Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 12:50
Static task
static1
Behavioral task
behavioral1
Sample
a6bb754e3aa7161edf5b843510f8ef91_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a6bb754e3aa7161edf5b843510f8ef91_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a6bb754e3aa7161edf5b843510f8ef91_JaffaCakes118.html
-
Size
1KB
-
MD5
a6bb754e3aa7161edf5b843510f8ef91
-
SHA1
3473fbdd0902b9f2841b74d67d5445dc4b330813
-
SHA256
406551994d3d84050ad918da309cdf4cd9e27150830b1ed3fbb9a0357ea94b87
-
SHA512
88aedc9f56d96015d8f102a73232062dd56325194b600c694a3b27d84f6249c2a4765b2b4d90956068d8f299f7b6928331612bc044fade0c1d1cf31118f887a9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430147309" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{79C22181-5D60-11EF-9982-6A2ECC9B5790} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0bf344e6df1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000be331893e49f6f0d70aa1162414967f23514a4defa5db57a9946acb8572e8f68000000000e80000000020000200000001679d2ae666b5de2459c2a3b7c09b3c3d96810e836974ee9f7ddcbfa1a2c833520000000fcb8bcfc103a786aec93929b0081033e8abbade8a47742c70fca5911323c1a794000000078666ac14abfbf9232904a3817d1737847d7367be9ab1d3017e68fb973ce4e0394417e1401ab547937a306bc8595b428639f50f5d2d2e817ee6016b86ca0bcf1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2764 2668 iexplore.exe 30 PID 2668 wrote to memory of 2764 2668 iexplore.exe 30 PID 2668 wrote to memory of 2764 2668 iexplore.exe 30 PID 2668 wrote to memory of 2764 2668 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a6bb754e3aa7161edf5b843510f8ef91_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b80f8e2d50564c640bd0fcb5ee79dbab
SHA1d93cd0f9e84d6f716aca13ef19e97ccfb17b947c
SHA256d8d449c5bad1f1202084300e924e1d40d18f88d6c5c3336a4bb5daace7b05391
SHA512a72ce9954645c9989889bfdf354cd926deb1960df5e98e5363900e0aadb2ab1a52934ab23a51370629f7caa4e2a49410c439f6e68d321a7517233783fd49a792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543d5f7de2595d923e31b8753aabf63bf
SHA1d9dd3bedc1561ff940fa1f373c9324b310b04618
SHA2563a36ee4f627dd1e746b06f29036d2b3798668ef757b5b2dc0819d7ce6388872a
SHA512e9599c8b59ea76bbc92a6759e819bfdcf5dbab77c7617700837cf48484aa22a115ae0c677bc5abaeae5d2aec7149b4a5535c75ebd7372dcdd055db8a7c85aa5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c08b98d8553d3f56c861e34a5064ce8
SHA12dba81a1eeca178d3990a6be0593f3c2177796e1
SHA25634b6ef4b2d2194e29c74577480a4fa8bacbf78ab10c165b4703ec997312ddfd3
SHA512f20ef079624983e52584a5ee58c7c0e6c7f2626dfc85e8bf18521f3983a54097bd8176b626fb401240ff541299959736925248f905f79090f580ff157265fc30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b92586a4ac71c6be2845f9f06327245
SHA19a9ebd939a03a634736545a6aa50639c9e3e05b3
SHA256d459998e03d5310c27df2f15f2057103a6730ebbe0d9df93207138bf015fe88a
SHA51207a0120c66215737d0a70f81e905f2319f382a26625834d490921d4317cdf0363de07eda4096b03e2c75515989ff20238d6ce2498afb4a886afe6be5dff6d6fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533929193085fa35f8fecd8c06bcc85d3
SHA18f44c39e95fa5e27eecf065ff156a2a04da9aea0
SHA256e459d52a2cd60404f6efbc98e26ba4dce97192bae90e8b0b92a22d602c799189
SHA5120e7e480dd0b542a0ef6965662ee9c49be45f0d5818de634c9a9cb8ef0a0a4b1c7a2d8fbd4df33e7a7527f2315e0591d6915fb5f3a1ee3bc0fa87d6114f85d180
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578397da70cc684855c2e8c23021b0e40
SHA18c6d97b449c6ba0c1a48107790ca9ba965fc13cb
SHA256a9afc4f0985b5f75468f8965f0af9c1c55adf760256fdcb4a71b8dea9f067da4
SHA512f04100d847b4375fc1c456313ff3362e6e870535150423208a4019de5b3cfe14acc27f4e546fa36c6d405f92afb9627c0da55538bdd67a637f2aa5f734a4edbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562e927c4fc7bc97227bff7be1000cc47
SHA12c5d6c1ccec17ed378ec9aa45f61d36bcdfe0b39
SHA2560669f2fcef695469f98973a23ec494388d040b460c65b85a04879f3145028831
SHA5125479e7a088bf40c9b2fbd3048646e0f9b93128184e97d4012fec1f570f1bdee7340cea2b7ebaa01fcb2e0c80688d634f979bea4ed4b202b52f4726ffc40f53b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519b98e769eefd11fe7837f262d80a8cb
SHA1dcd436e960ab75673a3c5cda34f5dcf4edd41ebc
SHA256b190f58ac3bb1c24b5b0e25ae58d9b5fd219009f4f9bd8d62a62c2ab9b849d4b
SHA5127846435bb6d60c82ed9b1085c42d284c14652ce79a82c9130a816003e0a8f2a8f6cd8de4f08db11e35a1e3dec8f48fb1bba5aaf9701311141347a4bf2d4d55c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d8ad931ce9cfea873df886a77481e53
SHA12329f33e7bd15492e0e6db05534f4d630b106c59
SHA256e183e93e4ba65e49169014f4b202f37f38d23efb59d0b74d238a4ae8d4e17d19
SHA5129910f6ac0dfd51f2e5a187cbff143062b7903c242e88a1ee80c0984ae2f94e3fa7a45bddfc60862094877d9b5499f4bed05e7559ac2dab88b37056bb21398542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da78ea67bf9cd9db102c79584d8a92ba
SHA1711dcee9136eba4c37150033f4180abc4117f052
SHA256e6b991539c3118ba439dc2f0ed9379dad979ffdffd6bb7a081b6a6018ac90c0c
SHA5127123538f1998b3dc8e0f6a53905a6799ce9a5e96a2a7e1003a8bcc0ed11b62a7ef374e6494d389eb9789a14bf1258cfaa8b95fbeed5afad75531aac54cf7376d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57492bb713837cf49c6e4e445a0617387
SHA1363f27ee9744bb8b2f6a2b9986dabdb15b101b44
SHA256cf6f66c102f284736f127dddca1c734f12b36afb5a445f25e7db25b7b732354e
SHA5129702d05fee6d91ad80c88ccf37b17072942323106b310504dc77d14fbf44bbc647e75f58b8d1b5fd915b7f7959c96dffde4ddf363aadba980fb8e26a68e3c8b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5907a535ad4738c23ae82f397d13edb
SHA10bc96d8072cc2ce914ab447b6174a44576e95c33
SHA256f1a491a1fb11e0844ebd17a91d196d41e286c8467afae802bb3d1a7231a3484c
SHA512055d9a5c0849e74d235d0e7087f8fde039c6b38d152c559231b43b4ba483004950afaf58a29581b31f6d81dfc0a0810487cd826869b7691b7e22ac83f642b991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5313e86cb6c7322453d8ff1445ee696df
SHA16013b0a58fef39a73c5a96ded2751853799ebf0a
SHA25694f0f473a1932cbbef26fd7a2d8236b642bf8b4902773e02dc6552ca16825b57
SHA512a7a46d54209404c9ceb2fc215f780ad21fe8c8c85e32f2c8b13cea5f0b6a7b14836240ff81f64bffb990dc0bae5ac85b3bbfda724218132431c6f4e9fb18decb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5960915d7bac54815599b789c752467fc
SHA1ec97135b90ee0e9ffb662cb5f5596658646c5172
SHA256401b15b7d044631785c18ce396d773dcc40653b9c30212732bc8e7148e26f1d1
SHA5126b082b5276c8f205fe4f37200a9b8f4d7750271190db4dc4cdbec43811071845c7fe6ae3d7ee75b85c241a1debf10a1af3c6c2ef48b85ad7dd28916a1eeabca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a899bdf44eee959310d79656870f2fb0
SHA1566f2d5128286ed3d0c1bdc5ca7006fde807e00b
SHA256f97db245c0f85aa13d231639ca9e0517ce3d889262d6a9700c0e3284bd8c4862
SHA5126a642d07ce7f23fb40b50f94ab1d84ed9d8f6b9f2e521dd6a834165f34ed3e64b2747963998b63142e2ce3d23a73e19b908d2f9f441ed1eb1b28abb2211d3329
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5708dd1951ff2e1824eb65bec6cad6972
SHA14419e398adbeaad3baefeccd5bf9c9c18d42b7c2
SHA2568308e0343a7ff9cb5d0b087b09bea3b22b46a88f8de2ba6c9f3ed22d4196329d
SHA512d1c78ca5d49d178515ca69054c460a02b9e3387297b41e14030cb666cc3903c3dca3a10763905e2decb5f2d1c1819b3a63d5f7171fbee4523bdba5de3f873b95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55292f7b7015f2436aa604959012a2a03
SHA19625f321ecdf4bf9853ff24e559a32f65175634a
SHA256071d9f8a830e64ce9f032096a5744b8c67e75bde20f07e76d2648e079fe0b2dc
SHA512af07efef54cd395095ac872ce6c20d755521c9a5a3b11e8b45f0ba28df1d07d7f87c7772291f551c4e3884bcc86d33344f31b588452fefd4c228e8cfef32cbb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ec2139a99cff6cd4ecd4cce845d5147
SHA152d937666b832269127597fe46fb23328bee098c
SHA2566ab99fd9c1b8d176aa755fbbea5174f33174cc60ad24dc21fbb610b5b741a751
SHA512e79f0c47264056e5e5f3415826b06025848abe53dbd0ca480f3eafc5a13a3c0786856d65517044ca52853861209e4ce13ac34ce001a5f7e768dd16daf54dbc35
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b