Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 08:12
Static task
static1
Behavioral task
behavioral1
Sample
aa3e26efcb1814f5842fa9462f579216_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aa3e26efcb1814f5842fa9462f579216_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
aa3e26efcb1814f5842fa9462f579216_JaffaCakes118.html
-
Size
191KB
-
MD5
aa3e26efcb1814f5842fa9462f579216
-
SHA1
b78166e20173fc6687c391ac430d5d2ba3c61bfd
-
SHA256
2ecb05093fe5b171f96e200590c50a2cd8fb0dd71423679a528f090d197406c5
-
SHA512
edfdf95f1d3abcecfb11a7c240faccdfdffb0b1dfb41a21b9d774b0e57da154d1f5c3c5a3fc7c8f0dc70d868d15e5d882485163a68568ec5221e4d078367ec7c
-
SSDEEP
3072:SpR6pyfkMY+BES09JXAnyrZalI+Y6XXI6EyA8:SpR6MsMYod+X3oI+YS1tA8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CE24B381-5E02-11EF-ACC7-DA2B18D38280} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000852f7ede6b5d96475e56ac9129e2682e27ff371d02422776d125ace8254f2a91000000000e800000000200002000000033e6e807ade1fe9c2975736ce6596368d507b53cf2fec616413130696d1fcc8220000000e4afa091c473e7d6952a2d4f39b3c1c85e978f7453c34be3a7ba4f26db074ef640000000c39f8869c2ac129e8d8cbe7a0f211344a6781e8d5b0b1e4907ad98eb0776a533212c583bf9c58a5fcaddc16d29f76da6b11e9352bb5eab445b5f1c73d2d5121a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430217028" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90bea8a20ff2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2488 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2488 iexplore.exe 2488 iexplore.exe 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2012 2488 iexplore.exe 30 PID 2488 wrote to memory of 2012 2488 iexplore.exe 30 PID 2488 wrote to memory of 2012 2488 iexplore.exe 30 PID 2488 wrote to memory of 2012 2488 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aa3e26efcb1814f5842fa9462f579216_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b3bf7c25372303aa1b8604c43011417
SHA1fc6fd02aa02fea3c1c95edc9f4bcf0eeb49f8a86
SHA256f777ebdb80341e09bace5d9f39b79cfc4c1e2725cb5521e18e7475eee2cd7a15
SHA5122acb130ac2cc88d4f2dfc58fc333033ba3fec1eebf1218ba7ec272578ed1bce3fdadd4e43816844fbacce0c9f2525883874183746faa84f1fe42e79a144ece0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2f778109754465a2bf240b8af4a046e
SHA1bd6f818e9e09a99a2c47f122335f1ddaf1173473
SHA256c67fcc640229a69162e947fd30ed1ecb49fc16cdea1110991360364987d402d6
SHA512b372ea32ad56333e48281af3008df0301df3c935db72cacdcb15c84b59ecf4f45f4a827bb4c5c25eac55e2e8810beecf9badeb870b79c69299a7485520b31ce2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a50c15ffd362536218452bfa3cd1f25
SHA15d7de1fce487fe0ec436f559ef1c4758b15c1e78
SHA256a67bae679727a8f02ab1a49f2823ba484cc1ca9f6a39aa70cdaa7852483b50fd
SHA512951fb415af70e2d8e3859cba8c2e9952298274fbc717b3d772fc9b42bcd7c71a3f0930060c49f08fd4b7e5bd9393347199dcba091d53752e19ed4c46edd8cd45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ea37c3ba57f11792108c8d941eb02c8
SHA19d9982dd4ac785602d4bbd76e2b0ff54c3b98049
SHA2569f11f63ec692641fea53917797610c53f82c83969ede7b72659c6a2fa03aa66f
SHA51267266822b19adb7f8cf1c4346f9c6d9fa91d13deca1af434c64f312c79ab5814d5aad48f7e7df8d9bef7d639b356888a478e15565735f9aefc64acb3cae7e087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebaa99087ed6f8c851b1e86142d6eb61
SHA16dc7e4b5cef793d2c6539c23fc034cce97da1d62
SHA2560ae8803449a088c05903051f76db8b35e6f27f26b0a91aa825a3eb773d67e328
SHA512824954d376c12c0d46add89877495b60f35cf93a996b06fa749a685000053bc92228b0750eb170c5933dc95dbc009baab8e8da2f1581474ec2185492efb756da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcf44e8314fb119ea822eb4a41b7f821
SHA1d45312665948ebef913578fabfeb3d8ebdfd10c7
SHA25665ddc201318766efe5e8264618aabab8a2c4c2d32d9de959364cbeebea6a32da
SHA51295200fc738474fec4b7cfa51f547e8e8173b94f880c540e1b5df7a39cd9d5586da01f75d3d9d9e16f044ee2b1dcd3d45032d62e9edf671ea5cb8102c45652e21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea23b55122137250fe4a69c0349438e4
SHA1bdd306d1d9ffa76cd7fdd639ba2d592d70730e23
SHA2565ff68ea7c006f138446bb9c729eb04c04bbf627a80fb3cc0affb0d0732e4a6a4
SHA5123df4a618853e2e9e11fe085ba2392749a6ba5e3f664786b5c970f70d7da5ca17ca59e71d1e6be50da21ace30cc6fed96af7d034f40fc1cf6bde27be61a039a9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efe582662011f5aa193b59b09ce93fb3
SHA16c3d2d1b2730f6cced1ae776d777bf608614670c
SHA256b53663b400cf3a88f54a7240686c119bc728e8eb36d48166eebfbc57d773a7fd
SHA5124bbbaefaa80b2bce9ee2fbe0f91e71547aa8ee0563ffe501b44bc9a740172676c68b83be852a76344ea57921032a71a7f463870cff284b40c6e76903ae9c1c64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebc4846bd0631db84c882dbd49fbb165
SHA1704b79597f47e2f5b64b3e0d2bfedbedc9fe61a6
SHA256167de35eb048676b39886303916fd4e8c36a803e9d68606d50ac0fde411ecfb4
SHA5122c59151442776458b6839fb735d1bcf060ebdab7bd8126842b5e32ec3124e9d39555eae8e3e87402a3ef1efd58db29aba0b819033559a2b96d8d382a6cf1af08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572835710ec7cdf53f82815a160371dec
SHA18840840d3b91c8fbf8c7cf139874bea3efd10f3a
SHA2563400f71f9ff0b0451fe42825d3e29061b4ac54e357496d5acc3d9ce1b4d63269
SHA512c4978b045bc288bb899828c6449a2c0e77167cec6f19655ca18d00cd4739c7a48510132cd287837cb5b2f89106098724b8672ee3a623d7ba3adbe5d2dce63844
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caa6849e98533b108e3d3ae26b6ea666
SHA1b0b43ef317b49945fa27747fd05798f28085eea4
SHA256fae7343f82d62e45d015ae2914c7a8aad5806a14242dd02d51242ca3ec726f47
SHA512111cca88e072580f2bfca6f27134e81075c397ce74ab3b00bf272bfa3f88440178548ef519dc4899224c4431b5e3370f8078771ea06f0557e9f1febe78bb1213
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528b946b4f9762c492ae196a1da2f9500
SHA1c39828a1d598ec1d9acdf831eef7da6332f9f5e3
SHA256276a89360d6ab98080b560ee6b6e2d4166ca87b1b311028ed37ccf8d77a9a1c8
SHA512327ab5cb395fb0579a4b41a5f15a70fa55ac25904af3f4c9f31d3aabdbb7ba1cd28e1fcfaced45db15552a8772512bfd4245579a850104449369ee309f514882
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e3225e05fe9244b60608c739fb3c3c9
SHA1421d64e730703e849799c5947b3057c2f09d0821
SHA256b401c99ba50ba324e9f183840ac25a7e0a75bf13d9a87377586a8fca23bedab2
SHA512ad4eabe61557d83b6e0f7e2170e0a0eb13f83a23aec2cb5f9ba8116a309af767a97a4a861d5b2df0d4604c5872ab58aa6088b0737425417e2c98cf25baa5cd2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3fbefb3230a86bcab2679980647bc87
SHA13907871e0a109da4918f46ff199c57d8b25aa07e
SHA25631b9c2285d0582c9d6acf18c52191d444df71ddc90b32aa11ded29b66e1900b9
SHA512cffd6f2fe5df3902fe35f6c31fbd55475366e2fcba0b774234c2fcb1e8782957692e3b6d5c4145c68dd14cb7b1597ea184b3e70b3654be2112899f240738f57e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b38ae0ea10729d3c1b687de20571b0a3
SHA1842d34e657340d92d169ffcf3c39f91705b4cba3
SHA256b46f181ddb3e558f6d7d5a797f3805795fbbee505726331474c98997d0fc3fe0
SHA512fcdcbab72a457976acd94189bf5ad0708623fccc65a3d9369673217df6c9fa936de5571c15b1a6125b7b729f5cd782e162205c62e8c25f843f8a7254f742e98c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efece6e932376b21480920979e40b177
SHA15e42c97702c762030369a9881273598b172d5e38
SHA25692d9a57a7be9199e05e15fb640f181e81fcae4384de7c67dab2bbad512204100
SHA512eec60de0c5a7a4bfe8f2cfeec7f8360f503d3ff94d3b1dc9dbc33e8828666b62ac2c9acada0e4bbeb8b18096188fa9fd656813cb2a536a248bb49f26b1e56973
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbb7849c32d56a7091a5172cc889607d
SHA173bb5b8e3dbb6ede48a1b5f54b6f93a3e09b8067
SHA256261cd2c0b9f27df39915aa789a9e210807087577cffd5b6f720df82e263aa2ff
SHA5127cb8331d468ca9d95010ede2d1f220212b1e5f575680ec2a286cc85b24e2290c58a068d943a49bd1f76f7e2e8d5114e297f5ae62c708169c262ca3e702c75471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537489a45c6b77618e9043a5084bd8194
SHA1b782b4c6b511eaf3fd1c726621667a53f9ae2e0c
SHA256e5689ac23567d8c36d31fe39add3794314af3c6b63269b4b617c6dd31e7dc863
SHA512883cb76428fe77f487fa8fbb37d81185a8b7b05b6e6bd3372e2a03800ff294401b55ca35702b9036391556dadb45c0b6c4c38d1a934bbd33376570cc8f76509a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf2d2ab5a02aaaef18a09ce4461c60e9
SHA1ac36b21e7210cf14e0ec9491f8718f5aeec9999f
SHA25628c7a21da8517a3a4ca462241a741bb031b8904dcdefefbfdb08c177c77d301b
SHA512dd42e418e819591f44168b0e8919e3e17bf22d293f474394ed8d5574d5c9c209b8de81483831721d76a88e34dcbf6a9e403c976d75b0aec7bda4702a46477cc9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b