Analysis
-
max time kernel
135s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 21:12
Static task
static1
Behavioral task
behavioral1
Sample
bf6c2fd0a8e356c6341903c79ebc0034_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bf6c2fd0a8e356c6341903c79ebc0034_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bf6c2fd0a8e356c6341903c79ebc0034_JaffaCakes118.html
-
Size
461KB
-
MD5
bf6c2fd0a8e356c6341903c79ebc0034
-
SHA1
f18fd991f67068b061028663f94a2acae4688560
-
SHA256
a499b9097a5164c74a357916252d622ead3f50c8f1e7eb1b29e806e5e6bd61e6
-
SHA512
22ef9376bd23f52d132f9caf0b1caad7e2a99b9f1c9c41669462a60ccf022f7c6e877140b859cb3edea6d7a3a681469dc11adc190b39b11518c41b64aab9b3b5
-
SSDEEP
6144:SxsMYod+X3oI+YpsMYod+X3oI+YBsMYod+X3oI+YLsMYod+X3oI+YQ:I5d+X3b5d+X375d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A3E03861-625D-11EF-8BF0-428107983482} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000063b1c491b35f4effff9ab8447364360de837e352ab10561da4134c516565d2e3000000000e8000000002000020000000a5d9bd66e1c9eb2343cff9b1ac782643eae2cb393fe36c6a65659d6358a590ec20000000adf87da42cc8ac516baaeb87a9f7d91109ccf03cba94423198511e7c41c464a140000000de52b1a4672943905c50557b70f50006be062341125ef87878a73beb5d618fe636e4195167de34f0ab147310d2e1b6068d3d9680c1b571714c920825b1eba19a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b027357e6af6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430695848" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2052 iexplore.exe 2052 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2940 2052 iexplore.exe 30 PID 2052 wrote to memory of 2940 2052 iexplore.exe 30 PID 2052 wrote to memory of 2940 2052 iexplore.exe 30 PID 2052 wrote to memory of 2940 2052 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bf6c2fd0a8e356c6341903c79ebc0034_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2052 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57348b50989ec4060b952b3cebdf5ee33
SHA111463c0ebdc743a574d492e41490c15c562f07e0
SHA2560b91bc2eb4e6316ec93d42a8b90f6c715d96534616890a7c76782f2257876e86
SHA51208ee36e540970666a9adb83d338e34ae596ac67642b26362b4e1b7225bcb2bc01918d53949d0d24dd4807e6bb9e4ebd7a982f1419a3e90f1b3a77b6ae356c5e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf33e0d77cf93f9243888636abed40f0
SHA1c16f7e511a8b80ab882bf897f9e6608a889cc588
SHA2561359e723f77896417fd4b9e9e209f8376a563ef2100b813afb05964d5b44c62b
SHA512d6bace34d13aaa610dd9efb473f47c701183f6d74f97f2625b35dd9986aa61a23f2cdc7837b9a0fbb46e65f684ebb7e5f87bf33b8c970990ec7524bb495b3a0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5805d1670fb5ca5919a55949b4444f75e
SHA1b57e4d9bc8ae9c9e7333a447a76e85ecf304445d
SHA2564358df8683542c6b1c4ab41e99fe6f36df85f6fcb5d0d4393c4bbf6840d20cc3
SHA51225fbf93c1eaf118638e77e910dfdef72a7bbde753004add31af9da0d6206f2b2a09d904657edc0bf719ecdd1a54f7338d9239a554ac30778d3a78adbb5317a5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5f0729c4288013ea426185d8ffa1a56
SHA1456f80be0e29b09bad1d767da5c1b26c20317eee
SHA256238a4acbc3e852864aae516ca1984076cc3070920eeb48107ed501883ecb646a
SHA512e078327cd96aa23a7404e38157c00123e36f82a006cb806dff9c5d118bb9e4454266e040876d0c43a8006f7c163bf64431378be77e2918a4e2be1569e7e2cd3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ead8f772f3f67bf049bdc40e4203af63
SHA1c9c4167f1a31218bf8a62fd10401fe382429e817
SHA256ba2b27cb4c164aa4cbc68fde554c67dd79ce56358d251f75ccffc608b6963962
SHA5120ff387ec2c37cc43ffa68947ef41674a98eca8f2f9839ad1277791d3404a45537c1ba62b3f67dcb88bd6571bb63e0b07c365ae0d720db0eb80fd3e460dae2999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d85b51141982724185f2b2748544689
SHA138aaff41f92f68e2691d974293090ecfdd385122
SHA2564f9955c922f1464880190d19959f7246a3963cddff3667804a92345cc968da81
SHA51294875bc4e740d57f838fbdc83b0bd3cce71d99a7a77134412f5c8bba976e049fe0d2394529c44883f6a3911239aeadcd9ea76975464aa42931ddb96bbd70f7a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521ee40ed80f95c37ec2adffbc1881fce
SHA13c581b6f909139f431aa4682321500e3f7362363
SHA256c0ab69827162f39093e392f56787244b5ee04cc531418b357183eedeb304fa52
SHA512bf801c40dffd65d972de23702ab1f476c4851404a41833541f6dfa9d31bb7df04e23d7129a28cbfa83893acbf9102b347f6273a0d93c2a2b684a1a0868181cea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f34e7faa070333baf2bf826ac8a440b
SHA199c192751075c1f2462ce3bc76908e85d744c02c
SHA25605f8f4bdc25f88de7443a11fcb819158d9086ef17b89c34ea0b00a479e2a6bde
SHA512dbe522aa048de751c3eecaf42dc30c5565ee357621962ae943de2f86bd10785752977734e3048e82487e829468d70e2edd9b71107711ac685b07cbac8169c43f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e48050d43747e7a3792d4db7626bda27
SHA1486d3e70841e38768494e41a48668cd5433f82ff
SHA2569991b6dd51c8e43e9927c65fda75d5774ed4e42c9bfcf1b781a517f565a2a96a
SHA512e3e7e3855436a736c6a824f712ae3f4f1e2b44bf21d3de9df79206e6065c98889e4cd67f1b93c594b8404ac8dfb8b0832cb54f88e9ea6fb92e41e24fddd3b32e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5703c0f6bcc2e20ed9d466a4ff3f79f02
SHA1905f9b0743e34f04f3d783fd3945222586a6e6e3
SHA256cca1e66e7fbfa2cebc9e9a36e6aac587e2f3c0761c304e83cec32daca98454e9
SHA51218e7bd07bf5bb0dc50da187bcee537773082c66c9e9e4a28dde47089bac6fe70abc809fcf7221c6ada3c2afa6f6e4500590fa2738d0fae393e3cb9d0153e0bc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0c43e446f41162d8a793eeb166bef2f
SHA175c838f5244b59b729f86c1d93656fd9c67a3db1
SHA256c078ad401acafb58268ec9bf49ad73b6e10949ed22480bbdb9c459a555fa2772
SHA512f45ba7c933ea061f8fa3a621c5d877eb410af004b3cb2f3191a6a4b2cbd3ac7371df34d154b1b5483135a66a87fa96b5a74989dc3bf9e248b573bd509bd688de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596559c5fabb1698367d4e2fed6af7bc5
SHA158450b2d2658568279f371bc2b2065ff3a9981d7
SHA2560edf9c9b7696a3039dee7386349db7c5ee6bead4854d9c2984c18bd840b3a221
SHA51298ac0b8098b6e073f14655b5b65027282ce91ee07d5990e131dbbf34f612e8e886f20167053acd97c4d3f8d57be394576240eceddb0b8e1683e92dcde0b8efca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599e30bd096ae59b331f1e56fc8bd6914
SHA145e77cd616dacde052eb4f767a935e89b996c976
SHA2561890efaee89b02ad97d9f5d549d67f131e1c7e916e6afdc588b3bc476d06b267
SHA512a0ef0ae5115c39fb3b9cebfd9f6f682e2fab7aa48a5f6b6ea3021f0b03e323a1309a1e72cc068b120234255a5f36c678dff5f369a11f615df56e5334918e5b59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a238193f9260565ad5e035a115008030
SHA16f2b85c8c0d7d21440caeee2a6448366573e9ce9
SHA2568c932d9f1bc75b4030f1d71ae6a34c2b3a68aa62f8be30c97e2cdb2488984d08
SHA5121d32ef83be40e11ae616f75cbf7332a2113eb3578a0deb5d6d28a5d2f5bdf22cf9f258e88db63072a09122437d4c51617f5541f22396f6de8027b911ea45bf6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503beba11b0fc347a71bf94acd29b1457
SHA14d5cb24d3ff14e6ed0a8ad28f571f415d332c93d
SHA25668807d6285191046788757f7ba90b0afcd13faa5330d493159a36fb89950913e
SHA512441a94c8e3c1f0b91ee5676a658ce58f0d80be92061d0bcb3637a5de7efbd316414136c2539a624c4745a793f5d38c103492d25b56cc04bd757c25f307e23bcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1a42cc5b00a3a92e011425dfc5bd8d0
SHA1217a24d01092edd3028e00f7fb21573e10272058
SHA256551ad285b47c13cc233d64853ff44aadb9936436cb7b469ab0841f2be272381c
SHA5128f02af8f4aea8c12459c2ebfc9b5c33ba0d26dafaace9bc75829d122cb0b67345f33fed158838bf4e11cbdc5b6b838364e546d41bce532294f9c64b683ab1fab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570cebb540a1194e2c30cda1c542610c0
SHA1fd41dd5f712415288e7a79f6f508b8f6053ba13e
SHA25686f8ebd6bc06dfd79a0f49e86265bbd9f2a17fc1d436bc9815e9307952ecdf31
SHA51287148e568b0db704dfc5207477f10355adcdbbea6a23f53eaa9718cac29f83bd85dc69e3100aef16b8ddccbea5e5c9e4e2046453aa8216dffa2045f0d57fe4e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57377f495f1d3753983a36e4b4f1cdc01
SHA144cd6b0286e0a7d67e98eaaeecdd27abc9eb9189
SHA256613a1ab85fd96023cf8eb496e0b4918372a523a0ee810990eafb1e7a43804fac
SHA51250785e55ce4b9101bc813104669c3430d8c92ae32b4714c20db03af9312ef20585bce9585d1ce8e44228c6f497cd957f77162aa78f85bd25e374e2b6616e2ab0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bb38ba9b321c906d04101b3d58caad3
SHA1d568ce964188f2a68bdc53c67a10ab48f4275f79
SHA2569a4f3e544c8b31c7979a9b9492c1fb6ee2ffaa20d7a1f0801ac6578712d7bd68
SHA512064e7c8613d354971e2123ccd79ea59a80a1cb5f04ff0687652d4e969e355c97ca36e67294904b12d8d4d661c06dc98f36b62f6d0f6538b6ba623a0f4b311328
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b