Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 18:18
Static task
static1
Behavioral task
behavioral1
Sample
bf30430bff08bac5f8dec46ac6ca502f_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bf30430bff08bac5f8dec46ac6ca502f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bf30430bff08bac5f8dec46ac6ca502f_JaffaCakes118.html
-
Size
126KB
-
MD5
bf30430bff08bac5f8dec46ac6ca502f
-
SHA1
0f50ee49e35fb69ab42e9ddb53acc5ddc3c69d06
-
SHA256
bf122ba0418eaa432cb9e831285640bcc594a8eda951c3e21f5c66d45ac312c8
-
SHA512
623ada70039bfd23e7edd77685a679834e4d28cf7600be7e2c7ec180b4b3a9771b5285565c2bee56e60ea1f8d1dd1e88417480b4f90baf9e340f6786f466e14f
-
SSDEEP
1536:SG2XDyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGL:SGGDyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{35008A21-6245-11EF-8CEC-EE5017308107} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30ae530d52f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430685358" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000001cc27d754b444c75f1f95bbdaf9c9134341a0d49cb76fd3c96f62a6deecddbca000000000e80000000020000200000004b1e9a729d37987f7dfd301e42beb56a4988f65972458edacb921bdf818abacb20000000d8f337b02c0d4b81188cabf6f1acc59e732b5f6091cd1fab555931239b77341540000000d71f4eb4610a9fa3ff09731bbbb0553eb612e333d8aec188b92601c0817a764680490c2202ceb49e924e4041fd3ca35a5f959a3630c51b62e1bf0a54945cc0d9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2776 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2776 iexplore.exe 2776 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2812 2776 iexplore.exe 30 PID 2776 wrote to memory of 2812 2776 iexplore.exe 30 PID 2776 wrote to memory of 2812 2776 iexplore.exe 30 PID 2776 wrote to memory of 2812 2776 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bf30430bff08bac5f8dec46ac6ca502f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2776 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD59c76f2692b48c9b0d841416b92a29774
SHA1d88c02642d09d2d3768ed80ff955f962d62f0fe0
SHA25614725d95811ac27866c7cdcdee67f1b6fd453829b45ce2dfcb15f5563e352bfe
SHA512a44555bd0083d447e8eec7d4de8d50a66ca610e6578c9ff4d1dc0b3164c57fe7b4be0842867984381e7ad05bb2539db6d006ed4c66f145627d5da14eee538f74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f41b413b2652cfe433192f659df83eec
SHA13b28ba7929ee713a51cd4b2a6035a59e1cc529f4
SHA256bae82760e93d16ebfafdd775caabf27521507793d92249fafaa326250a18d846
SHA51285bffbcade539d1aff52c409e701c38e442d8d19bad2b631b80cbea773e860e2058a7dd609d52ea0b95791033af988219f62dccc0b5ac5edb22feceae414b37c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fec35ddc7a65a255e41d9225d029772
SHA1835622755316d463bf3900449bb47b7073591187
SHA25617191c3b39447ab30730348ab9a5d00b08ef02a6704b4edc4d8753b3691714e7
SHA51297f5ad2d263d2ce2d3842744bb095ecbbaff4e6873a86b6e731524b2b7ceacb9aa91c0c62ecc24d4ee5dce2edda1fe05fdbe63c531db5b271305d23ac749a7ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59817ecd7183b5e3998604cd073151283
SHA146191f0283b028ea0929f6478e5946371f1b076e
SHA2561d562bbf8e698acd9c5bfc5deafd1483aa95d051858610cab76306699fd502e0
SHA5124b266299546bbe479c1d481334d3bf69c184f3496cbae4ff654e29860ed367aada029ffb6ddacbc1ef5b6e08842bb2d4dda8ac6c35ef686092bd7a4d461d4e0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5877c7201342ff4760cf779fb0b2187f1
SHA1b47fd9a1eedeedf5ff95e695af173cda31844d21
SHA256c779dd1846ec39615a3b752e08285dc54d09c8839fbd1d3f40cbb3855731e5ae
SHA5120d7b46a1b8bd75142824cc50b1d1f14199385b2a68eb1138f6ecbaf9c0dfd6c112d9614bb0994613cd19dbf12ec0b282a90c048889b6173ce70cfa61e13f88d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d76452caeba5a3f93247d80553ff3ff
SHA14b0874b6a59c593e73bfdc669cc7e982d3c0c4b4
SHA25670c1d8486f9e02ebc43f87f00b6d176f34878aa0f4baf86b47a5a1a6b59b8e16
SHA512c7a229103b5dce14b7e682186568580c91c3f1cb4d542bc514e4bc967759a0162b1f46147d0c42f716de5e59c41e486f9a9bef839fe1de417a5c8ce364de56b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a4051a62d4bf73751ed06b976d1578f
SHA10491159df29709026d80f137e1c235995737da7c
SHA2562088fd3f369970dbbf8cc4383c23e3f6748d6beefd34e8707336a2baa8bef3b2
SHA512da4b320c50efc2644d80f39f3bf4e9121b8919e8a431f21eeeebd594a2a1310a87ef70d9d73629d0a66a293a3cea69bc160906160915930da041fb2766d65cf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b6109cc4d617484e9b69001ffb1ec3d
SHA1abc81adbcdb3f668e685c3aa06b8a048ce0fc40b
SHA256be2225bb2d93a46363ca6eed9f222c5ebe599a56a167835501adb17134c0d851
SHA51243ca82d98032791ae2da83ef3b45b180d6d71a0c9e7ae733f3fcb1ad9f6254f4f9c5f459a446a8e72dc37382aa2be3156a7240150c10db5f7182eb81281c2afb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5429218324fa0ecb8b90f19628052aed9
SHA13d43cd4a8016afbbaefae6b6946025e9c55c03f2
SHA256ebb4dff92b9c60643125f944bbaedd2ca0b50ddfd4a8cc79aaa2c6d9e55218b5
SHA512e0b6ac6f94f045c7783b671c074cd718d4cf694675524a110efbc17ecac9861ddcf7c45013b498bfe42b274591d1576e50c37097f7c0662ff644e8c248691efb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD58b5aca4bd127a1c02cce59d63cde98e6
SHA1b6ba857e2ee3b4bef1d7f842688ea9879bb7eacf
SHA256a24c25fd6e701cbfff9d3f40cedf16d3b2651ba8175f5f232bae184dd180a819
SHA5124e13e3a2ec5700254b44b619d8ea82f28c8c04c27e2033f7a1bba37e6a2e67f7dd658387c2f8d3aed7882c0e6de39581b284d713743af03db2b1b0767e44a6e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5fed925b43f0802d51411ff01f3159a59
SHA1fd09a3ccd2fbd0ad31a1bd734269b2122dee32c1
SHA256458df8dc0b9b78fe15a0c7e09d67dd94525b3da4c2fd3c1eeccaa535ce3b4c3b
SHA51241b0cef1e0876028b071a444e2003ea586fb3e125fc6e37f4de3a27ec1c62fc915f4222930ae16dc26218aa19a7744cbbb25e237931be266cfe2b504cc9da7f8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b