Analysis
-
max time kernel
67s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 07:49
Static task
static1
Behavioral task
behavioral1
Sample
a1ba9ebda307a0e4c217e0f2788883cf_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a1ba9ebda307a0e4c217e0f2788883cf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a1ba9ebda307a0e4c217e0f2788883cf_JaffaCakes118.html
-
Size
3KB
-
MD5
a1ba9ebda307a0e4c217e0f2788883cf
-
SHA1
cd3c046042d8b8699f4ac9f06529ea66fb52cf90
-
SHA256
a40dd83d97705a467d26187821d23db01d30ba278f5631f50d056ee380d28873
-
SHA512
c460b797e4d6ffc907ff986c847f78b13dc03b194af0b15aa4fa7afcbbcd9ee89133175ec235faaa1375233c75d41a65e7e54cc5150d726b4fc4d79058a0f75a
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90ef5f107af0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000f136f5c99c6d3ab1d48e6dc3582a020876cd7659e88caac5ee7801cbf8787ca3000000000e8000000002000020000000c7a9c3cccca71fcd6889961461908a8bf83122e6375c7aab64f8d600259b811620000000df07c8df159e52483af86eebcc0443ab5b9b5df0f4c63ee7b77de982628bde9b40000000718e78047cc93980234c733d58fbfe9ed0a073fc64cba11129702b0a6c9e5be63ca151da1e8c9eb6ecd8b13e360cc59439345156f4e3d0736e3f6cf37696e36d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430042837" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3BA06221-5C6D-11EF-A850-F62146527E3B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1820 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1820 iexplore.exe 1820 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1820 wrote to memory of 3000 1820 iexplore.exe 29 PID 1820 wrote to memory of 3000 1820 iexplore.exe 29 PID 1820 wrote to memory of 3000 1820 iexplore.exe 29 PID 1820 wrote to memory of 3000 1820 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a1ba9ebda307a0e4c217e0f2788883cf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1820 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfbd1ab21e5f278fbf5269d11b71dcf2
SHA1ea6a1df8f6079ca5b704ecc48835e396604b532c
SHA2568040b6eb40284d652270c6c3d5880e2d69c3e3c36dbf308b1fb4ab9577178708
SHA512ef19d20432b155a82b3d8c930631d0e28970f8d1f3603d956f6999299fcf83c6b87327093ef84a4901618e226e9b0b789468fae87a10e934c5c7638036ea138f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b99ff838b339e1fc20dec1f03ac3b4ca
SHA18afe430f4e558c48d971e0e3e1c4d596e8526af9
SHA2561946b51877a9a13372e1fd53be3a3a66f6b286c172d1e033f2904828e5acac52
SHA51268e75fbb42c181104c36ca12305fed3f50cf1f98a6e050ad1deda28143869d6a22c4bc3e9c7e20d330c6e53eb4ab0867fa3c179386b2c2e8d3c14bd3b4837197
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4e9ff486024311c7f81948e1f6a2ccd
SHA17974bb89dacf9625c3bd778e79b0c2db01fa0093
SHA256a517bf276e4e64ca81f6594d0d34763b07094f7b98f3cd2db85d9c2b1bc44772
SHA512e9a7476269b8cac9a5b356bea7e7cfc8af18e89b82f626148c24a717731c702afbda6286abbab8206f946b3468e72a2ac487f762072b97c19590f6795e3b25b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51559dbf5de61ad187a18e9f8f64f4a3f
SHA186f3f77128b2f375b040ce7da32163429bd16e3e
SHA256c4fa910e5954989db59488177629534ed9034dc947ea246021a61928e977bf21
SHA512071f43e4168b30d202a698c38bf7347a2bcdd4a1df2d05342a455382cace53226ebc39789f49d6101a8cc5bbf494fb322f78ab56969a4a170dd38e8dff51c8ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52455d594b19cedeaba89c48c67b16998
SHA1eb3c4b0294e6ce0eb4d56c9d523bf8ad5eac20e6
SHA256b4dcdc865f72ddebad5470dd844a05635aef35e956f2c947fc6e1498222591f9
SHA5123a869caf346336b035c8e2e37b1c5df9358e9150f5a14fddf0ae65d96f17a8477064efd4723deb5d9bfb688fcc5aa051395b7cb65730e1286b5850393e4c2e8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5934e573ca5550b9ed027a95a494f3600
SHA1cbe1125affd264ff1a2347c6401fabb04d823a0d
SHA256beaa665903b194c55c1f7da3d3f718c2f4646ff107aa3f3df3f96ffbf6066c1a
SHA512ef719697edc2df344654ff11952832f74a400099ca330d5ac833e69e4169c2d9594d0904d914fb1b6dee5b23cb8055ac69b2a5e4fad711f17a66ab121181d20b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e66087f52161cbf60fc23672af59f177
SHA15fdb94270a1dd8b0a94d95673fd13a53a46f1331
SHA25672d362575c55b0c80f5ed40c22cd4344bbe8062a83c37230b5f84d7f70f235c3
SHA51207970ee505bf3a5809d9ca11556823eb8d650fcab88011ada77170ce3c1a492dfd49673e169609b4034d6d8a96d8d33a68938336ae5fb2a7003a902a9fd0d15d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50047776dc8849ac32d1d6f2d4350e732
SHA1c0eb12772988df38f27f0e12f0f99498f002b44e
SHA256c51c681179c3c36b85c52171d52aa615dfdc77ee96a3f2ffa0ee5f9e8594a256
SHA512ea8427054071f746db4f6800e1da14b654162b650622242b4902a3cb2c5f5762f47cca4bf3b84b589d749d7b688a5ed1c0d78a21b054579040e9c5eff396afa7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50094fbd4a10fa54b40cda222186e5d75
SHA11cbcccd44cf19ff9ad853dde386fbee1449de831
SHA256ef81769e28e333410423bc15a51fd88a335f241f5e04bf7a2b841ff004412cf7
SHA51299383d9ee782885689559608cb8560e934cf62fbb9267c9a6de508b84076b22a4a2fb20e0cb68e568d4bca500712d500bddd1d23506f3280b791b6701afbe8fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5213befc131283935e1c55ca29e2330b4
SHA16c9600fdd58493de533190d0a87206587456576f
SHA2562e058937864e8aefe5fd811cf28c6e09cdea50deb84b153822022cff3215dc85
SHA5127ac0bf8fe9033bd6878af6d8fd14583edb986f23e5abbfa73d8b6f9e4ca3706d9c1d666256c12b76464dd4aa78e9ddc99bbd82aba2be63588bf9b3beee007135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5048c5475625289f2683543b1a95c895c
SHA1b27948370ad6b59c10ae49d02718bac252dcf3c1
SHA25620ed721b01f34c825ed0b006dcdc87ecc0747fc74d6c7eb1e50e5602c4ef9d76
SHA5124dfc63e2d7b16c2817f0010a96b140b4ef5b2a642e270f959fb5ef36861492a32f8d5691bc64f40a2ee3e3e3a97c37b3f8482a11639d26e9ea3c9a6756356f6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dfebb36c8404da84b25fbbd1eaf647b
SHA11d0b89b52172f88e62eb079004fdefcf245a0bae
SHA256fe26ed402c5e34c89f92242876a528d59e6e00aab3dd2065783940ab1c0b5db2
SHA5122c110066ff5261a0e1688c6617f7c06dc535bc57bff40d65e6c27d3757f7818572e8e879c9707778f341fea1b60e49068f8a8f000ac9e352264a1e4f48374879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5881c3bdc184adf52d24cb1d1b233e99f
SHA1ffa2a155b0a70e35e966a14c71609970d641f0ba
SHA2566f96efbe79de519ce6eb9eb45da2ea13b2cd73406dba6e03679a5d6cac9d7855
SHA51274e95c70ba07a5fead8985188c647ff24e66bdf4cdb25029b22b4dce7440914d6a49f9dbc728e1ac38972e49b6a8a95e543d19d65e13849c3e0dc497a8204c17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5238ab3aee148423b7fc787638d7642e5
SHA13c8abaa2005c79fc15ae061c5eacf26baf38caa7
SHA256eaec69f33f93cb16c90a450475e303fe7ce8b3d6048ef8bed65b6f74d4c3b291
SHA512ab3a15bdd0a8dd2fce3ce66ad01eedaf2a19dc8f4ed430a9285629b3960a632761aa7d2fcdc26d50576d8999172960f81f673c51095288073930e309b8f16a7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533da15978c60c438e5bddb6b84a19870
SHA1cfc3cbbb3cf51fea567b1a5b5e28749190842c36
SHA256cece28e23d17834a214391110445831d20e2af413a30aba926b41fbdf0aa99aa
SHA512de3bbe04d805ee6504a156c17dff89c5d1e281f0d4d81a8311c628fc4139cda61ab8408eece34903d774b3f6add17ab9f39f0d694220e5ea94281c170d82f730
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3ea3e5a4d8efbd54f60a7b37a0bcbbc
SHA1099c0704249bb52eb66b841183c20fb340f5ebcb
SHA256cbb9499691c9b0f4c42f0023b431fce5a60007e7d5e527cb46c80756d616a58a
SHA51236b3c6eb604156487177f911e3dab3edbabd67d5948edd6bee097c4f4d81d15f82475d0099f7e5b9211e5d00b7e68b4565439bd2204ce784891bf3dd9bdf091d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597ff9abb0f753ef978f68924359872c0
SHA14bcee9ef7e8ca137df4cf728b77a2b51205fc512
SHA256309417f3ce34fee9f8d8d6bb749b587d706728ca4e1dbe9157a637c5f3d0b1c6
SHA51271970bd602c1757f611380f1f39c9b50fee88690153d561d19619ab6a07010bc9844f68f34247ea726dfcb5ce5e1a6649d8d2605926043c002fc1b179dc1e020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554ee021367b27136c90e825f7abcf589
SHA11523f7eedbc9bc59fa0b56f5343f5e643c0465ff
SHA256f716458834af8298764e60b847c258b4255f2c51cf1898397d3075e9c3a0fada
SHA512966dc4b819a41d41c73cab3079182b079d1976bc14faa5eaf61356954d77b6d0a7507ed6b0257c92c90a91732a64aa39195774c1db0c97199f93b93c03d95ed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c566c0f98e1675ce14e822a8812a219
SHA16ed002f05d446bdee63d36e62bdf741e71c54636
SHA25683742ca37ce700c6edf46873ae80d31236bed0088050f3b40e62573d799ec84a
SHA51237dcc0ee95e9cbd7b373857787aac59de760150fb983b6b4677371750950bed07f3ac5afbe20e92256d69af2719640b60aec77d1215d86e73d6891d4d1458d62
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b