Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 07:50
Static task
static1
Behavioral task
behavioral1
Sample
a1bb35de1fea560e78fa2289a747b1a0_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a1bb35de1fea560e78fa2289a747b1a0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a1bb35de1fea560e78fa2289a747b1a0_JaffaCakes118.html
-
Size
3KB
-
MD5
a1bb35de1fea560e78fa2289a747b1a0
-
SHA1
dfbdaf2d00d53eb30a0e1d7ea1aae50f23bf3974
-
SHA256
14a6d7fe21a2899aea936d71e54a0dac9e0f6985d27d29a7442be6205e48ef14
-
SHA512
030f92d6a9a50fe317ef4571e4b55f9c47495d988e90abe271d4cc74dac8d365ea1e441bcbdabadd0713faed0742e9c3b90a1ad17b03e6bf605f66a7b0755d73
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430042874" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{51A84E71-5C6D-11EF-B913-D2C9064578DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0ed46147af0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000000fad6e46799417ffc627d39fa2c39a2edac0f63ef76eb3d43aa74fb21e382fd7000000000e80000000020000200000005d7da5693c15ae5e0c587adee9bfceda57529701fd6f9935a610a4297ea4805e200000001f2455250b446a2829fa5056b556188880db542b74c90971e0e2a2d92f6b6bbc40000000c03056a1abaa6fe67602aa85a67cbb1321fa5e831249d2f4b909c1ffea39f2f56e16075128380f6a3f3cc04b8511a250f8d9be232695a1582840723e8d102e7d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2516 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2516 iexplore.exe 2516 iexplore.exe 1920 IEXPLORE.EXE 1920 IEXPLORE.EXE 1920 IEXPLORE.EXE 1920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2516 wrote to memory of 1920 2516 iexplore.exe 30 PID 2516 wrote to memory of 1920 2516 iexplore.exe 30 PID 2516 wrote to memory of 1920 2516 iexplore.exe 30 PID 2516 wrote to memory of 1920 2516 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a1bb35de1fea560e78fa2289a747b1a0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2516 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548ee653b682ce63b305315469326b075
SHA15a3edf9fe7e3f2986a9ab79575580d74c9ae7228
SHA256d052596bfc575d9b68d70c0193544da899a3cedf3eda2f7609ff0f50fb49968e
SHA51268c0a14c5581eb522d28ee7ee5170e2dff243157c2be13faaaa624698c6cf7331e896553dacb6e68998a05ec2631008be64e9ba5290af219d9969153e4ccf131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a15ba63d5502c1847ffe90e3e09a9d6c
SHA117f9c5ba36088bdec6d800fa747caeaaf0814e05
SHA256d01f7579682bc33d5403d2338d5d8b0caba47bf66bce61749181605fbbfb8009
SHA512bc32240819e6baa9bcbdd7e352d03cacd7c44c0b7b76c8ab3b850ef0474c2fb8a901bf2d0d49c914501fd871cf1ce9c201b467dde2bf02355666591b611c877f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504b68833841d55ff20884083d82069bd
SHA1d20a608cbe91896af19cc4832a18ec3e77976878
SHA2569fcafbce6d946e79d42631eacc0278e95caae3023148527d6392f33a439a27a1
SHA51273d3f73ee49026282d77bf9b3d6840ece2f67df99e29e842df973b7c7622e429e622338369b998e6eb2f9c8db9ff973b6b2498fd45a99f939514c72151504ff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4a3f3af42e76763c4783af63ba57125
SHA1077f52832b2b105f3569802e2284c7cd7f9cc285
SHA256c227b9cbb2e01722f9e8c13841c796aa7762c2186dfa722392fe7d4e714dbf27
SHA5122b56a27d49361415df2ad340863eaaf73bd0521a7fd487231a9941747bd221e5f7311c0d746b8eb87ccd9cea230df571fb795e0c26cf845a0ccdecfccd14a3fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfbed4e24cda079f8df8bfe751b82bf0
SHA1af02302f05e40bad393bc7c86e3861f35aaa2d22
SHA25654fe0c66ef3fe167150cdeef9baba1f8954789c193eacaeee4b8e003e1084785
SHA512298b31ebf9efca4d19f7786ad842220001b792e6023b098cc134b7bc7f76c054f0637c2fb5b5435b4028f0eb8aae23c9fd42d06ff0909a8913d66532cd84a880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee68c3423aa9992f71359bbf4067acd1
SHA162db4b630a639cde66a9a0542d5be11ba4cffe9f
SHA256db190088ae0b5f4b4e39c724fcc924be2d388dcfb57ef6eae86aec5d85db4635
SHA512208b83986b7498e810c1d33c1c5a36ffd997c8e47586d3117706275bcda2af31f4acd139b48a853b5f554564eeab519409c67910806b85032e9f1e2e63db2ddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3ea263a06427acdbb3a97e46ec59acd
SHA18ad53a6b0d574a369ad5b308fb17e5811cf8dcb5
SHA256e48974b94eb1c58ec42aa23b6cce6c2207744b2ed1a7b2e8bca597fabbd8ca3b
SHA5122e3b58cf67986f42d9d01bc1b68000f9c0a688ec50e6138e93b50d92968a731192f4bb7c80e3eece5d05e33f38a40fab3afec9079c8cc139bcefbab957ddb79d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0170f43faef6d21c947f91526adcef9
SHA14056fa1aacbb96bf4fee9842c5d9e161ef9f1799
SHA256b148b563fe40087da6ebb4d3c6911ec36d61269b0874c8084842c4f5294d762b
SHA5124c64e68f804b4d2cfa9d587c08313a9bda19cd2478c703e6046df5cb8e13fdda935a76ee2f04f07336049d85b347106337b142e615d213e1145ca6d043a75a49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509a393f5584aff1737307b877f908ac7
SHA12967b9a51d30bf4d9b4bd17db077258f998ef229
SHA25657e824bbc0673d05afe56387c94f74f51e925dd94e5594087c2fd3cef98fb21e
SHA5120e1e1f5f4db82e5a293044a83ff8a92cca6aa274e51dfcf6d932ecb1c6b83cb87b8c52dd0933a74ab14f078faf6bf3341edaebb28afc894ee2ab29fbaff238d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc2b07286ebc88d852fc13212357ba4e
SHA1b892f1ebea32e85db5c0278f6a80dae96825c98a
SHA2567520a4164f30fa72d9284e6dd659691a1af5e2e88178562d9e5a905e26f8712d
SHA512d1a45e18b66f6c3577505b5e804893014a16837f15b14281ec8bac944660ed1e04e6a506af3605125805fa3229bd857935aed25283b6d5d654c9a492c5f4c463
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f24da772acccdd49a94196ac9715635
SHA141f0eab45c32afcf40d325ca5c4ea9c4a45cf89c
SHA256c31c4f4d1210be4557635c27968334c48d96ecb45520b344e4d9acba010f03e5
SHA5122dc89075dfc01b56fdb15550eafae0bdbee83bb44bf47358bdf17224fd7ce2e91cd83b8331124ccb04d6b44df3d5e6fb98b084d1bd5e30a428620a1248051191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc61707bb723ad3e45d47483abef48bd
SHA10b9d504764ff308012c47d1023d34653af59d352
SHA2564aef87bf50a94cb4511fc50d2403dd8401268891ebd9d8ab7d40e41204f91440
SHA512ae33c6e98e27db71cda3f03fed3c3b2357e9127b36296dac4e4687a23720d8d6447ec9a3f3120c8def60154032dc0fdb426769bc0b1aa2dee7aa5f9aaa7476b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581ae2e57af663a95277e165de83b2bb1
SHA1153500ea238b8acb99d754d3fcf8ca4a8e2e4d64
SHA256a606bacff8c79367312e26ea752080ac5dad8251b70f1f01a9a379a1306b5334
SHA51282f3d7d4cf73099b387949d51d48f37a914879df2b8857e982328d77d0e08ea720c68a22e1d0c512078b97f0053551ccff5bced5cced55c3e44dbcb886dded61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507857a7ec6fff2d284a65e7790ec3d39
SHA1d670e8bf15905c5f5f1374ed5b5213bb5c46db16
SHA256ea270c668db31f3e9db4911b5a5705c3ded00df6f79e9d1f984ff873d05bb588
SHA512f012a83897c06c0de11e0f0acd25d3748d3198fa4e7ccdd514e17d486d5f92d51a0496a06a6e2b9877e7c807ad6377fa72d1001fefa0f906616abbed95b55a5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b34c25f840ec2331fce5c12da5ed961
SHA12509e71fd25c3a45cfe790813f693397ac82b73f
SHA2564837d0b89cdf3c6795a0e53de08928bbde70a843bbc7d6715d9317641043904b
SHA51229573eab7aa9468e00102ab5133e2c6e6b13a6083724ad36693e0e9efeccf0731d244af4487497f01bfb058a50c96a71c56f55a167f7db68fb4479769c5524b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d40cafea3f0105df51a428d0d4a21920
SHA1852a6da91cf297301608cdddb32bfcaeb5a4d6c9
SHA256bcc13bb17e9b807f1adf8b20d9526bccf644727d4a4454e645bbf1135b150c44
SHA512f5f9e5cecad72ddd81bff064c3445f5b6b0791cc6298af9d06914a802d2c656764658c3962057d02c498a882277c8c043f6a1ecc12e12c4722e5cab9722bd4e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55de24b09f724054ac18097404b010ddd
SHA18ae5b0ac3082ecdd1d76dcce00c917eca95012db
SHA25667f5ed52f6835340ec4da040c66508b52468f395899f9e5a9bc558c61eeaf553
SHA512d1214876cadfebe90219fa133e7fb0cd7c2dc82fe052e4a36cd4ab21644d94854a113a4ddbc23110135e706c9818c39e7ed641bb0b68e47179a907c524e06697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585396a160d105ec38b2274d19d0332a5
SHA198a0694556494b4d688809b73eb3e35ad1ad5b44
SHA25609fc03482ad0411e2b9ff47bec43e96043a9802f7f837f5145fa32f2e42fdca6
SHA5129e63303bb1848c40609c21bb9e4e206d34d61d00cab7532c273407485fc1e39c6df01edaa8d2fedf7cc303ab8a51236784434c25542775571c98d182526eb919
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b6ff45a47c7b0d5377af1fc7878b48e
SHA102b41e313f4e6f49518d41118a634e547584f337
SHA256944faf84121d8733059bd5289593e51736e7191a3062481815e542844313a58d
SHA512005a04f94754b8d5af760906c4b781a5722eb1e2bd95f7bd8ab4f2fc034853a9e6bbecfabb71340f8e3dfdabbf78d24a351a7c59d484e3f5fa1e634b88243b25
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b