Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 20:18
Static task
static1
Behavioral task
behavioral1
Sample
a811f68eb5e00eff781b9e4a387de443_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a811f68eb5e00eff781b9e4a387de443_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a811f68eb5e00eff781b9e4a387de443_JaffaCakes118.html
-
Size
2KB
-
MD5
a811f68eb5e00eff781b9e4a387de443
-
SHA1
060de1b183fa90d84379c857cb6f646e56641ab0
-
SHA256
de76c4aa232931dfc279482d64728588f1805ee1badda7ce54da4f262d5dd50f
-
SHA512
38d503f7b176ae7925a23ed0655d13c2f5d034db69b56d06b11dbf0fca8204c2f8cea2812786ef3063cd751c6712b3577fa90270bf0024e5049b836b0daf0cc3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60ee8be7abf1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f0000000002000000000010660000000100002000000003d44ceae218f65e0145ccd43108cce9635d1878ef08e3f5d3f3c5553e683a8d000000000e8000000002000020000000b7ba34b2671f51accb685e71feec48e1fbafdaa5752ef688e4eef15fbfce902c2000000077815bab566424c2d497ced6d072ef90abd4ec100479a0d39301e72b25dcd04d40000000fbeb959b5e59f7436b9b55e43ffd57b1cc3388fb9c09eb9664ff92ac5db3a99903bc8e2bb01b9fda51d03bf2e51614986662111f6415ddec1fa67c258f95f353 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430174195" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1312F741-5D9F-11EF-BB5D-724B7A5D7CD6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2496 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2496 iexplore.exe 2496 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2340 2496 iexplore.exe 30 PID 2496 wrote to memory of 2340 2496 iexplore.exe 30 PID 2496 wrote to memory of 2340 2496 iexplore.exe 30 PID 2496 wrote to memory of 2340 2496 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a811f68eb5e00eff781b9e4a387de443_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2496 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a97dc19db0f457e1810c0b763a34691c
SHA1c341d1d927ae9a4f952989c7d060248d69d2d4f8
SHA256daaf3f43181c30f8167173902a5b38c97415f2fa9f6c72cf9d6e8a526ba1b8d6
SHA512653adb7d4588e7d4561ff0acd15fac5fb502629688142b92c5d3b9f4387e6409ec4832b77bc02ae3c4a8452d0a017b48837ee8857592cb62aab2d785228eee71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569791540366bdc37140ecfad688cabb3
SHA146334af1f13f0bb3d5186f213a99b49d562be2ce
SHA25688d7f81d4302d513f2ad4ceff124ade49de22e6d1a2f6fc4ca974a4e476c2451
SHA512d52082fbd421b08d2cfd9423e199bc069a962854ecb81722ff66392024dcec6b5d006e1a8b3464aeceb8ba938ed1581d76bdc7a4aa008ebc893cac2289359199
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5727078f181266ade3190623886aa1bd6
SHA13d1c2653929bc5e748d6b551703edb8f967237f7
SHA256596c29709c0a77a1facfe049754e117bf82b38917d926299fa5c4b3f8984cba2
SHA512398c2c5a8bd7a89e4c560c7f5466572e83be308efb6abe33555595dc3b4ab50818db5553efc5435103fcdf7372a787590623856c200149784940a8e91fb253fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ef15bd3f467b20ba5c27252784524a1
SHA10db48a1dc62f256aeca74887fd4512df5ff0686c
SHA256223d4b1f5f9eebcb97a4735eff94aa5ef1303776a4fdf917d24b1cfb11161140
SHA512c5f9bee417323958be3e98cfc92fc3e0e1f191426628d5ce7a72dd91109bbb22d9118cc51a9154a7a4685eda4e48ed1154c4cd3853713b9790e2aadc13962f8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5358a8601c2763db3d03ef41ef567e165
SHA1775df63a0f94ef427e5facc8a3fa199b94479dd7
SHA256973cf70e2c5086d2195f5f23cc2b6ead2d5e7cd2687888862e908f056d5f4201
SHA5125c0a89f95d3992e5cf44c1ab7d78a4645b6c9e16e354bd674722bf621de08b64a415c4a2debeb85ba1b77f78e51f53bfd523285ad947450bf1e295c039ab6e0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51db6b1a854835fd19569122679f76e5e
SHA150d5b8f2a18fe6da9b2fcbed1d705edbc5ce302b
SHA2567cb5b23cbe8e188d90ccd8750587fead4db05c3ad994ff16e1b50accecfe3566
SHA5125e6044a8ad04b81ee83133f289b3014654fdbe256e1f2074fa2ef9fcfdfc95a5df2cec40fa16f5b9a5cfa8324c0a3cef7508e76d7bb86af25b996d01b16c5d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c13d55d6e7c406da3067fdbb53cadc38
SHA179abc5b8e020f0d9883aa902655980506eb6cbc7
SHA256a5ffbeb682f5d821649ad37ccd4d27dcce82989d95c6746de3c3224d5b3eda84
SHA5127a6cbfb8adf6c7efc7df743cd5223a41c0f37fc176d2b135ca98f973723f6046644bad8553898eede11b1e9792ab3081df85b3699652d11278c34f833403e46c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfa0ef5c14867bbcd32075b681464030
SHA1cdd431b0a19c28100f1fd8b4f0495035919ab7e6
SHA256452ad9b4faf2555e0c241ddcb1db06aa3634053d5d8c2a03233e505148fc9d8a
SHA512e5aba459995b82f8150adc3c1f23bb4ff1b41b5bd78fc8aeadf3047d088b51cbf343f297fbfedffafd4dda35452a60f0375d02d82544c0a61b18f14faac23051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d59749be4912e14f6d764d076c0738d
SHA1de56fc18a78a4d78c3fe12848ea091dad7d8c719
SHA256974e5e6f6de5254aeb57f72a9cde5e7813c1d2a5b20df6b6dd6375f3434d48a4
SHA51279fd1f2b2ba0868a2b17e337dd59a9137ee97bcfafe876e4f40f277d30449d3fbf7a4b94f4bf80704fa15b099cc96025fab5062986482fdb6ef998832ca8bc6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a7b68b60edc3405cb3b138d3fef89c1
SHA15248b1fc10bab132293ad43ece5c480ec0ba0566
SHA2566b586e33810c060fec4a4e26e59cb3a2a3949f226523225eb8b9d63340715ec9
SHA512a37f04b15d781cf7e4aa487ca47d1f45803bcf48224343181fec276073e7432a6241c09f054eb25bde8058ada5b6becc90e08edff80b56dcba95b84215145883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c0721431b045bd602ef69cb032c49bd
SHA10e54adcf426b9f5ef8840b9c21daf6e4fbc07fe3
SHA256fef86f699e80bd2b9726ed8a7f1819cfc7d5b8e1e808a44b4a31f4d616f009e9
SHA512434826153c14b6104871395670e7a858f45cd08d091e41549b32c350032b7d9f03843c63728888bc4470a3633e99724da48f305c59e701a22b9140b7ff2b9fac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cc005079cda4931891dcd621e229b92
SHA1eeb292b292cff348b140dffee6db5941de6d4d43
SHA256c9ad3e4a02606d877965568fd2f4479da2cc6203448d29c3ab14a410230c1c6f
SHA512146a32f1c0c204085f19960191b827f90f65d7c0581a7b2c61878c80d2e418ab0612a6c107ce2d71ae2b395a4841c520df0ac17cb4f8cb95c91b9b412e847a9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6945f09891baedfa52139a63f6892c1
SHA19b195f6cea265fd373cecec5020493c2bf494753
SHA2562280874bb5fa05651f2c5a42025e28a316d6dee529d92b82ae02f50cff851ff3
SHA51218488dae33d270d56d38107c279a9fab63b7d6598decbee5823d933befe5a941a253b662d3532ee7ea2b58035571dddff4aeb7ee53530143c8945f0e4417b68c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e9c52a71e9dd313df516b4e388ef440
SHA12cbc51f06bee4e4b2489b73275d5df4bf784efe8
SHA256ebe3aa7065ae613791261ad6354943558ccdb702b16cee74fb468ad606a45987
SHA512968d51419f6a59552c2004e4ba72ffb8f03720e6a63f02796e120dfbdcfe5b58fcf0120395d776a7825673166796637b115158e895c707509537e6e6101f899d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf40af1f3f77c1f62f6dbe533a2bb7e7
SHA1e1d0468721544f15cc0b03f270cd380013e51f97
SHA2567edb23e3b7373575a65ebf922c901766b67175350e9f81da7d328aad908d73a2
SHA512f2aa7585d758f1e907eaacba1515b5c3eb013829f003b7dc55f2da7c7bacb32375d2fdb00b9c2ce2542aba38a4e6509a0b7521837ffebc6d65504fb5c4314b68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56641abdc8459477a2af8f50ce965d628
SHA1a3055bdf8e23313917fdebfbf1fb67466cedfefe
SHA256e5bb56e3010ed5e5ae59e473e835def17e77bfca8454d72a409161d6b570b9f5
SHA51259d759e21129054f1bc162a2ddc4ab59a52edbd51cf6715411eaa72b9369fee7f232bbccba869277db878d4c59c7966a9a0e5c16e39f88aef8be6f9ec1d1bfb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fab51e3d1632c147f215ac8a84e9c75
SHA12337ac3b3aab56026f4cebd9eab627084e5d4c26
SHA2560b25e008d466448ff070c7a46b739096af5fcda2d71ce5bb93a744ca81afc1ae
SHA512be6176139dd21c0fb00b57a4e1c2fda50f6813495232cf354e83c779c737511b83487a7f38b2f6c261c327bd4db5a4e304814db212d9ea9293b570e8eca1bb04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b684656a73a70b546cda3273f5ebfce2
SHA1905734de2960e5ad266fb51169107f8288909fd2
SHA2565e4c2903997201084c3bbbaacae366be77c6812ef3f027ec75a3a7237751e269
SHA51217de47d66a78a6f776e03ced0d56222bfff6d84d4a27e528cddf1dde844e6abb9830e748e4889cb788d9bf0ac0ebad1fef1ca33482580f28fd76911eb8800bfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516bb4731bd749fb4ff019a37a8cbaa39
SHA1dd783c3e3f26357150d66391ce7ae6b15533b2a5
SHA2561e68716e13af4e89a3ff780f94b6d744a62a70412621040510eb70a2ea11edf1
SHA51225d3525a7773e1c294034222cb55bc88b83f69d711cf6cc815d252114ceb28998ac5e6820ecede662559025ae64ea4f77b26da8ceeac4bf83a7aaee9332acf3e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b