09dd26add0b298e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57ba9d987c2f35e6d0087e77d4220c684
SHA1f409cee6d7ea7c790679a2077406a829f747e334
SHA256643ab59b8c85e35be855d39b4f243a222b98e2e8adc38e5aa1917f96421b0a09
SHA5123b8a862812ba6ffba0760f39f635e49b99f074e6089bf12d57b5841f42f63c4d5608cecb33a4027489c248d5592e7ce93f38817cd8c18e1f1ae550a1d3652975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD590c99cfe73981d1dafa68972578d52b3
SHA13cdca1203c40e8f36dfe33a6ebc71d33dcb12524
SHA256dd5f1a24aea2a015db8013286026ee1e9581d425dcc542d09d50f6fbb10432d9
SHA5126af788ad7d9811d57b4e37b0ad8ce51f6a6ca933ef6e7379a51f9ebb1e8335dc1967f1221f295ff06a74e49b07e08c4956871434c1379e2b7a08f90c11e8a0b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58d9bfa1f9596d34f7ab0754babf52907
SHA1b1a8210fb1450b02b7915e925d0741afd972f4d9
SHA25669bf5c1ccfd497d468e42654057d62668f343cd087d572eed7d78d9bee04f41b
SHA512b63122cb77845fa24b5a9f7a12144dc2e4cb33a1853162a0a2b54b49c353f89db62a27df7362384b8769badda761159e64ff0bdeb5ef8d4acabbbd505e7675b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58bfc8552f429226c567095e3a63ddeac
SHA1f2b27020ebf1096d8427c46f26373e81e4bb76ff
SHA256af0fa5d1c7ffdaa528dee51838573b4ec92f1954f794bb381f4492b90fb315da
SHA512effc1781da2788a4986b62f55b5e6a4841b30c72fb262400e72b276317c7d54f4f9b32dbeab758464e12854815910fe6aa0bb8605d12a9e0d340b061208be271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52e665cb7f9afedab147ce9b8f0a97b6b
SHA1f9f6910243054ae86578f86fcb41df45238c7825
SHA25641e3ab7e927350d61c1d110435134a2f1757096f3006f66098e325f9f6bdadb4
SHA5121a0135d0a53e64db6296be25be94162ae483ece096890d058f61a74f1d33d25e6c6b5bab70a167215212d4666aa13d6f55589c796c174df721fa123bff0e65e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f57d24321d9bff07522f201a9175f466
SHA1e930ea4c73c261a5d71379d19f96aba90a50d0b0
SHA2565229d6b47256a37470a9df55e02629ed1bfa6c7ee9e19be75f035671205cd23d
SHA512382b85f8e804a5b9cf3518e8061fd16eb54a527b176c1f96066e26ee9db32cfcc692c22ed27fb70f0460a193e1e18ed34dd063b72703ac83e99a0e2a7591f890
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53d7bab60a5e8ea803ada4d828cd2de88
SHA1a607f79b5e8cbaa1b2e0b8b453c079e01f27a614
SHA2561e178837bb57ddfaec8e07072a3dcf7e6d0549895a7b1058af2355be52594a29
SHA5127152c592d328e956c9a4112f70f5d3d8ac976b92bdc5dd094f28c903bc5f930714197d6ac8fbb4198f56eb748afbed3de5b594fb1664c5185a94299098e1b061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5938e227c268f81c75976e3d94aa9aa05
SHA14e6ca8331eac81705e4619e9b2681025942ce73f
SHA256cc981dd48765d3616775ed4381f1054c9ae08f80059655627d0e6d203d83acc1
SHA51226f01089660d94feaae37df19c1a673e8400b56b9199310a0eb974edef0077da958d925d2d7962910e2bad1324e3c8bccde63e63a99412202088a6ece93c6539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5eedc1dd6a7c274fa37efed5509c490b7
SHA1609260121fc2e643c1a87b1fce83c9cc3c775335
SHA256d8fb71ace55286984f047de906b13801e718ce7ecd454d8d0ec634c11002c2aa
SHA512cfc74b9ed5e134d4522f47cc27acc90a2a2c8f1eb4d95b11b2a99c4b6c3ac12b6e50b521ca77224066ebce87b6e07845697c3f3c4960ec2856942977eb898329
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b