Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 04:59
Static task
static1
Behavioral task
behavioral1
Sample
a57ac62866613c2918f5031c970f6808_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a57ac62866613c2918f5031c970f6808_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a57ac62866613c2918f5031c970f6808_JaffaCakes118.html
-
Size
10KB
-
MD5
a57ac62866613c2918f5031c970f6808
-
SHA1
8871ee7ab45210f3abaec47ce62e6ae0e4a04963
-
SHA256
1d7140f7f4382f46eb5affd09e29173a6ed3d410ca5e3c680ccc4f94cc6e2dac
-
SHA512
58219140a8287b5029f9ae6c42673795f768a2e394367728fed8a48484c079a6efdc20ad042fb0b382337f73d2e560ca837a377d82639692cce041bff85758b7
-
SSDEEP
96:uzVs+ux7UFLLY1k9o84d12ef7CSTUjwGT/k8GsHXp6wWbUujrlVHcEZ7ru7f:csz7UFAYS/qgj+1yUuvPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A6577431-5D1E-11EF-8E00-526249468C57} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d096dc7c2bf1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000dfaef045d1ec80f9a139033d904cf7d32d97d576fb1fadd5e5e6c857e1041ac3000000000e800000000200002000000041be1c0567667c16103baac092a339d384290ae80632b3de5bced171f0544ae220000000fc96be72ea792cf9a8a94fae1e68d52c359c5966b511c6cc739b8f6b885c62ef40000000194c508e10342c15d6d5e5e0aeaaad6b5a9da297c122aec431f470e383d0f58b2a2a69e27818e00dd0bda3cd90d60a34e31baaf156731ad6a28a23e51e9425bf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430119036" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 328 iexplore.exe 328 iexplore.exe 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 328 wrote to memory of 2424 328 iexplore.exe 30 PID 328 wrote to memory of 2424 328 iexplore.exe 30 PID 328 wrote to memory of 2424 328 iexplore.exe 30 PID 328 wrote to memory of 2424 328 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a57ac62866613c2918f5031c970f6808_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:328 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a933e370b450dd79c5468b284089270b
SHA13722f5c7188be9a4ec9597b9da5052b96ca54963
SHA256603f90248a923fe51502b08e3b7f79a73fed246acdcd3ca5e189f1e8c5cd3459
SHA512e23b8fec8ef9a050820811e794f0ba23c3304519d28470cd003a7bdaafe100e6e98bb103fb77823c35416e55dbfcef12924c6f51f4e76d29386e84f7ee5448b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d275764130d5e2b5f270ab934b9e1bf3
SHA1dc4dfe02fdddddb7369dcde740325611a831cb2c
SHA2567231422c602a0d8bbf01171f4fa3b8bbec82aac47168c7359d11cf6804e91f19
SHA51267509aacc7d525bcfa273df33cc46883ab1d98736955abc2080bf2f2ead8e2ab4704709cf2d939086aa45102a1d1660a040b9038efc508ecae587b8190e83da2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56e48075c9bd42db4577913017fdc377b
SHA1ad51d62b86a7adae1632788095b5292c0da084dd
SHA2569337173367d93b4d7290d69a493912894ab4b426db02cd52024c28ea92acbec3
SHA51214aefaa56b54d0926c2a6e09f268fab6802d3530aa4a12b691835b78a497c6dec9b7f501d82bfdc3515790253a875b1287c3ab485ddf41d37d81a788c6cf7825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55c2fa2da9f1727c33e60d37588adb8ef
SHA17a7b236e9d651e046dd870ca068fa1726fd771b2
SHA256396ff6d9641cd50951c588af7b2468491a9b6c4cfbe6d6645e745438790dc95e
SHA512d8ac1a7b97e11c6d6d02cfd5ba4c878768bf978bacab105d7f120b05e88644397a80a954a2842c0be9bbd12dd396ff048550f4b9cb08afb2b4f3bc9c9363cb45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53ed7cd24b53c89abaf187822dab39bdd
SHA1b229ed22d4079fa14fd03cecb526a5f8ed8ffe9c
SHA25613964740005c4f6c0006c5c9a35109520cd241fd6ed197f8da5f622ca19a4452
SHA5127414115ec1e99b1c45cd9aeb84cd7ad2007c0c9b25bd56336bcdbe0772f45d8e721557a1c5265458bc2b8d2ae3fd6dade0f24ea1023b9eb9b2d53b60afd050f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bd4a22346429d5b155f1db60fe8b8ee8
SHA119b019c047d1d321bfbf92a1bdeff109dc805daa
SHA2565db46b4b3baa493b750e80325d1d69a9c30a65fdf3fbc6f14d35d8fd8381c5c0
SHA51281ce4d0ac9a26435bb21fac8377f8f6f93d0e3d49db21c3343abcfa10860672edfa5682a681106e306e944bfa66bec180202b1f958009d6a45cbb7cfe2e92744
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54c99cb79e6b21e3d2eef9282779d21aa
SHA195d056e4f1dcdda0fd342c6276e44aab8c410694
SHA256b0728eeedc8ebbff4cafeaea351b6df90cf0403a6ef75d0b8eb4a53bc1aea5e2
SHA512b71cbecf01a51e18259aa86e6bbb434182b6d622700c4679067fa8d48739f3fa48cdeaf65c9365538e77a6b54969931f18899f5fccf074b17c54f75a1d63016a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c116fec108d529bba949a7b56054f875
SHA1d348dcf05b07b4948b71f61e8293e6012a5005a7
SHA2566bba5f875aac71a56cc5e6e4d8396b6f8f4e8ea370365e74b7d121649d6fa99b
SHA512abab68fb1087f5f54c690d1a563afaecda98b35d88178de22247f0bb61e1805f76a7da16158f5af7517279bac6c9147a81d74410b540dc84fdd4e2fd971ccdea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD509e2854cfe7bb1929cb2cec1d5c4c4dc
SHA17314503ea4c452eb17994a74ea28e3a388d76172
SHA2566c2fb3c5fb697e1ebe7277eb7994a2fcdba5cbc3a81d14b042ec0d867e0cf098
SHA5126c75c51e6acf81bfdbc91182c54fe3c9ca59726d68e0ee52cb8406c8e5c4bfaddfe64d29baa355b1f5d50d62183c1a7c62d3bd6740563dbabd35db0b59d9fc9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59e46848bb98200f1e8bc941a8413c0d5
SHA1a72bd1498d1bb28c010a3ca69670b492a9005063
SHA256d99b9bbc4f7d1fc25ba0796c93c4ad41472c887f52b9d886032652ca0a121d3f
SHA5122ab3220927a3a33cdf3d2cadc945b6a4f8f0e8efce62a96e84012c9bd4965068e834866b07d6894861100678cec32e286bc8793e5c3c39d63ccbdab336fc74f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD586ee8327bb4b7e73c9e541ee6ebf75a8
SHA1a082d9f71624ed8ed84bb173b0f40549df41b9e4
SHA256914fc38a705cf7c11cd808b244973a7d060bbad087589a2c8c6a2a1fa3a8bb12
SHA5122f213965b856611eaa154362816abf17862aa1f92c480a3af588bc7e33341ebe3c01c74d91254b651d4d2ded3e04c4397d33cb0c7124b9d5a6dff8aa1658d55b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5db5ba426a80b5fad6f762026a918fca1
SHA178c25a0a6ab5ec51a368ccf5f77034afc9bc1ddd
SHA25623535c903e2e11e7d69fb3fd2cc4ad4113a75fe6c3e2e0cdd8b942fe711e1f85
SHA51227e7946a471ab33e0357619cc41d5cfb489047d601a08630ff35e5236bbb1aa10f3ce34f827c944c0c72d59de61aa14bdb50e07155b46d723c03475f4c151289
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5aa7e4c9b44208bda71c16dcb34287bd9
SHA1c43542b9032d3883e33cc3617a2379f40533d10b
SHA2568c8c13462009f5ea27af8747234b529fd4af5e483fd90ad06261f62ee410349c
SHA512615e5bfb724a1312b6967523c19e4553177d2961fe0ce64cc56c78e3a3d3435da980540e9800693ea8a06c1e5bcdbbd1c2b455e96de1dc9bf5675498dfd04dcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54c4192d18c876a0cc2d99616080f23de
SHA1bddfbb6baf6e30ad50b2cc8ade2947e90c46ac3a
SHA2561c4c86c5014f173533d21107a96845f393f5201f88e3a73e4607c2133de1ea49
SHA5120f5a198ceeabe7805dd1bb49385e4b272d4fbbecade06655e349d55d78a564b36a08df8c6c4f17376535b232ad65a4e24826dee8a38643f465c6d6f6c1771acb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e202748d0a57be700f3a1f1b578d04f6
SHA1ebe928cd1550255fb32b2c007bf5fa21d56c4915
SHA2566d1a1ebdca74aab6b1eb271e84a6349dedc7e45cc1310cf4e5a4247e286c50e5
SHA5125e49a547eba25129c10c40c13014ef5368679188937d9fce245608b2b3937e7691e17f7c639c832af8d921a4c6f4b5afc9824a021637bb7a43cfa7e5a52f641f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5824e6caa8a6dd2c5cb547036ee11bcbb
SHA1ad12f74b65565f81933c220fdd84641255c9e885
SHA256fd3122b753b996082fa3e3d4ab1d92f10becd6ba796bd60541c4983abfb3cab0
SHA512a0c7adb4289dbbd060d07f5bc02dc22e75dcd7d671444c1523e5df4a68977ef25639ccd9b18da798c05719ce966238737c6102b93e0bfbdee3f492d5a9b05a87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5eedb1ec806c00c321f11ee4f967e2cf1
SHA1ea6979edb0276f37a24587bbfc7a61cfe228bbf0
SHA256bc5d3bd122bc1372630357008b64cebd46f29c71e2834ecbc272df253b8049c2
SHA512c498407575595426b0ad37ef6750ed1505cfe75d526434edd97595a7d433321be67c07980c8120fba4da31b6288988b3fe6db02c51a272c70186d87768dcecdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD544421a11a7464cdaabbe1532efa3fe9c
SHA1e33d495ebe32445505e07212dded2f4abb901958
SHA2560bfd07bdb46e668a102daddd8cc9eeea656de3a0f5399821ec97814428f6df11
SHA5124fc8794609aacc73693ded80ee3ab2515ae3af46ad0a4e6bd1853ce6223f4d7f3bc08f0c9dbab069cc7da56d6588c32e6f0cac6e029d5cd078278f905f5291ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fce1dad0652d49f81206b65bbe2dee61
SHA15d5e3bd4579383fafbd80304d7a45aa10c5519ff
SHA256bd178acca354be8f9a544d7e9ad370cd548626fc0876c151298e6ea4eeb92228
SHA512cddb7e277fd9ed5338d1132ec9441a8c08d48a4a7ecfb2eea10154afd5019981138e2db628d04c6b3ee6624f0e9516897e314170362cbc9d95155fb69590fabb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b