Analysis
-
max time kernel
66s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 08:01
Static task
static1
Behavioral task
behavioral1
Sample
aa35619638ce698b69fabe53225304ca_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
aa35619638ce698b69fabe53225304ca_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
aa35619638ce698b69fabe53225304ca_JaffaCakes118.html
-
Size
1KB
-
MD5
aa35619638ce698b69fabe53225304ca
-
SHA1
4cd2e0b9425eb0c7cc2cfce81133400de2f654fb
-
SHA256
58190c0ea425d433a65796dda67f6cce35248f51ec1fdff6a498c8b454477a25
-
SHA512
9159e5ee55a48419aa2ffc16c1cf6fda0400dcc08af919f0107ead507bbc2c47c9bc0d29be91d42d29d838c7a4302b59cd97a99e7f5052621d9c0637415bfc78
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430216366" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{42F71CE1-5E01-11EF-B066-DEBA79BDEBEA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30ed89170ef2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c92000000000200000000001066000000010000200000005578ad268028b2137ded7b67c69b4443de57da5a1dd75c8efdb47626a20c818e000000000e8000000002000020000000b3998ac9c12815fd57df506d62cb11499459844a2d6a69367eb4c35bdf5e5b30200000000df1fc720034de20b87f46666cd059d99fa6a8583b5ddc09d80b1acde0694a6b40000000ed70f5abb78dc8510575afaa8e633f6a0b9837c149d68b993c0253f8479acb9ad42ee30054fec406d0a5a72c5d9a5af89129e0bfd2436c444823d597fe5da398 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1692 iexplore.exe 1692 iexplore.exe 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE 2452 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1692 wrote to memory of 2452 1692 iexplore.exe 29 PID 1692 wrote to memory of 2452 1692 iexplore.exe 29 PID 1692 wrote to memory of 2452 1692 iexplore.exe 29 PID 1692 wrote to memory of 2452 1692 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aa35619638ce698b69fabe53225304ca_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1692 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5342172fffb65c7ba18ecd983ad7f7b16
SHA126d3319e63def8f25f1cc5265ae2c87e4a45220f
SHA25656356a6c1055bee2b9864e9cb6de70a3602147f3ccf4c194f6103af9a475c567
SHA512373cd051de002badeae55eea5b35408944050c5b94808bcadf2ed934bb6fc32f6307048f528222749bfc4df2d9423e84506cad4fb79283923efab454c4e20b41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3dafc4a52857edb54e494c529a7dec5
SHA1e666671827240c1b992f89768c504b9e8d8289d3
SHA2562a1e78660d483413172c219e7aabc2b00ddc335d75a3902515e82a64382d9f87
SHA512f345afdace88ce21e43bc0d6b6dc413a529b64126c7ccb7d8284fc28ddcd3ddbf790feee8f9e83d74b09f3da5ecdc6181746bb02704301543305378abcdf3655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5212eb6c0fe6e679ce07812603c0859f7
SHA142993f3eda9df176c635bcc8c47b87a1b838d17c
SHA2561c9335dac39f9139f908718725d0aca50729b6914056c051a87d32fa74d5acab
SHA51202e878e6309b2540e01fe58bfee672275c2585eff1048d61f5f3e4d9434c866de83c5c0bc49dd22249ef505065167c9f011ce9d732aa41a69110362fae853771
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b90cc15001e0dee40b7f0365d0d7f02
SHA1b2d56b4e3bea9bac1858698a99576dbbbc549ae5
SHA256abb68fbb526383d02b5316b2fdac748f876c7c0c81e9c74b39a23a9fc8deda4d
SHA5129221d3dee8572e97a2e80371c1c5364712ae6f15b868106d7d8548cb26b307fc2739f72151f43dd9e9861c46ff1f5b8dfd7ed8535cc76645c390b7c70d044226
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5791f45c8e81d56fa836d45c3f5b2caf4
SHA14ab23384df98dd8633ed6664b23338a2863dce65
SHA256a69e41b433cff866772a2413d3f6f275a9d136ebaab40a91c1225cef4eeec95f
SHA512d4b5087fbc2d2323acf1ebc45ae6f6a7675989bf4cbbb7018f0873f1a64dc6e1ab26beae260096259b717b29f337b83f9692844e07f604cd702798a26eb48596
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce5df1cfe3f3d68e5fb741d29c8aa812
SHA132e22518a404379d765d104e9f14a7dc041be79c
SHA25603b108701658ee5d31e5ad7d1dcb2db07009c9199610a3498cac6f4829203058
SHA5125141d50a2390b1855561f99749f0e96bd12ec3c3b18f9beb9de414d4a07ecdb30d5ce37e4b558ed06225edd569322f317343e9841f5c76157dba68b1093b17a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ced919ca895691129a5ed04feb04178
SHA11066be7906bcef8289333a246d54db1367e8615d
SHA25660fb5ccbf4b89e74c0d690ba0f7f68e03684b21169ad54cf8e7116b927e69771
SHA5125932b6c382ae4839a7713f6630b9c2deb8c525d8eee622a5ce4b4e1cbefda917150e8383ff43a1abd9ac0f48cc8ce2a4540c95eee6d3479aa87de206668ee2a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d499f6d572360e95b2f47d80fd9f5a6e
SHA14ba5243514a07338ae8bb0e890fae0f7fd7d69d0
SHA256e77a1278cb2cbb7547d908edb059043dec019fc8aa8ce0cb3cf706c7b6010a0e
SHA51245e4728e9a6c97f0863f3d94d8d5675ea915fb892d244c6d020c1fba72a9f236b37355a5c111f7daef7b479f9063f130a5a0a123eb14190db9a2b328283abd04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa863e149efaeafd2f0e49bc64eef37b
SHA1905c10da286ac12f9366da422a839ad0033f1638
SHA25681ae27d9725b8c6401d06d7129641922a988cb2b5075a76c6074442e62aff0be
SHA512992d1c725b49879f1c4fd4f9c6877194da312ff5a056947073f41646a49481af52ac65a97d8a9c64ccd721dc2ddee2e75aadcd52354915c8d4dff56768b49717
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e75ed21294b40f359653401e72eb425
SHA1d555a0081168254d3e6a5196ab1e663f7f32ea87
SHA256f073bf613c1e5d2d1c61ff08e834dc657810aea415219c937390b495ae4a01f9
SHA51255633748ef712f17fc26b53a4d5ecf05abe2f347a4b8645040bddab6aca8ee29eaa43a16249691252bbad29def5770698202b98190292de5981cb9425ba66d73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4783beda8901296fe246329cef9c949
SHA17f975c49df6fc1723a744bc2ec359d6308eaed6c
SHA25602f57ba97da080091003c6262ec8fdad21a957fb3eb4027f0611ec55cb4ed642
SHA5128871a063f99217dd9b72a815f175152d57c73baf55f08dd45b29e42a91ed2d1dd933a8f682f2419b8f7378b6cf4c47056ff3d25da98a8bdfcffe1560e7ac361c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aa45cda282e3e3fcb4028a97b5016bc
SHA12811ce225506034296368d26131038ee4e11b8d0
SHA2569a6c7776edb9b7c92c67da698f8732653fe4579c61be724d31179d002c786a7f
SHA51270027fae535af59aae13879745e9f0e9f505f1d473fdbefe03b7c235beb96260dcd9e59f57de4b2239ab4b53be626f000ef0ab969f541eac9a26bf755ef54ae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e690878730742c83433000e6992100f
SHA1d69b514dcadcfaada2d2ce89bf531fc792d71e1f
SHA2565555583783bcf44f35a6d72c6cd220b10653d6535eb571983f3ce2a9ef95a1e3
SHA512d20e92bc0e3e12d71c18d6e3dfbf4f8e73cc5cf94fd2fba45511782b34005351a16ab2a63c1f3d0bf8921625ea392ef69a230d3faa5b270fdd6fe73fbc0dae9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ee69f9295ad5ab24c6c2df7a26b0ebe
SHA13c8498f4210a7a45cf5e34655cf7d652133a9e1f
SHA256f5596ed8433d932198d6e234ba4f54ff8ced16098816b74070b97e4a136d6c13
SHA5124347638b46bb78635a26489ac64b536b122ca58d3ec230af2d0ef330350c100f3ad94b1135ef43f77f20745b73620e9ae293a518c86e318f624d3abc5c1a6c56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584dc37d2260a58f05ea7c2bcfcc5dbe6
SHA1acbe6c85a1e30c24ba02e5936acbde651a638849
SHA2564e3a946a7f7f03d43991e24176fa8dc49e435aa397d513e5a3db4f43b008cb89
SHA512f1b510a45b3c89dccfb7ef39fbb2e101b89f61f1bcffba8f9a32f69a36592d7276e7d1735085cc5da6251f1e3881e270e6e1d3c7e1ca8d49b6879c2aa7d06eff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b34c0a504ee41792009c45d7f3c3acbb
SHA1282927b92ff763f4c1fff0ad9effe3b75ac3a393
SHA256ccf1f656a50d3d1bedf68359abe83270f53dd6fb9d9dc676eb537ab5930d536b
SHA512adc5ccb68052638d8a8a67a4ad3a655a598c78c0eb53122f2db03e390ce0a2c9f526b140acd41b333b7b15cc6b039d633f2db999bbb283b2eecce14ed4122bf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5144161acc43e3b866ffb134b2a91ea74
SHA114d8525c8643a75aea24c0ad28e9eeb2071098dd
SHA25646fc9047ae9e65ab7e6ca8cf269d72a844b97ba5f5b3cf2a247b5f79a6454646
SHA512fa7a0d1b01351303c04152550aeb7ff398b2a49cfa4320bb50c14d4ac85fd0d6bc974a63fbc5a73a9c4feeba57a0a3c417cd729c700677fdac349d824535c655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582ea065ef7f678f249eb54ce6fff3255
SHA1e0ed59768a4de8158ca9fa4d46582eaabbe57521
SHA256723346ccbed9b4b9333d1bbc2aa9fcf0924b64bec9d810200d6c2685f3316804
SHA51275e43f9cc8ab6bef2797601032ea96c845c78027816fd0968f4d4d3607ec2b4664f4de127a0eece5bf8ffab64006e3c6a7e802a24ef04c19b2569c3dc067f68c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3d73b2f4bdb0b83915ae6c288fbdd95
SHA149619edf1e6df09602713ace3df40831f819466b
SHA256774d454ff9a029398bf1f5ea473884f903d32fe45ee72b5b9cbe7bd67149580a
SHA51290aae84e0bb800320b460a6d0f1f65a64dc974e2dc97a16b4580017fee5a2760525f895a223c437e9e9efb441b1a327c06a8d04e952fb4854c0072379d3a8d93
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b