Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 21:24
Static task
static1
Behavioral task
behavioral1
Sample
a430589cd8b8410efee1ced9587240fb_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a430589cd8b8410efee1ced9587240fb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a430589cd8b8410efee1ced9587240fb_JaffaCakes118.html
-
Size
3KB
-
MD5
a430589cd8b8410efee1ced9587240fb
-
SHA1
5a832d00e774e118ad768bf3177b4f6e471d1f1e
-
SHA256
b9b189559f6cd8277c3453993200e4eaf8a2cd3fa29ea8092bae8bee1b655ebb
-
SHA512
29816c9a1eb1f3f68d813af6f2a3a70f9a297005e48a57800c58d3aa27c9c41b636129864a025abb81bcfbe169956293bca1f51dcad2a679934990145129b3be
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000004bc20609f49c0884e759bee228b34639afb3de20bf5fb9f8d094085d73f751c0000000000e800000000200002000000090d4ef228d72e9c7d65bf0fa5997dd25f7d29b7e52a2a330916ad1ebb5486b9b200000007b73024ba3f2761fa12f389013f7a59305fcca903dff5b015199eddacd3fc462400000008b12ba020d7ed5e2d57ff6b4bc9366a9206a4861d0c0923205ef811271914af84af48e9efca4b1664dddc857bc3b6a09f8e0ddc355828eccf4655f51da79fbd1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0c1f9edebf0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430091744" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{18927301-5CDF-11EF-B137-6E739D7B0BBB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2472 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2472 iexplore.exe 2472 iexplore.exe 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2116 2472 iexplore.exe 28 PID 2472 wrote to memory of 2116 2472 iexplore.exe 28 PID 2472 wrote to memory of 2116 2472 iexplore.exe 28 PID 2472 wrote to memory of 2116 2472 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a430589cd8b8410efee1ced9587240fb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2472 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d83cc9064cc042c36c6942b57acf2a2f
SHA1a5158d845520665179d4b848633948304e8b6447
SHA256fdbd7bb18eb4e9e5e606093988b6c4bb0fe70db61016b0cffae3af2c1fa8e400
SHA512afdb98354ae1ff447fd1ffc380c93dd635e5cb2078715ed74030cd8bc8a928024aaf0a3eee09f8a7b245509cf3b4ae87d7df0ec50aaf2fb33b31daf4ca82ab07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df41350f97c7adbd6a2edf978a424cba
SHA19d5e4772ee5c28d5263c245898916b0dfc5e74f2
SHA256de9ac0319303e38b07d44a067e09d2d36ffd4dfba5f89c99a486049c6ecc385d
SHA512161312a535f3deba67186202e9b5e18073fc13924efad2004119c0884061f2fc75616827970f3cc14d6280bb3d3d2f402d72b4c6121253e0cd9f93c4f8a1637a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca0da217eb0bbc48cb0d78a353e77399
SHA189de39b676d76ef986d893e8470745adde116a58
SHA25685c7719eb9c58e77463b469b1d3ecf2697c6c183909c799f37a5672cf6d67f58
SHA512498bfdc072b1d2e3c7940c3b58311ba3df695123304513e8a381ad00464cf2d3df4a0c89fd3d7f1f4e6a455c846e6b8240b9245169a3924ef60fd845a95887c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51980440b91b7133374e58568b5e4269a
SHA1f403cd5954c337ae01ef46dbc5b7e3bfb4360897
SHA2564994b63e3550e4b9d9775e9e5cf7fa49316c6085548ef433ba1c74bbb85b1f4e
SHA51280484494237b4fe3aac3132f5afe61924ba7f1b29441af0a06003c99880d4eaa042382de56bb00226f1d49485ea79001efe1822567d1f2af2559fcca4a9a08e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e80666c5509796ecc33e02ba8c95f03
SHA1732bb0c43f216b7bf073d69f9d287553261724bc
SHA256d056d145197c51d4228cd62860038feb455eb09099794419e384e74b7dd3be6d
SHA51205acbf73834a571d86a65f1af01f01d5dd98a595154ed09f473212cffe0827ac2c172d6ede025250457b3dd94fd9b9b9e7f928324fdb599691382e3c7a56d5b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56150b74dd822dd3f91c4d4c83f73291f
SHA1b9707e4c758af5a0eb8eb6916fb6b0d78342bdf4
SHA2569e214c507cbab57f1730749740885b87b7f0239b329928f247428284539a463e
SHA5123b9d6cb92b9b92cba2f7d5326b8f462dd654c9a65faaa0fc98e67c7827dac3a19da317cc1b44a2d9edeb6eb86ad1e1698318adaecc5e1c940734b08591904553
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d96789aeff7988ccaedee6610b87a9b3
SHA17a8fc43c5a46b73dc0bb7a0c0731827e24817c5c
SHA256c366aed61cb48e2497d8d3da35dcf3a2ce648dea2e85afea3362bea648883acc
SHA5123fe671243f5f81f75310981fa3f2140d541aada6d1665ef421739b3fa8ffaa63df1a1692f5398a80a2e8a249c4045975cb443828cfa0a18bbe8ff7baee596af5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca2dad17fa3afdd6ff324cd50e62352d
SHA16b5a448ebd3230b031ccf87ae6075f8295757b24
SHA256adc6cf0c351a5e278c04bdd1adcade2274cc3b99d73f6d0ec5855f4e963f2525
SHA51266cf7a026cb9b46bd70bf774296096bbac5439b280ab747710db0fea9d6a51f1ce35a7ad3a258d893565af09a088b28ae4f002672a3d429ad1aeca31e0fb8e9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa3b605e17c55de20a32a9085317f38f
SHA154514ccc68cd5fe252df0633b17259955b78dffa
SHA256d7705e79563efadefba5759f0d26b6e5430aa9b1e770e0a3a6a5ab58fba1bcce
SHA512cf46c8f89f473473b3ed62a0358fdd6743c438325fc041ebfc39de8bd5f2e9f278702914448550fe565cfe4d5dd2825d1e729d566aae5224cd956053a5451882
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5a2743f7d48151e9ffe492dd8e2fce2
SHA1c81261c6e70807dbb8ab703e1ca325c463331252
SHA2568f4204db2a44af33298afd95a481d6a58378d7f01ea0111cc0cef01a628bc3f1
SHA512cfdc81a00fd7457b4e0ea0a7e2910e9ba855f3a9c06f08389d79ded74c902866e41d3c4a936e7df737722ca1a57bd4a5f1e1abd558fb08ab80b822cf2acdb311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a53dce54798e42555bfc5771abe6aff0
SHA1ab7726f7b021fa222de92617b231c93f6792803c
SHA256f44308401e300ad9b54737f80d9b0cdeb0d35f73bd4f7059771554ca84a7018a
SHA5125cc535406025932b63de4e69becf1990ad8cbde14021ca03e688747fdbe0c7476a4739eb8cecaf865e754b198801c82ffc6dfd1fdaa17f7722512f589f469ea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5033e4df3f6a147db35960461ea99978a
SHA115faee5bbcb90d3a0b9b3e3129ddfe82bf853f2f
SHA256f2ed6de9ab6cb5ca40fd0ac63de19effc8db17b6ae66bdf93f4d08eca8228c2e
SHA5123fbf7899980747d5f413d599c569e0395fc924430a7906d2a65187f59176823996ca3eced921dbc140dc688bf78fade3fc1cf22f74de781e14c26b43aa12e793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577f944443643004732431ef33c982d07
SHA169c30693de5ba94a3d5b2c88611f4674698dd7e7
SHA25632c45c9d28bf41d1e57700234bc3698421d03179b70efe2001d16049fbdfe43f
SHA512b5b0fef7e5df39455f4da518bd9a6de55f160ebdbfd326584f80eae6b032e70cf3aa3b6070f55ddddd7044252a13ef0e9860e16c8ebb23e00021e94fbc3266ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c51c7977e923f50e287269b7350d6526
SHA1627e38b3865bba0a7917f44a28fb035cc38d6cd8
SHA25624cf4ff6727df23f7d5ff51f5a102603c420d3692e5135171c585eec5aa54549
SHA51269235770403353f055f3d17462f8ffca0c9f3b31f5eeff08a3efb35b90f1bc527dc9f90c06a8aab41942ab1b6875bfc012514b9d0a98dfc7edbcb6b740671966
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecbae972631824534d96e121d920ca18
SHA14b136771ac2c5286aeb292e6a98609ae85a6511e
SHA2561a477dc665edec4c0ec303c6736f3cb5c8b4f7af1a9ac28b5ab12f406e0814dc
SHA512f99cc44ff7507c7f8cf8a224ec1ba3b5ce7c5871ac5b8c56489d42c015f6c4df7d7bec4c2acb91e36dfbf1e640b9e9c6dfb8104eaec360832f62fd226899652d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b96931e09921bf104147f5243183596a
SHA1619235f1f84eab4eadbf21d48f199215e7f7572f
SHA256a37b42dcef16ee14ebf17c3122e740e2541448c7db88ea20b0278b902a27809e
SHA512d9b82cb037f326e0a29a1db981537978f9cd07184cb2022664d9e3c13391808cc3c70bb4203c3a73954f603ee072e3556b59a9b7e5522aa70ff771731f01e5ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8c9c23908fbc1f20cc80f5f63c855d4
SHA13e7a8e6ce5c7110df6d17745fb575a3e29af3dc4
SHA256e54c8024b5339e68006791a9352ae3d898baf799bb101f3fee23ef529ba114b7
SHA51286db6cf9ee3a5277557f99e9812abb24d77a5a3371bd441759fb6b0e9f76241446b5129cc7ceddfcdbe61945819122c41186b0eef59de234bc8d224fb5dd2023
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b