Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 18:25
Static task
static1
Behavioral task
behavioral1
Sample
a3a25e039a36c78e85243126406f2a64_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a3a25e039a36c78e85243126406f2a64_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a3a25e039a36c78e85243126406f2a64_JaffaCakes118.html
-
Size
110B
-
MD5
a3a25e039a36c78e85243126406f2a64
-
SHA1
98e0973ee71848598d29d77d680a8769d81bdb87
-
SHA256
3aa6a66bec9e21027f3a649823cb1fc294b459ac8e0d2274a4f70f6760771fbb
-
SHA512
614bfdede7a04a8040dc5003fb7f21cec49bc3a99238ce68d6cfc6836c7ecd7ea11edfd3365736e455a7a546485fbcce1a3536fd4088c2d60dad5227d6ad1ad1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000008edd16e20c015b9568dacc0371ddf168a2c1ae7bb1c8d7cf868cc24887f852f8000000000e8000000002000020000000d42e7d8480b27624bc3cec4ace464e17e0bb25d12cd23365538f881cb8b0afeb20000000497569dfe719faf8a5934a321530b97160f9abf11caec13b9ea034bf722b438940000000249e73e0ceb0292aa5528c2e716cdd761ae9f119fb413ff90257ae7e1238caf9e4458a127d39cec1be80907d87c7927fb74f844aeef06a7a0be0302e9dfaf975 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{066C0061-5CC6-11EF-991F-E297BF49BD91} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430080973" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0bddedad2f0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2976 iexplore.exe 2976 iexplore.exe 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2068 2976 iexplore.exe 30 PID 2976 wrote to memory of 2068 2976 iexplore.exe 30 PID 2976 wrote to memory of 2068 2976 iexplore.exe 30 PID 2976 wrote to memory of 2068 2976 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a3a25e039a36c78e85243126406f2a64_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2976 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac4671132d5750484e5619c8c0100f2e
SHA17bc4d39f87f470ea6b016a20d4af88c28dbf2846
SHA25626a739162f18c50a53f5ff56f2097bfe42635983bd90b67d558f59c46cb63b8a
SHA51298a5e1663fbe6d35095b472fe9a2e28d5849413cd7faef156240a98375616be651a94d8617d2617d0a8d5c3602990a2660eb7c764480b264c1281974f3d3c405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59308ce5887001b441d222519090b7d70
SHA161e8a449a16234efb2a2e49dfdb4744d02f479fd
SHA2568f43c3e3ec8b3414b2c34b2b11c0d27e76281364406f1cc222cf618bca27e0d9
SHA51235c92327c3e583a9ed9d212b5507a1bdb8e09cc5f043e643746c9cbde7351d4d67c17f2ecb1668d52c0c8ca369a05729d45061d24398e57aed4fd1775a3a360a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf641c55620452e277421195a039e462
SHA113b32c95ec3dc73fa4737de71932d06a6261da9c
SHA2560d35dd06a8699a4c9bf72144b6f461d2357a94f717f76976d25153ddc2d2bcb3
SHA512407e9e348e60c480794428b6e292a89e65f7442565ba1ac0b2d0e8937a4b60347f1d49ae98450755eaf91e79bfe61a9ecb8b3d4ae51f1589b8aad070405b2934
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536740c277fd5e6215213f868b374a735
SHA197aa40dfc7363cc5d85e38e576ee2a7cb83a1dae
SHA25611a74dd58d8f7bb9941b7aab929337cefa796d0ac187f25a4b7b92e9bffb0fb0
SHA5121fc0356c089880d31e287bc0f52fec7642d971a1f9e1672d714966e1f3dc26aa68d7a94c22e536fbc4876839c6d4b4f49986dbfdd517b8401931a734c020a1f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c31a59140410e06fa4470695c5f856b7
SHA1c60b7bdfd79954e43b4bc2b043eed4fac567de0b
SHA256dabee5634fcb38fc927db9f125a7fd24641549bd49e5e2fbd451159074a08601
SHA5125e649afafc25f0cd99c12d52bf862e481b7c5bab409dbd05341ce03cb902fe3c5e8f3826969db7ba9cfd782d5e002babc57c5e7fa17e9787de1511522714f18c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501de888828e39d7bc9fcfc0b1c0ed590
SHA1db6c85fe103b45229b11b50f9d188e70cd09b017
SHA256fe2deeb0125b745baf4e72a30ff9093580cc1feef86a371c05a16e632dd22e6c
SHA5121646448c580d3b71dfe86b150ff860e57b5669eecceaf586dc17c4d1741464011ece8daf6dbaf4416f7b308e480c4fa73f097f19bb22af1e5a52cec0311e02d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527f53bfd75bbcfb5558bac5d7b1b9929
SHA1f1219257f4a1fd18a0a4e3d7d8292fd5cb9800b4
SHA256a2a938ac58707ebd2774bbee0fd4cd7be581f34ffa1c4bf5264fc1ba21772b15
SHA512fe9e48a2bf00d4d2a542153823505e5034dac6cfb460cda7c59dd9c0a149a68c0d62d2a2beda7634e11d62e0c3e182c4ebdb4c0a74d1fbefa138010bfc685546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fcfd08b794a6f328ecc920184157d5a
SHA13e7f6ea4f1ff4a2a65d2b2f6b94b21add21a9d18
SHA256b9a991a5a8e581166ab3193610de225d36431fe1a386a76179d04d52b91e3004
SHA512856d7ab990d8940e069b077b7a6067591de935fec5536a776bfe0cc4b8ca3994c7647903a3177f19f23889d13b55f8a559714c1131f0f596e4d73ab56533eb47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3fffbca9b8180a44323b82a7e0845c7
SHA172a3bdf88e91b8d434acb42d433346d8486b8646
SHA25637c67b4cf724ba35c419ebefc12a735d7a0b02ec78b355b4320d57ca8f30307e
SHA512fda7da6d4f0b73626bce727532d39378cc958772ba5fb0f8817a407772ad07641e48c90086e33782ddded121973d070f9e96915b9454e537a2d2686d674d4676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6fd878579d990e4c7e84c128f681716
SHA19b9dfccd92bcbb3e2f086582d4105b14068376b3
SHA25620c5e7e1424fbe71d0f87430747221ace7e4d29e64b1434e4b4ae48b7a6753bc
SHA512a308d80b8437830465bf9b26df0d67734d900dbe96ccfe9daa2b02d95f259646236ffd09582f85abdad58c3553bae60f26e56d2fbc38975413440277982edc3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fd626a3b4686338cb424b4bdd3b5bf4
SHA10debdc2ff5de4e70a351700f395e2d44a0f06df8
SHA256eb11a5929fa49b3beba91a286dc5f71a24e60bb295a53f83fed8ded04a6c114f
SHA51283258e977de43035dac8b84cabb9fac9188d4a4a8f252a949d81a2263294db8a576500692e13eaa53deb31e05a3def0588cfa92b7b039896ed22432a0a6dc79a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac245bc2c4d427adc9e6dfed910989d9
SHA10ff24eed2599b7e7b7d378a880b2482176bb8f32
SHA256ffaac88727c96ea95fb418635b11658f058239a394a47a74a39dd27514557beb
SHA512d394ed847c7bd540e1edac75b2db40e19013c32eabdb0ae4eb3aa6a7ccec68b5aea006abbfd2fc5a7dbaf3571c79b98c8a078304abe51693d3e59d240257df84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daf2ff2fdfc0deb3b80010c826baedbe
SHA1a4a0e1a200959f2f2a4eaeecdb7575fb1e04d092
SHA25609d2c9518c2d3f5f1e611d0f528578a4e001d5a92e93bf3acb0cb1608bd80c92
SHA5123721e5eef16b95009e0c7045ff8efd6e803b929377628a0a5c038e43889a6dbf55778d68230436df5aabe54950c2310f5e18d100b56757f758a0997955a7f814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d0bd6ab8f0fd08e30186d1b68f2af5d
SHA15f561923e15b094ebfec74100d31c8ef2bf73154
SHA25674fd537e9892aaef91cc7d0345527cb5234f26157435b1ef15637810d15456a9
SHA51216d7e00febf1b89b5c8939e055938344a480d4ce4395dafdba8cc8d9dbecf7840f6c354a3389279604abe504ee76ff0bea2fc7c879a5bba773af1bedf1e9bb2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a765fe3818c0dd84e413625dd0a83fb
SHA114a1cc348be6ad5bf2565fa6b934b8455cf8cd6e
SHA256a0942d926c14cd2ea95ccc8a19add48e3a2bc71012b711b22aebda34071e612a
SHA5121dcefd0a45ae33a293a1c2c4181b822c5acf799c1419a4a4c7c15768ad7409cb969c172a331fc50ce3df6c4abd942172a4872c34e870d1aa84cd902cd2caaa89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a757afc89759dd6141b24754afe0a364
SHA1c1d323e9e3aef560d95c3662b47433f3e940449f
SHA256a2ba146bea78d41f7a01b3bf00fdae28278e01e896869c0167f25cc16db6df09
SHA512681a6823a306234c5d722ee09493ed98bbb10ca32553e4e28c34e5c5e8196906a27d9a83a4cf8437617caf0753a1ac6f97651a5e8ef5d2af392c72bffc5b0ef3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1a0d8d36a75159ba4554831f50288cd
SHA1cfb436f08c320ef043d1df7f42f2c6949dd21b31
SHA2564f0c93c62ec2d8fe286dd464e66d52a9e9d91e1121c6cc594f4fe81a73df3d2b
SHA5121c2e39f975c334545e2de6bf8d8d34d66b94160e1843e0d1a43b89e249e16dd9f6907fcb388901aa1aa00dbdc5e02ecef3eba16ae06ef5e584183afecbd2ca19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585456fe625b40d75ea209fe604e2a8a1
SHA1b88c87c67deb50f239c564489a8f07ab2ab552d4
SHA256c989bcbdedc7ee170ecd908801265d857df604558f4f37d840487402b21582b5
SHA51230e090f7d55b005749cd77daf1418939f83f3576daa7e44a9dafe4fd2173bb8e704308996cb2e711db387d5b5eb0081b73ece7c0c05ef8c0c089f60ba33debc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee2336f8e24dce35e23020e26ae5b213
SHA111886122693d131720c3b89b9c3ba7416f34a46d
SHA256817c08f7cc5cfbaf6ec1fbd0be8f38a52e941f284c667e6bef44de0791a52366
SHA51224f755706eb30c9221b5539724a1cd4c4d752539d52aa3eca3ff29c7dd78dc3beec4ebe43e35a66fdcc5797c1616a7e9cdf8f36196fbc36287262d801f910646
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b