Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 18:56
Static task
static1
Behavioral task
behavioral1
Sample
bf3591861f3ff1e4753dfb0a056112bc_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bf3591861f3ff1e4753dfb0a056112bc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bf3591861f3ff1e4753dfb0a056112bc_JaffaCakes118.html
-
Size
8KB
-
MD5
bf3591861f3ff1e4753dfb0a056112bc
-
SHA1
cc6bc7914c48e49be271ff68c49c88c0a2927614
-
SHA256
01e0b9a7735c17cc6901d7252dcfb875e2eee8823319832f26980d69ab5de829
-
SHA512
26f55682c75d0493652e6abee0f9eeaf2f60d9c8a2c7cb64735cf5fdf4e31a7a5868bb902d9e77ab11db08711453e8076b95998dd9e6e08b09677b5734a6b594
-
SSDEEP
192:AUQzY7DVp//ucmW2ms43cq71+OfARxa7dnxbYVi/:A81B/L3pXofkBYVe
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430687667" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000e6967ddb5847fdca653ca0c3b56030d0af2c2a07579f558d19da4065d5dda50f000000000e8000000002000020000000b62c6454f1d1c5445aec968709681d962a5ea6e91de418d48e7a417b45243efc2000000066b2f8c2275f3913c85e7d81269504e6c2a705782241fff017996e7659a8c84240000000540ac7e8f646738822b18fa9ef61d08302b3926f25663a1b89a72471630f4d7ac626cbd9c1cdd544c52e76a3bceb20ad68a1ee187356a7fa810a0c81f994a410 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{96F75BF1-624A-11EF-A74E-76B5B9884319} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8005dd6d57f6da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 708 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 708 iexplore.exe 708 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 708 wrote to memory of 2832 708 iexplore.exe 29 PID 708 wrote to memory of 2832 708 iexplore.exe 29 PID 708 wrote to memory of 2832 708 iexplore.exe 29 PID 708 wrote to memory of 2832 708 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bf3591861f3ff1e4753dfb0a056112bc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:708 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd0e51f6fcdac86bbcd20d916867c648
SHA1e791c93c894ccb3253c45a8da4988acf5edec695
SHA2560b35b87c5f513f95978b947ca295a2c56566b721b3487992cf7eeb47f2238a9a
SHA512b6c9502ec55150781dd4a63fa0d4e931cef4855a7ff139aa04afdf77400543a61f641ce48ddf9477af8b1c7b70b3140acffd34b7107fb48b69d549f6f0999f16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506d0beb465bf6e53786faf40055c1ad9
SHA12a0ff201548556b32837c5282b5ed3448080172a
SHA256e840c643ef06424913649ea62b2bc0a3ec1cc12775dce8682c02e0bab1268abc
SHA512131e10804a7430c28aa2746d8e77cd9a1a37eb4493c820740997a4198a5adff994245e21abb2741f67e31675faa6d1402f75fc5ac7670dc0a4ec8bd125853090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5cf61495d40e5232df6f2b873193ed5
SHA167a56449ea0ee4e5981acb7d825c93fa9bacae05
SHA2566337d915e9b93dfe5d60c91fbb0a5e611f9238d038a6e567cce556cf19a3d32a
SHA5124fb5f37bfda57557df349341354d00f72d3a90d6d585e1fc322638f551698a104bf88c2447f89837f667bc435c8ce70c95adcfcb31ad0d5f770c82f9b57e9049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54abe2ddca81de1754c0d9ebd6f3001e2
SHA1cb0c15d7b3249f17e24b483fba38ae710e5b6d9b
SHA2568659931bb2808b11ff771d0a42ad0d1820df2f7ac09e22e2d341e21710239cde
SHA512eecbed47c1cd281b88d96835065872c681c1f0baa530679ffca60360191ebe90aed1598d2599f3b2795201fc2eace4db9ed670ea474d43090680478807273bcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ba82c58ed858e5ce32b01269daa0694
SHA1dcb671c9c969dcba9a07deffaeded189a8d94fe8
SHA2561961a1b2b70e799291b66dea86dec51a1125984e30d92632087ea4efae46cd66
SHA5124091ea203fd7159bad0853ef14c922f893133f3edae64b0ae017b3b1cb7f6774721af49a4dcd43984dccb1dc363dbefc85a79abd0fea053dba17897ed3d00f7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544578bd29df913285143dfd02f1bc17d
SHA196366436a85fc1a3e46f861c785627385f902db0
SHA25662a3e4fc76ed3adf1c043f9399bf715206f0fc4dc9d37c71244aa1f37d4f3eb0
SHA51211b6986b426e6d25cb8122529a1a18a1041494367594725f18cefd9c7eb247fdc381549bec339f4e4d6780fa4915f358dbac634efabcde0c607ae3a5d655e3a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa9b9ad9e078bcac639bbc3fd41bd70f
SHA1317e84cfb547a8aa761b427a23a9590e525de7a7
SHA256cf11bf16cba5d81d0f6e8cd895a199272766f29eb1c61b3c7c3a09de31a73b45
SHA5122af40f72bd200a01e8d72a661b4181aa074e05b1953dc138ae80b245f3997f2917b5cdbc2b0b2b97a3640728f4d881d54d8efeb2c44513a3b3a81e78756a447e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50720bb711115b194efd2415163510e1a
SHA10fd84ee26ec9e34339821d1aabaa7deb0ebfd6ab
SHA2560672808a0a15f808244d7d357cc205aa8eeb0a4a8add1ad29d9328cb08ca2fa0
SHA512b2060926d4c6332d321d98ce24d750791dcb1bb37a7fdb761f133259c003e5189db755cb0090aad881ffff57e499b351d7045867e61184e760cd0a0bb44ca89c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb4ff38047dc8ec4418a84ee4e13b314
SHA1c1ba3057dd4b457018f6e48affdf18dacabf6811
SHA25675368f144a829f9c41d515e234a57e2c174229d2ba90d0888bbdff24ffe47b68
SHA51281c421ea66902d2204004b91462f70a1dcb3d60c020f6b9faa74bbe3b923057a0bfd5d798b68175554b7d4ca8692e8a767b4c25d33e3176239464554c357ee58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54761445df86d38dabbab1c833800e24d
SHA145e508ecee06d9e5291dc347619034325510d312
SHA25698cd418e51d0f3fdafcfb3afc388e321493579f18913452e6ad4d03714438ec9
SHA5123699f138486d3b301df259905e1ef11aa1e69f947482ce2525d3401c5143aff58f81806c1466651b9a89c5ec5099ac5ecfc4278eaf2e14d02ada32b6042c8ab0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d025edb49d93839ecd1abb0032d5fcf
SHA18c288e4cef7c9fa9c90810dfb44ce9fa99aaee69
SHA2565f09ce147d6fbed15e8b06f3f8eb016b0e089bb1761d17d25b5c29a68847370d
SHA512e65998179da16088efa974d83c03100e51b75070f2634f0d6ede225c58c8d686634aec5f602bb645b64dccbc615c5ad4acc6b35a2f5b4ae192f5e264d77caadc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dd780df1569c9fbb89668b6886e5bd5
SHA1b7b682c5aa30d7cbb8f0c6a4afd41f3d4d377626
SHA2565c4ba5599dc5618125cd53679d43ec96e849865fc3cb6681a79c2a31f2e64557
SHA5120f18d7df377c3b4d33e39834c59311a9e3b03d9174febba7c77b3bf95f489fa935eb284a57569e63ec2334a0726f46244b3c4c19f3ab09af3fe03cf59d60f360
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5740a7d20fae59a8279a4e4f18fe3c890
SHA1e656b22bf312138390f177f02ae42c682543c6ce
SHA256e45f23f7479201b1cd774c8fc94d55620daa4b7c04c329d6a0b204dd82cb4cd1
SHA512eb223b2a861a0681e76a6d1b95ff1e19635d7a657a49c96490bd5a1973b105c01712ab0e31a11646bd065bcd75d829e45d3d7ee7eee2287bb2b00dc882aa8029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efe21ebf95e07eb46429e1d3e2d4e459
SHA192164c58888e88da63a163d51f6b904b4004b6ae
SHA256cbccd3867d8c4362d3e2fdcc0357413d673cb8d9cfdb1499495d727d8946e46a
SHA51217391641d4e706774fef38b5ebf9be7e939ff073a452f7dee9c15fc269422f777c0005ddc03b16eb1fc174c80020d5cfe5b5b9b6930130cc00c57bd2471cbf1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508031790a83ba1fcf8598756b00123f9
SHA14ae160193b3605394c91a193d6b9abc0a78ad3ec
SHA256a353ed6234697c8b3ae55a39ed63c9da070616c29f159b21db6c5bff3a229b59
SHA512b4bded7200c19977130d2d46737e4678997fb6ec71476c90e75e8a0704212013644b5f17ccc38b534624ad766da64a83a1c3b0049ba5fd434dfb61c3983ca550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538328689e7a2eb3720c8353c2f311053
SHA1eb48407748271cd6a8ef7359fef8f6b9a160a73b
SHA256fd4f5c97b505e3e7e63006779f72f14e1412909d56a2c8ca32b0d991d5d2b082
SHA512ccb1863edd2517dc053d6431224a916fd8771db61c1c7aa49bb579a60241a999b26c0532c2fb5e4ed5f6447443ba0dbe0599a17b61ac4f0322f1b0c6902ef061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523a5be0d866a07ea066d2ab43398dbe1
SHA10ba2a3ce89fdaa8941cc550ee8695e7d38e123bc
SHA256338d64e8b1cc3af216744d78a8e453da6726f38c78e05a2011cb52bde9c12377
SHA51286e309c26ebf0ce13b974b8ea853c2919c2d9eb89f36c8cd778c852df3f659acdfedbd4603f6a93a4b1f33c1edfc56fdd870d8ad5d4b038850d1329d84f55f8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd53bfbf7c264e4f0dd5a78d8dd33ce4
SHA137525a93347f66d0ce01d192ee070cc4b7bb0190
SHA25607740c6717690d22cb3089d372c40e8911e6bb7f4d0a2ff7a8eccdbb2e9a6c1e
SHA5126c79db4c03fb0334c671e79bf7d01c2d3dea82e46a46ad514b42885498a4949339d9b81b8ca189288c2bf9167d91eeaa886f41940aa2da5ac036560089807b3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e5666684d9d5c34f35c4c112c628b4b
SHA1b8086b970dbe432f7438617159c4cb955bf93d8f
SHA2564aca71996b319f9bada7e8a4765d6e2bedf5a8da7e4734238b3656a45b9d4a04
SHA51224d0b67b8f87069359ba088916b7d25efeeb75790ea613747744466f06c05d749bffc0a9f5d461549dfb9a266d476d1c9e6128df2ac4778859d591c680ca86a2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b