Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 00:20
Static task
static1
Behavioral task
behavioral1
Sample
bfbcbf24c0f4b5577494f2b387d68e28_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bfbcbf24c0f4b5577494f2b387d68e28_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bfbcbf24c0f4b5577494f2b387d68e28_JaffaCakes118.html
-
Size
139KB
-
MD5
bfbcbf24c0f4b5577494f2b387d68e28
-
SHA1
0301f59e6b8b176f7a469593704217f0c7ffb565
-
SHA256
1930d042b4264057505ae369a70d7d275e6ad422da7b8e0377f15da0e1f72aa0
-
SHA512
ef7b6f53b3dc9b898826f904a43c4e129fca493bf93c8bd16ab96d385a1f761616d289c165956bfac8194a7238c7a82578d82c04409a6179543e278107324e4e
-
SSDEEP
1536:SzBAGw3Clm2LlyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:Sz+3h2LlyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 809b36c484f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000004440bb4451fc62c9a752d66018c1d016c6c0b3c16f328832692ff66a888e61b000000000e8000000002000020000000ee68b829d8a6e58d706dc83cbddc89b52d0feb4ba531288850573922d0639f4b20000000a50ffda42b8c834c4f4be9bcf25ba196d3ad872dbd47bf55fa142a02650061334000000043a14d2a00d42d72051e48d283a83e44c850769bb9e2001bf65ff5bad27444fb4df9e53c3fa57821d7b38543995f78b0261c624669c9c634145b47272381e39f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430707129" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E7E8BA91-6277-11EF-B44F-526249468C57} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2724 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2724 2280 iexplore.exe 30 PID 2280 wrote to memory of 2724 2280 iexplore.exe 30 PID 2280 wrote to memory of 2724 2280 iexplore.exe 30 PID 2280 wrote to memory of 2724 2280 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bfbcbf24c0f4b5577494f2b387d68e28_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564cb51168a447c222d2660c85e1ad476
SHA1d395d4c00a9c1dae98aa12cc7970ad113a69cbb3
SHA25628d3f1ba659e83e26050e872a2077caf373860e2e7f4c66b039768b2425c8fff
SHA5122b5643d10fedec6e279f3df4d53b3c30b4092572df7a52de776b808dbc17152b2d871c9e013605505893b0d3456879dce56b78260341ef1f9faf6284c4e13e8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fd77fbecac459f4458be76ec95f3e24
SHA1bbcd9dfae29b17029c633a01a48a08131031c2b7
SHA256d562e9c7b02db1f98a067b4cb1af4a5302aba2d8553b60a268adf022b4d2d429
SHA5126b4fb7f96ff7baee3ddd3e571a17e80b1ecaadf63e3e021ca77feee4df63455909f3580e3dc1ae99d33ac7612a950de43aebd232e8c146fe26a42862fc4cef88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cfb797511af74ebd177bfc92bf79521
SHA1732063c6fbef93e76a4a897844589308ee9a2015
SHA256a8d884a4532a3bf0bd696e85099a691532289e6d7dde2327be25cc7e5998073d
SHA51286525d3e0b201aeaeed0ec28d9406b3141fdd8038e3f906b697afafe2bd22181d91df41512f5da0a3e8df616122d68ff1b45f9cf24fc53412e4650ede19bfd46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591b46c6ebb39928a87c96cafa0bc5924
SHA1d2f4c1f2374ca59eed2029f2cbc9c4f009eb8f35
SHA25611a7c4810b4beb9f6364bfa6328e4dea6ddacd69ec3dd845377276333f7f311c
SHA512897ee83c2082844ca50202385216f4c36c39a46a261fa10d76e61906ad86ad8cd0598b2834bb764e06c350731c5aed32f36f07f49b4f40800bf7e2dae0658d9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5608759a9ced31a3279197c920554506e
SHA19d98c8410816077188cb9fe1f57444018dde0fb5
SHA256708e846793cfa7fd2e883cb22e70a419415e210fb2d27454acd26b8d7f14d382
SHA5121ad4c030b41d57fc217297b1f2bd0381c7eeb02af26a5a970c52d57423eafbbcd9c2e24f34a46d4e4ca62b07476ccfcce1b137181cfc5ace8a789a066d095375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f44caa8e28cd8102b37d4a9e671661a0
SHA1e740146a95027a085fcd48b1992ff78963b2f662
SHA25689298ffc068641f03de33aa61b7e6023678b07bd7ff55ed2139478a99404e935
SHA51215349a63ec681619b4afff2506069a614e29e98be9bd2fb3150747f79ba22632ea924fb99213f39742921f5c0e316bdb2bce6115cc0a2a9041d742294c3fd8fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c264d75874a3deb79b23fd19b344c018
SHA187b9edd02a537eb0d0e782f364e966cdde47b247
SHA2566df3cd566ff242b5dde3fbf2e16d38d94582990c8700126eee345cf47fe20379
SHA512c76759a0eef8264e70ded837fbaa72e093e44a67a585b7662b1e240d6780be55032f1508742824e8081ed96bd08ec339d9f8178125908746bfa42d4e944e4b74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a24cb77318d7dff8ae7cd3216e796f06
SHA1ff8c0641fe1c09c507c60b23244f220abe486ef3
SHA2561c74a75d4da7c84956992281be24a9c9dbe4a847d0a26f48ccae7ffef7e4b2d7
SHA512bcda9aa21ee0c7133bee3ce62b4562c24370f5bc55db4451df6ee94f352cff9815a8df3bae3ab8734bd7d7b7c418e26788ee5d653893f92099c527a70794e962
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559864a316b2e7f4e5b6b33bc7190abf1
SHA1116708226f43bcfe86870a4613e8cf7a50fda718
SHA256072e82f05b37d482ccbc75dfce500561c23dd75a2f5b0650c8769545b086b07d
SHA51236c626643d7298f1cc525da08c29c831054a0804bb93690661e229c3973bf5b795587a24b6d0717394861c0c9793dddd1d72977c32c3a0d65e764cd3aff606f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feeab96a924f128dd03a45609ad240ab
SHA1a9afde12f7abc19b8003d3e973c34d41098ffd27
SHA25664fcb6aec897e6c89e983d99a9fe62c0a0345839bf77e5958fb37f4f457e188f
SHA512b59c5b14d1b7b6477e5a6a69aed5327ecc17134241c604df8243529f1a55184c1bf21809be7733283cb071eacdc8d9e69a7fdd042c36bf24297e95c628b14186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4c913c5d9635219a89d17bccc4bfb71
SHA1547184697a5befbe8551b73965800e64a9571b31
SHA256f78f035021983cb39c78b52570fb17a8a9625b3659f7144a4a13ef2fbd13302d
SHA512f35e4f677419660dcaa1a8f2f67503ab49936dac523b1265a4a3200bf9be205eb9e6a900058924ca3fe530384c1f78917544fafa782e37235811fc36bc0c694c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547635e1c27a9973f01ca9d975c8ea04b
SHA10968d964a0d2a6787cda20976b924bea81740f2d
SHA2562865fe70cc5746a919c170eb81698bb8bbd5d678b81404e6a753dd0018c3ac87
SHA512bb10dd579c49dfdaa8e48923f9309282a248ed75f4f0ae8d89f8044b552ee4dd3a10fa779b0728bbe99599295efbcc7a28dadeaea745d6448b55238326557b15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522f7f5945c67546f438ee232c930dc09
SHA1305b08b5ca5dedad99aaf1e2fa9b482cbb7f00f4
SHA256b717649313ab64e1be057b226572606b3353e2dcabac454137ae5bc5d4862858
SHA512138c1614e010692e8c6ecdc90b5b462acaab954eb418a5a0e8c9dbcf6727949edcf21346a9ca8f3a2b3b3a29646f5d8260900ee1eefa5f96e0b28fd41a406014
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eef419e48d4f47279411b0b670ef20e7
SHA188577e23e4b27194ae93ea035d2493972db35d05
SHA256ecd120526310899fd1d6e6840d7db3a98c5a7fb194145d5be0e60408651f7436
SHA5127363ae3694933d8a4b98a7136fe0d816aef1e32030de3174c54edb8579a59522cd74a606135638276c3c8e7426d1df807ccbae8e6626f67ce0c7759d34d9ec04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a951590fb97a1f7cc4058f0ce87baa37
SHA17a298c2651d8c138309cdae72c65d530f3ed35e5
SHA256836be4e1f7e7e08ec94abfa123b4acf247d8dc795fd12cf30a769820ab5e03bd
SHA512c7bd8b896459f8ca08fdc70b1f2ea72cb5880107469264f86ca40568cc893db3555d477f35a8ba6e5422b9ad1c6782a0552e5c6c72ccb66363abb9140dc86b26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9f08efe74fcf63be1d0314f28f5a0fe
SHA1d77875f97ef1721b8f216ede4f9806220d5396b0
SHA256139ba404853286277e265d51be1ca4916bdea85472c3ca5a3d49dd2ab6fefef5
SHA512806fc1181c84c0595670f58727a73f9cffd5ec9df0efc2db18f3f7f346ebfc960d4ebfc47f4a53fcc2d4ea484f10e29e3d30f7a513cea832d2d6e7a646db9ebf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b