Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 03:19
Static task
static1
Behavioral task
behavioral1
Sample
a9600e9fdada070bb0aeab8d44b0ea51_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a9600e9fdada070bb0aeab8d44b0ea51_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a9600e9fdada070bb0aeab8d44b0ea51_JaffaCakes118.html
-
Size
1KB
-
MD5
a9600e9fdada070bb0aeab8d44b0ea51
-
SHA1
a48f515985cb89c9e6387a16b9dd1d5d9b03ccb8
-
SHA256
147a2125c90c31eff4ed911e1267f6c91b2d84b8ecdd052f7888c93f36af20e3
-
SHA512
6434005aab65b6406d0a6fde16480a154b58300df923bb753b82d8c57707298ce237454796360cb1ef5ec0d07bf25990070a6588e2844be9a858324f2132c77e
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0427ea8e6f1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D2817A91-5DD9-11EF-9637-66F7CEAD1BEF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000d6156d3402055145ef93451cc442858436af7be097b01314703dc89a401f9f67000000000e8000000002000020000000ca7f3b18ed17de381782387f3fbafacc7494f8b87fd3fad2d4d779be419397c120000000a2630ae0bb045f0033962beb994708e24ec5fa42aef49a62610b5e6a46fa7f3640000000eab19caeb2f2ffd97244dd534bef113bc741549fcbb4e027180b6aca34b71260c0203d6c21eb69033b528e78a6727ac4291982c95d3169652b91e1586b51bf3d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430199427" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2680 iexplore.exe 2680 iexplore.exe 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE 2496 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2496 2680 iexplore.exe 30 PID 2680 wrote to memory of 2496 2680 iexplore.exe 30 PID 2680 wrote to memory of 2496 2680 iexplore.exe 30 PID 2680 wrote to memory of 2496 2680 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a9600e9fdada070bb0aeab8d44b0ea51_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2680 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5045c846a44cd6bd0c126f3002b2e690d
SHA13d19cab8c50d1a2f4d25053a602654adc10dbad7
SHA256105b0107da818ccc283ff804808c205651fad8768eefa549cccc5631462d53de
SHA5125b516bc9ba36e719c2e6acfa1df8b549b85a013b6188d6751353579e269613b7c7da4070271abdd08bd68b0a1f8a8887e20f5e0eea499c91b491cc7fefe86e33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f26e2cc1a7cec9c2d2b589d8fa8fe2d
SHA1d2ae45d3c8652fb5fdce19302cdd5508037f436f
SHA256c0fcf11305857e461f57b1f22759a5314b468a7d8f23cd6ccae86fead0055493
SHA5129e680261391d1e9c65b584a0c48ddef472233cb1ac0e06549747b7f9327c1c2bdda032973c14075fd12f757da1e5d85da6cc75060823af417284d7b6ed0c3792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ee0fc91bab63e13fe8a5843b4528ec2
SHA12ecc589bd154ec0b3db678cfb88581c336e12f06
SHA2564961861a3abc406e93f4efcd0dc8c92c7d3a3d8b35b8f5718dbcb987bc36ad77
SHA512d7b7feb4f0450fab6b07c0618491bfe60f033bdf723821f3f38ec6dfff784233e9b00968378a6220afe03a2ea5b9a0ab46f9851ac19ffccfa193011264a4bf75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9766a9b7aa83e5b5309491c17bf18e9
SHA17f600c3fabf5f277d24467d575eef50a3d368f7e
SHA25618c57bba3b73c1ede6eea338c44df42665e458e94d84c93f5964a0423795fbbb
SHA512061630575b646d2085b0a902c849f30acbd3dad58c857273e4131edf84d8a82314ce10e1d7c69782252a92d6086384d6b145ef0d45a4fbb70ed7bee331f1aed4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efa681d0badf0fd36bdcb64d06551597
SHA19720a8e57bb92f9b4ae2916526272ea10f32031d
SHA2565e020c1e0ec5ba35c228f099c66952c5279837b71200191612d262909bfe6eef
SHA512566201e7c710410488ca9c170a57d3138bc47619530ea94ff28d9d368e152ec0f8e5be52821cc0ecc9162ad1c117021bec317d87f74f49de0a4a4a9fd068cfd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec87f88851d192052e18dcbc84e83fe0
SHA16428b199d83abb928594ba3b1035bf660f11c626
SHA256578e03818afd8bf679d0f2b4f88102813bd8f3f584dd8c76d529431f6f410d14
SHA51204e373530ca7b85b53637ff817264f3e4987af25210a7e2bf0b24eeda99696c20fe769797f128cc6e41047b5a1dceb6c68bd67ec47e2d3de8c1d9fdb9dd194e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c58fe6991b2ec17eeac4f5c9d7b35142
SHA11732b0162a0bf7b02cee43fa47869249a46f60d0
SHA2564672e4bd8a0af51462e5ae19236d0658f2ba818fabfb627d01b45d75392c9b70
SHA51283d3dc14b99f2dc020e5de95d76a0aba0f45286ee51aefcf72aa9a9ebb922514fd14b69333a321fd2359101315cfe788602e05c343f160239461118f54ce7d5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ae0c1ccce0ccb5257a0d7573ee03bc0
SHA13ca98f6a4c63e1de453936d077288984ae2f2ef7
SHA256d3b4f1693ad8821f9e6d2140a40f632e6a415ad1a2fbaa41d7644a11dfc45436
SHA5125cfd363afe04648ecf48ffbe9e52e0789abf32bf24d23e5d3ff0328623cea094775bd513e2c5b1ae97a39205ba23b8f2aa99bc1a5092a1350a135ed9b923892b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512193cb887ae4127e57ea24089f2d671
SHA1b562d5081c2485e7dc1eb08c5215030e46901da6
SHA256b7830ef781cce78b949291bc2462ec456c5b013129573f5344e5f36e8a32cbc4
SHA5125d82fa482644e0b64d411f966cb1b386be7beb320cc7cd2dc2239802b7db63262dbd44b012c4a93f104d5af5d5ab1cc8a4506e6966ba6e254b321bb9010ce204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56295f72ccbf19e1c303bce33602a233e
SHA174b24fdc59102d422f32ad4ea675aa1bf821710c
SHA256b2127f35b3146b580f38cab37a6f6b854ac52e1977217cff745c4544975a7ae4
SHA512ccb560287205c2fb33568d5d9fddde8dde8593553cebb2f7aea3de3e92acd076ccc1361b52bc0fded98465f59d54ba73ebde1bd09f9867f267115cceeeee5613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1fb654eaa00f1f3bd95a38adcbb7fc3
SHA16d668d643024b1aa370de1b99fe19f6f471cc5ac
SHA256d165428ca1a7cff38348dd768d8ff74a69c501d51df56ffe41aea5168895c2d8
SHA512156be0e2d7beb940d1a7a3a925543168f32081e821737a7a40484f6a0d763e46833fcd97d89e4fe2cbdbb74a86eb6502f044921d572bb61f4c37920ea3a83cb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51755ce780bd1f0b5733599099ec96ce7
SHA1ae9ee92c87219988234fe44c8a9d409f4dad315f
SHA256793a973a11a52e92aea881f482efda78d547f2574999916a729eff73650aad52
SHA51262f6cec2c9c6ac83017870d5dd5f7f9248a6169f322b4f540799aced2fac18efbf582be3dbddcb95d2ef8ab92e21361cd622b82e18d8d025e0e0f59ac731879a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5522e112df05a168c736819dcfd540216
SHA147bf314ac73ae7dc326149bd70986e87087fdb52
SHA256dd9acb28ed60f48f568cbd19419eb446b65d3c463a39e6b39cd906b8dcfcc967
SHA5120cce5a60a34013e32c0688bbea4113c0a356031d77f3ca35573be04ec86399667f1c020f227b929355f93177b020687b501fde9fd0f94db78170f66bd85d4f86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ac4074c97695fb0280cda411ffe8819
SHA14688eeeabdedc30efc134d01d5b2029776ae4f8b
SHA2568a779f725c0d93b97decbdaad6b56a0bf0d554fdd28757c9e0543491c2598d71
SHA5121f4445c43190680849574af60aba0acd3d99a9edcbf7c047306aa49d687c110aa2f23f04d8c0e9efc79d2162ca7c811f42313df858a33bf4e0bb65ed91bf1472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538b26aeaa903aa71c05d932560192deb
SHA124c60f0ac9d9939302791fd2dfd077d89db3a7f7
SHA25625b825cde1bf87f2928f884eb2c74edd6e41c45f57ae5af795c978ad07902c81
SHA5123e888eab3769ca1679f69cb19df3b7aa5e4486aa00849776fd795c6103d65e92417a36f68ef00efe1d11da9ec7413de4407785208e6bd30c31c2b03f73ca8813
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c65d07c9591570d66c8c57ff0169f9e4
SHA18bd090e1e792e98b6659ee33982caf226bc81f41
SHA256a5ceefa1623a7a569d4f04c8305ada329f6cbc24bc4c6a8190ecc2d950c815c2
SHA5129474834977b17d495ff0662759e124bf2ae294a12bf7fa7a5d7b87bf58cab592a8fa19a5bf13730041190153de09711821f216534cee53d8ee05244864e3c10c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56abfe2c62ba67f444d2cb3b28a4d034d
SHA141ad6f7b5262675ee9933f6707b3ba68618ed1dc
SHA256dfd2bc7c8329e83d04c132f46c4a546f19cf85addbd84e5da42cc96ce35e6bcf
SHA512b9e63955341c373f30bd50e5d9f510f7dd80e3e6a278e01733730b084c465ee1b4cc1468e437f7600c369afe33122210f8f7370da8814dc4bae72030f19365bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d580d7d7c4b5fa5419892ba3ad31af5f
SHA1905c15dfdf01b11b39f459bff5e0d2999a04ac33
SHA2563091459f4e1beb181228dc4c14521f3ba1851bc57bc225f5c754b1e610b2752d
SHA512920f6bb94a794aa06e7c15f651912310011b02d4e384bf1af52dbc248ebb9a2d34bd6e29ecd3a804908ee2f27460e3d408fc94d6da2b415ac007b63e47313040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c391d2bd98a3b7bf627dede8be3907bb
SHA1e26af1c4db45ca89d71b2a499628f60289634781
SHA256a4699d9bb6ee13e36d680d7f91d90de1bfe509877b7d562c0cd5817f64ea617d
SHA51216173cc370b5cb2e8fad8264a4053c9fccbb99768adc53c4602726c32818baa977a4db06c81e02feec5afa87a37ad9dd68c62adffbcf21ea6341312b90657ac7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b