Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 20:30
Static task
static1
Behavioral task
behavioral1
Sample
a81ae209924ec6349756593513240adf_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a81ae209924ec6349756593513240adf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a81ae209924ec6349756593513240adf_JaffaCakes118.html
-
Size
9KB
-
MD5
a81ae209924ec6349756593513240adf
-
SHA1
3d852d2a6241d0e05d6545656c47e9a576818b83
-
SHA256
ca29e0839ea57b5910dc38b73dd072e18a4f3b5ea65dab058159e6e3b721addc
-
SHA512
f2b9c66983189c33bbc088d4ff6fd9cf3f00a143210a75257c6cee67f1936381809f24b401304899b87cafc6648d40b51ae750b277d855ff7d3b1dfdf8adfcf9
-
SSDEEP
96:uzVs+ux7160LLY1k9o84d12ef7CSTUjGT/kdKtpnVElVHcEZ7ru7f:csz7160AYS/WKnKPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B4E54EA1-5DA0-11EF-B467-D2C9064578DD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000ad24e4bef2492dcff26cc89a7edd95cccf64235425be78ab87207e1a787da7e1000000000e80000000020000200000009afba04b505621463f8df6c9c9ca4d130b801bd3ac76104e70a04de596492a1f200000002b4f191cd45cf5b623571a36974630f41b4e752b8d6746853d3153b4a16eeb0d400000005b777dd2059bd8a2b7b3c3b99959fdb8b280eafec1e4779ea5bdda9f20726d8993c96fc98c95ba7c8bd8a4059d799bb178062f1b8c149c6f59bc79e505c9cc3a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b07ebf8badf1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430174896" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2568 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2568 iexplore.exe 2568 iexplore.exe 1412 IEXPLORE.EXE 1412 IEXPLORE.EXE 1412 IEXPLORE.EXE 1412 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2568 wrote to memory of 1412 2568 iexplore.exe 30 PID 2568 wrote to memory of 1412 2568 iexplore.exe 30 PID 2568 wrote to memory of 1412 2568 iexplore.exe 30 PID 2568 wrote to memory of 1412 2568 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a81ae209924ec6349756593513240adf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2568 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf2253c165c03c00f540a7e89273b0c4
SHA1b7b74d1e673a3b27d77ce248b55e6e25fc80b53e
SHA25674d6b9a0e7d461060d3fbccd4933a66f491edcf14aab7516a9331e7961172fc5
SHA512ba63b1626b232b699f58dcb4158dbce53832e41625e4cc7b682f81f0a878413657cedfadb0338f4316a786307188073f502fe656fbeed30d9baa3da62b325652
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a32522bef9161ca4f317102ae3d9fb7c
SHA1db4b785af5ed2b2fb0c2c065a0c0abc4473eba17
SHA2569dbdd9071412248ebd9ff35b6db9ace5d33421bcd47e8e750126a577da4581d8
SHA512582d35beedd719398aca97aa37e7164a8ddb3268a2023f93a6c44d30b53a17b196c154d0674315f2053c234f5af33c33f9b5bf04e4bca800857b5a72232d95ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522ee7f441c94d3d48612a2e3c888f084
SHA18db25d29d920720bec08a73cd2f1998735922a90
SHA256574fc7a9cc5082601b892c62e6767cb6e4997f8218f22406b35c4ba3ef1762f1
SHA512652364055a3719dd3e81ab2487b0391b4f3db228d5ca8821e34d385c07d7cfa553f0ee756d5d1024b66bf2d846a17d4a28af8aabda30683b9951feb87f75260e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584ca0503c2637f114fbb29dfe4f59fa8
SHA1196285fdebf49d640a562a56e977dd4f630c10c5
SHA256fdf46d0bb540215d542868e4677a0c31141788ee8867eb5b2b01174844314644
SHA5122d48e85e25a5adde40a0b5cb8f3ab17d7a17ede862a77c8857ea394379aad38c927ae4fee67802d12c42f1eedaff133db9ec4c4bf5d20e7a2056223ddc8bb516
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c8b43b728fe9daac8e9c4dd858bf915
SHA174cca52695d930f8051927c3fe0a90edd519c965
SHA256af0f53a81e017e79c61a831720492097074444ff2387006b6361162437c5da5c
SHA5122307d293934848e83f0113f43479b6f4b6b89556965ef359247762cba1dbce1167a0a6774365f5ae25c923c356b8996a4a02d44976c686b0cbfc2eacfb0e2cc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f47e239064ca6bce2c8f349bfcdbb0d
SHA1a0731f0714b982afb2416f0860897b8c3b05708f
SHA25677c485fd53e58788685711634ef32514545cdc5735e5543394ee839df1caa6fa
SHA512f0f16db3f4e5b726aa520ff2c0ca8aa091507b70ad72708f838e1090b34ee342a82dfaae51b64a9e16596ced1ad0ef3f6d0ece0d5a99f346841d33df37cee097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ada71920292a2ece599859ea11497a8
SHA18ac6d6752e7d1c3ee04ebf4d346b1eb3264b3ee6
SHA25633c670cb968cb244f5110b7647b81ecf6d742f01c264efa22339911617b441b6
SHA512f72207e1320266f6a205484f6c2576a471cc9b98b022eeaedd564b5c07bf3410ac36abae09b820603b3f50d7af2a93c8265ef648ab7ca2469035e7f0adcafc01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526cb398aba111cfd4754cb8dff8e10e6
SHA1eafb3a5ac3cb0efc0be54c6789e04c64a3ab6bac
SHA256752a6a3ce965f0f0eaffe56898ba00b25de5f196710c9c729b8db669c1b1360d
SHA51202a37b812a68912e92934bee93af87c52c1e13262c41bde2201e31ce4f8c08cbf88d5f148038d685285455a6c7cf1b9607f6bebe8e96b6a5ed4de0c577143baa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516cd4409d4e046f5d1fbffe1f2ed1448
SHA1165f8f2bfc247c58550d4fddb3b915c3a509a263
SHA256b426416ab6b955fe2b588a9c756c1ff6525f0aecd6711b514d95f2482fbde119
SHA512304ede2f8e04d5b8d27019489f6358b5e09c6dfd1a6bc2617f738a26729f691e67ae2e24f20cd9a316fd85776cc57eaf478f7dd76fba77b5e5bf9f540ec84d4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58971b516dc58fe0f3d21e36606f12009
SHA17617efa5c0bf57632799dc3312f30e3e5acb57c6
SHA256a82e6e050b215f2557a1a20aff73339e93d098a488773a8979d58bb10385fb50
SHA512ce62bf9ffdd733bdda6471baf5359194a8db903700aa53e8eee67d4fe141ff3e1d50b0a0e868970afe3a903eab34a95fcd17eafbb207e70c8107191af698c1ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca8e1929b580c9a264122befe6fab19e
SHA13efdfb7c4d434c63fd679efc4f6a2269f13cf9f8
SHA256d34a7a5fd2968230c7f313d707943fe31c907eaf879779fc39e67b0810d7a46c
SHA512586caa08b6dbfc724014f5562a12c9752ab78454fbfdd7b267c617929d3d0c6469cf802b54186e473f478c4ba552306cb73b47d56198728c6b565e8dc726042e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5035f0af4d723096ce9acb896f9ca1a0f
SHA172f6a1fa0f3287b3de57d3170ec210ad9d41619a
SHA256451559114ad34cf18f3a682af49ec32291f7c41e38764e7da2835bac8da1ab58
SHA512d8854756be1c4dc181514ea80e39187e45bb490e7beadd75de348f35b2ba38df206ec932e7fca3defc57ef7dfe5303bf44bb627cffbd3b5654fd8c3736af374a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5527b74906436262271c73f5a1b53c88b
SHA155f09dcf61afbfe6c2b4705698ed74a134c677ab
SHA256b8d99e2ce65dfe85d30d292327f66975d5fe3944123a1161247a3caa637e6e6c
SHA512fcae8a52058f8a96ff07dcb76f25a111280e6966b2efee7db87a2bab19df9d1f474a2ea14b4d54f4c52a72a5bfbf4be002d498ed9fab6de3ca88120f2b9f8c95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585972464c2f4fd1008da18fdf5af6fd4
SHA148b4346b03508577944d85950c88b5f3bec16633
SHA256995132e33aabbd1d745465828f2432a73d552d690ff7b1419e1b4f1b1e395cd9
SHA5127f8131487c179099256a43612881f8b7307cb4c8a2effe43ec4a390b7ed18aae74b63e031da76daf9fc4562043a18a62b76d7977f12326fb51abfc87b06ae854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da90c9f584ec2216181fccaaab71b9d4
SHA1dc885783e02df32ae286f9d44e30629676e64b00
SHA25644af622c715be09499b497bd97bae465389a2743f6e1d55698ec728b36e77488
SHA5121ac6bd3dd6464bfdbe1b6a155812da578189eed1bccd3595e52ea7797145c4bb6411ed86196d312b95f0b6df30a57f8420f31aacfdaa771a820f1dc209ce7bb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549e681f1e6ada013b344045f18bbf6a3
SHA18129aac6671c496f3d2df28d90c8690430905ccc
SHA25605f930cd411aff76130022d479cc9da152e03128692f08e0b69f5c8ea2011c9e
SHA5120982f9cd164345489afec58600d8ffe53bf0042cd251a30f67ac205fc13f97315c9ea51484253865f9007567cf201f6b7dccc2cd5067c7b6f786d02e5dc60b9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573f4c9072412d11bac1a87b782b261c3
SHA1a225f16db6557f8beff9dcc6e6a450f20bbbbe0d
SHA256abf715e9a26163abc235923a451f583a56d991a076a9d8666a63a9539fec1020
SHA51227ce051540c826f312a0c0b431e859c5c4edbfe92def49967b03b54ca1b546bda2b8527e129e41cd074df8d97b07d45164a1aaf5de4c5c89db1a1240b01a79db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0589e19925138240bfecff03cc8eb1e
SHA1f15d5258cc583195019c293393ad7a50ffb71b75
SHA25655ecc5109e574eaa8f92e6edc529bc054af74b544ebdf0e49fbfb15e67b085f3
SHA5120e515d93428f0e7f2fac74330b0e90517837b2b0df8b0db2a738fc1f9ac26ab90c911f7180775fa953b028b6e6e238b497bc0f380c34ca8529f800c087ff366b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515fbf47eceb7ff4cfdcddb229b76b585
SHA18b036f6c83c5f7a9bf6bde6fa3276a219bd4f544
SHA25606c6508bcc49ad8c789f6949f4d561ab1272c2633a7edb15c853b54873ef508f
SHA5124622211158ce2b08bc360ef763d09310ef6ce2d193577760fcaad322cff6c17bac259f378b79d3e74432d5aad800582824e24ccb2085885e7d03ac9530a4e051
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b