Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 11:33
Static task
static1
Behavioral task
behavioral1
Sample
aad8604eec259a81e996a700f1cf6281_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
aad8604eec259a81e996a700f1cf6281_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
aad8604eec259a81e996a700f1cf6281_JaffaCakes118.html
-
Size
1KB
-
MD5
aad8604eec259a81e996a700f1cf6281
-
SHA1
8cfca36c0229b3b4120f7c22572a006af88171f9
-
SHA256
52a1a3cafbc327a5f26a382bf6efa3d2479d31ad9afdf5b45dee491ca1dc9a13
-
SHA512
63a4333d8fb39a553acff6a04fdd2a9d6f968bc13fb3ab47a5f49c9e6b60595c6b684643818cfefbc81d8d30ed3a4983d43ae2086b8f7b62290d7a88c3615c88
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000001385b8b7472e1b2d62ab74e8a474f0f859ed9dacb4104f67e5ecb1dcb915606b000000000e8000000002000020000000aff12af71a0d3ae6beb6fa878d0f06ca9aabfddfd30d174222057455902647c720000000a966816881a25fd6d30f9da8bc093b0a2368bef9da50af256a467768555a9fe54000000081c0862bd61fe46d39e50b4f8c3eca6245162910f6bf6754d9a52e49782a201031771ae1380e23721a97790d2e6ca4051b01b211417f2c1f36ecc3a7307a9655 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D72310A1-5E1E-11EF-B5D6-4625F4E6DDF6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f01acaad2bf2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430229070" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2292 iexplore.exe 2292 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2392 2292 iexplore.exe 28 PID 2292 wrote to memory of 2392 2292 iexplore.exe 28 PID 2292 wrote to memory of 2392 2292 iexplore.exe 28 PID 2292 wrote to memory of 2392 2292 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aad8604eec259a81e996a700f1cf6281_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c91fdeea8dbeaec6c9eb2452b762789
SHA16fe2ae4592a20e42286c900b1d3270dbff0e40ec
SHA25627bcb6098544ee2160892212e33ba5d862ab45cef91c80e16e695831a94b0150
SHA5129cf29436a06cc2221ce9005145e3aa67dd9568eae8551325ddf29275da2f3cb1159446e579fad8daaa499eb554e186b2d1a427bddcb3e0ad3c8206a3502ad4a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5303f09a114c233499de712b93eebde2c
SHA1785a4c1d17f2365aa05ea124fde9c7facfa3b093
SHA2563c223ac59edff7a0cb78614c4fc9846bf86fa8621887bbc06cb34619de3d02f5
SHA51240bd2cff3199a3f67c1deb75876540664b5b41c1ecaf08cd09f6e79c49ff71ca6cb54770b0e8bc4a554721f89867b4fe64cc66b978e7b3a4efccbd6bfbf102cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b79dec59219fb8ccfa92519dd4d65c21
SHA114ee96f282ab5cc7966b8affa5adfadcaa02de51
SHA256922b56c304e5dee4efa5006eda200ea091eb42fd4ac3aa8a5ee93daa53dd7c48
SHA512fa215cbbe3c23df618b950f27062c0f9bef263b2d51050936d82ef45332af52e6cab4d933aeaa77b4d5732e4f042ba23c9dedb3a3f29de2bba21e9b08f75d7b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5349ca7399759609275e966d638528542
SHA1473b0169462860b95c07ba441f7ff44dd56e3f7d
SHA256e9724659cefb1db9ce699420daf89d7f187ef1b9f50c74b2172942503e2478c8
SHA512e058981e5c3c853f15245617f5229ca3aeb7f8feb1443129d5b2fbecedd0c3b414c687638bb6a40e3b8f3579530d219aacba7ab6fa6547306b1534051443d6c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1907ee463f1470f6564891b40f76053
SHA130a1d9d2b0b3a8f4f0f63108d81620826e4d9600
SHA256bb71c941a115b3bae389141c26638618dbcd9f225ef104374fc991c1731e1fb8
SHA512fac4e5a35be9f964c09725eef2cd7ac29f0614442825178a41c2d5a21ae8f8fc827837078ff500aef042a67443fc22d392c66aa7a3d2558d37abe9be8dba7a60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5643e604dd59c33bb2e04f5218a700e47
SHA1f4a059875d0dd33beea3bdfe3ce6b8b2bb4a95a0
SHA25693778e7ff21d3425f0b6db3556e3f1e9b73376fd2659a5dcbacee6ae2c43311b
SHA5121f16aa6ced0ebf2e26533a0ae1849b3806c239ae184c80a68098ad972000587647456c3f7c4f3a6acbf26bfd2d3f57724c3405c738c872951b60d8ceedcda57e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac834432b6b100d6afc9ad28e57800e1
SHA1a9fe578171b6dce0197ef7729c394b5f774e5002
SHA25651b495400fc000f9204a7868051675a73b3b1db7afa5631fa4c98a44768ee7e8
SHA512371c2fa302626541009842c65248681147111ad56edc0de4fc72cc3ef3351d86f5144d9a997775ab204036662feb5222e02a18e870761ea730dfc790148e0858
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59de8ea99252f9af7e4af7a02a384592c
SHA11ee2cf3e1e830e4250a76d4761e5e8e04fb7ed35
SHA256522819c9e8724a0050253dcab584f597165e108fddf495243f8c769e2fc7d772
SHA512317e06069b7a35705dca025b62bf51118509121983b70c0f3066a7280259a4486e5dc64092fae3063cb72d069529e205b9950abcdc996d62de3b43b6d519c449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a97a2a5fbf75b38324e930d5f37d476
SHA106fbf71c6f3c4fd10702bed20f2512324d9bb5f2
SHA2561fcae3c319be5e5fab32584797b65e1d85802d31b49ad49a32956ee38574ae4d
SHA512f18550bae3dac6a3ae23ec6f0a5c81c71660b644229b5cff2e2ccfc5098f40ee027c8a2c2945bb4e928dfe8ad32caff331fd828df4206bf4c7ce013ca91ebf8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b9515d13826864610bf53ec8fb9a668
SHA1d92742aec540302a32502564fb962012e25e0ed3
SHA25615263a8317b311121c14c93419c507dd85d529511c3fa3339e2aa98c2bd18bce
SHA5124270e3f4b7100c2559d6fe1f52c127ed383523f238120a83870e26f96f626a5eb9a87c5158e9898cfe34b9aa36f72fce03c091321efe7874f740b6def47804dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550d57ff67cf1c255c7873f54b0a4f4b8
SHA1dc2e7fdd080f90d3da5fc9501ab5fb609562732a
SHA256b21a04cffbd38a42d7435ff2b7dfa6744ef3a59a4b4a7364289562d4d52fb3e0
SHA512f640aa22ee76b54abf375164853f79d9b6614fa57d27d0b2a962e8af5ae44b0d1ae2ea22913c813ff33c1ef1e2f1515d1c624d935c943b3d63faa68c3b421957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535a53fd150a635cbd8a7d16c665b057e
SHA1ba968a90a3f7fb3ad3a01972bec42395a8e757ec
SHA25666b27042ae779717c893564668110035bee9d87cc146513776da9d408b7dc75d
SHA512c17778db97847d0c4cb715420774e7f7320c1040628fe506905a1a9c16b875cf80403964a1e97ff7409340737586ae2c125b71928c89bb5bc709e002eed85509
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b31082f68db71e22b9f99718e0a77cae
SHA129f983d13def56fa3e1749e6f1cb95cf3b3b6edd
SHA25645c9af6901ab74e148b22ce2979ccb3c78ff4914509185b7b69ced9450b4a983
SHA51274a64a5faf948ec3f8463b6d24d129feaa4ca31ee40ac7de7ea29fa60dea193ffeea97d15193d7ac8af200ad9e49befb35908f72000bfee651b68c7792bfcfbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543004ed8be2bbbb814d2b71e87a16e05
SHA1f513b108e4aade08b71e52e17068229ded4171c5
SHA256cc8e00c25018824e93261d47025b2643de41cb5276a8ee0ac1faa3f6dd5b0b2e
SHA512a135159f45190e7802bc77551a072698f8f0c1a2cb2fea8350ae91e4c24df08c947d9f776f36c4fd9710a2f777a4aef494fcd5cd97858eb4c490a78c8eff9040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567f7f3430be6d266fa4d2172428ea321
SHA11fddb491cd1a96f685048c3e09f61a26308e4b13
SHA2565ce31416f0e21e53339b43bca91f73bf58429d7dc8a771e372f0e4a4cd86d2be
SHA51272e296f9ba20e8e53753f876edda0afc90def85fdbfa6d0f8425bcf5dc02758279bff26d011866ab551f6228de43f422e734d01f297f07be6cfb7ee9550fee84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53904c17e667dbbdfc62c60cea2365859
SHA11d620d89501edbb2e8cee1c5f75330a298b59f4c
SHA2561876974cdd9469b529a2b94f9fc4b2d1971f9fcc5d502860846bd1bdf8ce0a26
SHA512c3935794d4f4cffa270bf67ea29e8efeefcedbca6b4a672bde7e59d92883b72a809c3462bd7e50dd4ace4b7d7d676bb6984521b612acbe2c948f5a3c274475d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee5e6df4cad2061209cf483416037cda
SHA10366a33f87f3b7ce2380fef1ee07a53d634e8fa6
SHA2561e6499fedf204fa2ef44f21e2979bc5b20a8454d6934804817dc5ddcc4edd381
SHA512b12907479dca636ef7507dadc4e642afc655edb34a243cf9e618d3bca916be2ef4266997fb64e299147dd2133bd16ef6538d6a61ec5f1f004caa4162ecfe3e73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3781d86a1244d72c33e6384032319c7
SHA1e1d4a2f98193cddf57635ea775317042a20c0024
SHA256a49b07ac9e160e251f2e7df11033ea06e13583962073cf3b472d4cbf771571d5
SHA512b488ee1c10c9f9cce3cfda499cbf2215f0118f5de6533a932751e2d64c6815236e1a6207d1804d939c8852562ae0f8d6ec0c8d5178b2d8b85be84ead2e284dc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55734718007b561b6fad14364a54863d5
SHA12b737b7768368a292c4770f5681253db2b999be6
SHA256da03a6de88b7ae8a52fcf9b741fb424a55ac07eb94824c84f34f7cc70e1c793c
SHA5129ef4a15b17813dabe04f9f1d95ee8a969c5259bd1253f477d0cda8f32256eab80dae94c99515f7e6567e0ef65bce98b7da1e10797b4f9088d6944336a91182f0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b