Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 14:45
Static task
static1
Behavioral task
behavioral1
Sample
a2f5533087cf2e2d1c9328808137fdf0_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a2f5533087cf2e2d1c9328808137fdf0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a2f5533087cf2e2d1c9328808137fdf0_JaffaCakes118.html
-
Size
886B
-
MD5
a2f5533087cf2e2d1c9328808137fdf0
-
SHA1
41838b6f7955cfb568c066d3ca448a9e178e68f8
-
SHA256
0e9e152c90423edf4db2717a1c1a25179c84ff92e914b841dd2f8680eb265f22
-
SHA512
35b74b0842f0c7fe40ec6dae5218f9e0aa26ab0bccfdf8ba25b08ed1f9a53bce0a24e94b4ac9cca4d633a0d564b424cd8b3ec3a29492e8897f3b9c14376fdbe6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430067784" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{51CF1391-5CA7-11EF-B903-D22B03723C32} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000827aa99fccfcef0bd481cec1a3bb92e687f1a5d23c3b04532b22cc8a30ec10fc000000000e800000000200002000000069e633cae51ea967c010bb7de340b715f97263a1a6b92a921a9db0cccde1463d200000000397f5707dbc420180e6ba7516d64f8d593564919b40a0c65aa90e3b5d59c3d840000000f6a53818c91d67c48febe26c17d16f4b86aee99a518c4052c678a438a62f149ad26960c7b60520c078c9c74378d937ea208cc47679fdf0e564bae4975e43b7e7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b06b873fb4f0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2740 2372 iexplore.exe 30 PID 2372 wrote to memory of 2740 2372 iexplore.exe 30 PID 2372 wrote to memory of 2740 2372 iexplore.exe 30 PID 2372 wrote to memory of 2740 2372 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a2f5533087cf2e2d1c9328808137fdf0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9adb599448bf212b57ebf94cf6a0e93
SHA1e8a43462a0f4c3e8ee895b95eb7633628325cc18
SHA2564a62d3201dd025ad8ac31bfe8e82de0a06e7b433e48f7181102e1817a5e2ad62
SHA5123cad56f2d75f5419f1c654bdc3f2ccbd5fcc2ce07780a47abeb84beefb1e9beb2662cc7defcbd99a2f05ce3983d472be3cd4e3a5725efc8aac9003cb38d099f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539c2dfffbe14f1a7e921566c0d5d8800
SHA1701c2264e9171ca693a51e4874b7ed28dd0fccbe
SHA25629acb28797bc9c1243e5fb19475dd33a471b349890790b243bbf19978baa79e0
SHA5121a19eb30856a2ca6c3674735d71a3faeb23f36041538913d2b163a1fa53322011d77313dae8b0c19cb09cefd659c3ccd9f81d3efd2172d578386ad78353c7abf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f91133fde8d652852006893cbb6f7d55
SHA1f5793c862c31e3de3c3a283d21565768cbf01dc8
SHA2562a69becdff53f7cf83638fec31abc25eb219041a3a991a5f694e782180fa7c07
SHA5124baa1014d2551daac8fc8c97d6dd779a4649b0ce632395779070eb4eb8f47f573b5e9b547351f88f58128d277f81bcd46e38d77183a398cb05808ba0381d2919
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccb9912762c2f15f230846d8a74b3928
SHA144eb4ec21f09cea4f102d3dca583180026877b41
SHA2563e6b3282f737e9872dcc67489380a90ae8fac4668d3c3ff924b67499065847dc
SHA51222f6e4eb8f283b458c985869538e03167c555dea37c0c2ef000b5a846dde15cdac638316e9f7ee8723e23983df97cc57ac58077c9b77004d86f2f6b36a3c121e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bcbc12045795e11d05ce01d33935568
SHA117ff2a498377e26ed81e9b8e603fe8f4ac6ba24b
SHA256b2831e0d075594f8db95669606e913ddf3cca9b00d28182248b2c41309c7800a
SHA512089274ce5b0d9f964c3fe6e5c04c31d2ce6a988b5005f284ab93d99348529873a5c4e10d7fb6b6adb9da0e9a467f36558751fe641481292db372df0cb2fcd81e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555c9da9fb6ae2e2963815ab269441bdb
SHA167b34c9b5d1a44b18db66244b3d58336aca4c155
SHA25664e66e8e33124b93d049ae74d9ecc28c02641af017c17e794ac444c0adf8af01
SHA512074a1b3c799764d7d9f84f512d760dc3753256127689f1604eaa073a5a9b88783d27dc17c1a65130a6d057c2587d11dab6f07b0b41a3e24af43e15dbe7b3468b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5795e0b3a3b125749173dcd1fbd1dc975
SHA19a553f43a53b694a76732d4f7de85dd9c86e5ad2
SHA2564c34412590be815b4379471fe1417e97e3899088f19ab33ab2f0f04ff123429a
SHA512c6cd6b2c80d3bc873dd633b3df061b190829d99cead94cac9de07a82a76c259ff2ed8755fc2f97b366735d02fcd0cd927db3e049a2734a400b3212dbfa94cb13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598774f0475eb7f26f90cd4d5cab33603
SHA1bc46da70928cfe97346937ba24567868921b2c81
SHA2563ff4f8ffce7f36e9bd81ea4aabed77b0e311c2b339235bdc3b937eed537de9b4
SHA512b836470449d7500f72b92f88f1cd61683b21f4337aaf5cfb3c7deca11d6f6be59234566b2c19363e29a808d132a25b914bfb5a8d741441b2c80ad6a23ce97130
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baa3ec896b23a751339ce3a496238016
SHA1cad5a24480623b02173dda2613a828f13ea83ca6
SHA256435b198ee5863807e07040609707b4527f900a479d9d60368c5fbca5f870db10
SHA51274292258551bab438a98af2e8d5e7aa4ad00bec18e2f0dd832eb5c240e735fb925ee0650485f2e6b754a83eca6a98b079a7e5f7c862cf709a58bce411414c0a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554dfbcc9cd5fdd2e22b6f01819b6bb70
SHA1828a9c86175cb00aa34d346648de7df28ba34407
SHA2569f568b3db07159c3b3c19ca4d591862bfb143eca3cb8c78ed5ef9b68372eeb09
SHA5121bf31a6f4752aaa02b5765b868d960eebded42437de1615197d47eb766f76fe621fb3c56f8ac86f0e02c6cee88ba32281050c320f62601712c91e8ddabef7eb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5676d07bd91b6f3a3a5fea3ef5679e088
SHA14a91c0a39692e6293a6f5a346a6945c3fcc444a0
SHA2567953405b665afe8e21c4016def65e0c7f3a8fc52b0353553511a913479236de6
SHA5123a9a599e55e8719ed7242687dd859027f86abb811a2a772736af1a4744a3f86dae1c56c7ba7308192dad8a09829c53a7beb953f927bebbba153df76b962f877a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5975d3dcd0c27c5b933d8fb2e02944512
SHA196cc6e8cfbb6b39ec0feea35df6cad735960efa4
SHA2566fdeab9fb71a7a4b48a23d6f667fc476e6d370352c53b94ce3b9e0eb762fdd1f
SHA512adebedbd62387f24da21868bc386ab3aecd69b739470463c3ed7f66480a981f304119658774e4ba30ebc55d6888d0f76efb3ff222459dd3c8e640bf7a5a15c37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de3b216a2509333d03c371ecbd223a0d
SHA15a9cd5736317499e5be2f2fdbc89d3c30149f713
SHA256534fc16313a3f19fddade727db1ff2495044d823bd7bf9dcf122a71adc708534
SHA5120ac583254d252c036dfd7d46372e8735967867d9f0bbdff234b9a8a0b3d5cf9a90c992140c1ebe02cc91857047aba05cc17c9cf63b1da77065f714bd76fc7175
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b61713c32de7c707a9ba355c14e97547
SHA1d3f66cddc03e4634fef1b94a994db1f0819a0889
SHA25665053d16ea188b75b32abd57668e79b000eb7347fa07f36453f57fd9465f1121
SHA512d6a2a4a047f77eb0808d5746d2251210f054078dc928f4f8b37d16f51bfe213a9ff2c0c080590ec00f7ab4dce0754344f85809d78f776dd4ffa365dfe8241cd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580fa1b9bc45606fd897443f0aff7ab81
SHA146e5d5d75e2a8ee36a37273caf9238183fec2ed6
SHA25698095c587d2ae48edb93efe52dc8e8903e160e8c800916bcce93ae4476837fe7
SHA512934c049a0e970162ccd97b49c4a99669845b49a5d4f95889066a5cbc1872ee21956cb01a57ae2716b9f3c25062d612a5a4d95d86bc245fcdd3cc0d2004137c31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551fc97d2dd323cbf6edefdba5c559fdf
SHA1c8edcca7feb213ce9e0a132d13e5173726599127
SHA256cad2520d4bad042f2ed0b57a36ea8037304af08d3a99ec671035af051809485d
SHA5126e21b8883ddcbbb1060819947b5a200343e8f210a28f935081abf12aa12e6b1dc537112f4d600d171b85b167107407ada7de1ab0fab8e76f922fd460f13a5260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ee6c0fd19043eecb5b32969033bef5f
SHA189a9634ce96c1ed29fc2c8e2ad2bcbb984d053b5
SHA256ceed6464a335367a8767ce0de55e8fe9bc3ee8a702311454a98b6c8b51b12b08
SHA512b1487c822bdb5e1e02d9eb709a667c9542ce0435f33acca33874c93fbc1d7d72bf179a954b4b271fa9eb40a7dd747597d9115f77f643780d443793645bb78c59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5086954e0977bf030b286298aeba9a45d
SHA155681839c8e61c0751bda8151376d2d8cd6cb244
SHA256ed7c5aab63d68edfb69d6bdfaf5ead53e66cef13702042127067242f6556518a
SHA51242dd8bb240de47b4a6bc8bed0bf1410df071b1e661eb7bb6701fdb0d0fb9e7862b223be5492e8858796e306050051ee244a2f2a93c2765e17135c99ede26455d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576a1fa237888d9768c9844c791afdcc3
SHA178d545afc197c6de9d2de12e181c9cd073c9b203
SHA256a4311edaab96e39c3fba06339a3abbffd28b9706c2f3bd1ed38f205c2e689876
SHA51234e198faeabe14cb587de8383c255998ed6ed52489b2302c4606e78662b26a71e6d2bdc9d2ff16fb8a4cc0b058ea147b69a64202438feff869c354bbea1af93c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b