Analysis
-
max time kernel
134s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 12:20
Static task
static1
Behavioral task
behavioral1
Sample
aafeeec680d0ed46b736aa5850ad9e5b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aafeeec680d0ed46b736aa5850ad9e5b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
aafeeec680d0ed46b736aa5850ad9e5b_JaffaCakes118.html
-
Size
120KB
-
MD5
aafeeec680d0ed46b736aa5850ad9e5b
-
SHA1
7a3e1638c407062fc98c141dfb4c59de5c21ab65
-
SHA256
5349843cfac2c4c6b500622c042885ed7f5c3d3f65db142f386a40330742d07c
-
SHA512
b49d2a644621f0a6f4352e79ffbf5e62ac287feed110d431d4e1a900054446cfa5b338471a55b1909f4e7f13064f7284a952d8f6c12a4d398d670fa0d149e5ac
-
SSDEEP
768:Tx+GxQRaVMaZvhZ/gVvuz0cxINXox287a+jwcipfdh4t7voryhwDqfJdF00N:TYiSS//YV9oINYx2wEtYvoryhwmxE0N
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5B6F33B1-5E25-11EF-AB3C-C2666C5B6023} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430231868" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000007f4f58fc9ef1aece9f4878ecb17c6e4cad80f20cb938f5a85961ba2e0ae2cbe8000000000e8000000002000020000000669ce95366c82fdaa34b879488b10795eefe4ad43d1b025027a66834347648c42000000067c7a9c00b650a47690f71d12026419ef81b5a7340048649d0ab1fa1ed566a674000000017cd808c2668b54c854a17f3d85135d306d939f682515f4ab6fd287d47f4b501be4955f6efc0171d627b1d3d94ed1f3834c76a87c25af481107b07c95a77aabe iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 304e6a4d32f2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2944 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2944 iexplore.exe 2944 iexplore.exe 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE 2076 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2944 wrote to memory of 2076 2944 iexplore.exe 30 PID 2944 wrote to memory of 2076 2944 iexplore.exe 30 PID 2944 wrote to memory of 2076 2944 iexplore.exe 30 PID 2944 wrote to memory of 2076 2944 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aafeeec680d0ed46b736aa5850ad9e5b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2944 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec1d84bfc1a62aa2809c3905b3cffa43
SHA16d6e914e7ac529b0f18c7e1b5af4f94b35b6a78b
SHA256d442151b9eb1a55440cbf23427349559c0f9f18fc511f1a02408167521509fa2
SHA51273f094322763d1ea1890c136d3fe5d3a64d67eca02190522f98d78adf583cb4e8f4ccf5a2ab84c5c6d71e30dbc09c6aadeb76a020a6da17fc24a1aec90540edc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf2b8f5d7097aab4ed3f0a3f18a3ccb2
SHA1bbac23aeb9face4a8b085e5799ca41239177cc10
SHA256e6cfd5999cb1a9de33e65567bb7407fc11c6db04a986c8ba8488e101232cfbd4
SHA512568689036eba36805b9fdf8fa9c4f574f1a1444a64186930cfb95f041959f642703d47a6f9041c2cc88e7a99766dd7d7d26cdf7799f83106d4926acdb10c6944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f51a9bd7c573661a205f5bdab9b8dbff
SHA19151d85c08932f977a7ba7ea1e117f50c8f8055f
SHA256238b7ec12d9136030b80174c3d087568cca420657bd84fa32bcfc50634195479
SHA512f655073d43cdf850e373e2e20be59733850947f10274caa0c73661b38e32cc958d2d676946aa023a9140226ac6ce1f6c5ba1ceb7a2e759066967f06352d8b854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55aaf27cedd1d104807cff8ce001fdd22
SHA137458cb8525bb5617f213f2269b12c0b831f1623
SHA256dc687307366aa5d6db901734f605d57993e6d173e22bec4a6fbbe7f7642ba2a8
SHA5125f4543302b7240dd4b7fcf28f7d1189946a70c86cd28fe9e97a57a25288e307fba646e6aed550853698a36b0457e99e72f597ae1895f8ca0631188ed256df95c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c4b8c722d00773f58149878d818a3cf
SHA19a1c0719e98c0501b39d144e812cb6d9661d6b19
SHA256dcc906ebdc5086b8e4fca4c41ac133eea2435e4a83db237303ffaec8b38b8e4b
SHA5120b91d6499c0c4d6d2a6d0950ec7687c14a7ecb4d6eecbeb2fd09d2fd53887e1705c5f48a8d043b8920580556e5137f056d64473681ea172aaac1dd1065352557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c79cfd976bec65ae9db0eeb140f4c0e
SHA11b5df3ac7cc5743d43b3f81a41ba2d3ad2f03f38
SHA256acaaea99b5a1768e8d49dfe4ae5bd172d598befae2a15d765e372943c5a3d657
SHA512daabe892b36f8138fa15d90d01e2930fd52f77cc162185b9b2da37afc3d50ede29b4aed0b0793bf6adcf2b525e8ae22d23caa1d97bebebc3c5cf187ddc58cbfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e60b2a5dbdbb3fa8fd08a30fc145912e
SHA18547204d9ff86b3395ea1a3a44d23cbeb75068a6
SHA2564622b8c8fdb194b02e44cebb5868df35d0b50062511431fba4f6a1cd62194b46
SHA5128481ecd82dab313d82fce4200a0c39198abd435b4d936628fc9a2717593b0167e96efce5f0a150bd7f168fb9b43d11e39637ad1abd6ad01bcfb9bc559357af78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548f6f5335f4b3fb69902e4f99fbe2edd
SHA128a5edfc22ef57bbd4054d101be9000a99b4ee44
SHA2564c6967ff621fcd59dd86a59d110b32e756b432f3696f16ad6b3e7174192e0681
SHA512e7be0e4fd62f33a0c960b9b31310eb8392b157e98ade4f877a498bf515d6d4766a95d1fc60ad341eada485bde1d99995df37bdf6c48c8ef4ecc05eb38044d41f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2a6814c9c34c1be4453503923ea7364
SHA1b8f01416a99277a9aaecbafb83e71e409a81df25
SHA2565bdf661ae685191011a9d2f9023afa1d4004b553cdc290e187343e6f650032b4
SHA512fed7fd213fa8002285839a60bb14e37562eab5386deb17d5bc39fef544b2def084255c56ada87547b2ce6dd717d4a414dd9e3c45050e6f35959f78389b5dcea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512a0e168144b9b149b735c8b3d9d1b04
SHA167456475d74ebef22ef7466ccef2e41ad7b6da83
SHA256753fe69789f6fbb50fea6cae4b8719ba338798dec80809833374360db0189738
SHA512f35f8564686603759a6345c341fe5e97e2c203bff641c2d8f78c149b1620a6df5d837b264d0085c73f38712c00564bc1f6a39808eb733e6327e454324b10a913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591ab8cc98f27dd7ceeb4e692e6ae010c
SHA19a08b434b7ae4450d2d86d8c866a907a3911ecf9
SHA256fb690454b77c7eba700fe16da050668e679796a8ceb976df08b56cafc15d5e3c
SHA5129e1921c11f083bfa9c366440a368b65c161ad830d4fec39276b62808b9bc9b9c5d96bf8edf1b6eafbaebaa4a9e1c9062e6696d3b3f6512b17fac747a81aa562a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbfae427fad4a646aadcd2c1852ebc6b
SHA1d613f5fbc0faf71553c24a078840e248f19b6397
SHA25657b02fa294576cfe9ef22a7fe009149a8cbd3390b44b481e401710614e57a7e1
SHA5129665ff9a95eaad1cb584909977fe92d41f44ad225ff239df20910b1451b5b8e8a99a66c737a82f0a775b1fc1cd67d5e00ef8338da791f6239bfbae70e13bc01c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575e176ced07e11ec69d7493b78a79be8
SHA146eedec6319d9bfe9c7e76e1b9dad4ede2b2a745
SHA2563562af59f864694cf52f8ab6400207c77df1dd0203335dbbd2cee6df7f1ab72a
SHA5120ef4a05eb3b38e3c2efbc4be85214a70e478876666b0e182c5fef0208873fed3817a4c366869fabd145fb3cc996e9b19f2280a2717a59c00c74692eb98b61225
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f803be5fdbd78793cfcb35adebe18db
SHA114cb970fab4dc10411fa8f5443632fc08d055282
SHA25658ad110e0e9d6d23e9bcb8a0a795998fd2b280d00baaa92d1e6ab04573ae5709
SHA512c28a4eca3c1badb5164d6daf0e569aeaca086112170a38f559334c3ecf76af62e582d584a144d5c67398fe6f5ea8dc6a17f0ba383d9e3437e623289fcc240e40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bf9a1bce7dfa0b708f2b060029ba261
SHA103037927694c824d3584614be95321dabb9bd722
SHA256f9efac6a14f6cc4007f698f763e05237ab6bc2da79164a6f736d557bbaf630be
SHA51218df1733d2e21a43613020ce29a74b66d2cd28ad1c90f8bfec38dffa953ba2412763de5ddf3f43ea9156cc87ee8e49e9678e8f7601720b9eec7b8d4a112a6d96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5879b15bf18acc3da3e3f1e6dabc79e4e
SHA11229143cd0423f05e76009994a7ca9f5901f1f26
SHA256357120b65668085cf9aede1c2f5d05851c69735e3565e09339962a5800722e40
SHA512e5fec5aeb0431c34da5df192d15c9ec9fd3a9140038844e6e06b29c5d24ecad2645ecc39eef49a3c49065faa5a8a13c51986e7d66a26148559ce7946b32176ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c2ba9e7588b73636d68503ce38fe4ba
SHA1dda48f94f7c384d96fe34ff887b94a3a8c35dad3
SHA25635664c64e0365d272d74421cc5302ac6c9d416b9e278de03e249eac55dec319c
SHA51211e054e39466f0914829e4e1e168408bdfa80a340f2c7a0740c4b6ea1c4952bf28bf0959f3b55e16770f0e1bc397a65655ceda4c5bbbf6aa148d348fdca400ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586d800849c4ff8ec19dd4c3a1b610643
SHA199135041514813b5538aed41fa7a86b5a1ade879
SHA256ac360d6d06d4073dd2a55a6eda34f22af0eea1dead19c44023822c46391053f7
SHA512d536c05f33f8e68ec26b74293f62bfbffbf342fe643490a45abe34ec40576c3bb11256d46d112fb10f1fe985f88fa3e55cac8985cee10e603b85f3a5ae16fec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5371d78519d7a4c298a6163d011130fdd
SHA19c8d3dcd8f3748e6b3a94d2336f9ce608f185572
SHA2568519dd5727030f33f4d110e2e7a637fdb6a8bf30ca645050caeb7267f5888eba
SHA5126bafbf7a60281ffd4db6a805cc2def89d9bf5f66e087cebef2ed92dc0363fb4646903e6060bd824fc6695fbabdaa33fe89bec229098d2b902b6e5d3e7daf43ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539bfe54c558bc086179d0d6901938948
SHA1b866095e3c2c986bf80f529b76c9aaf2ff6a279f
SHA256deeb004de4fdd02ae4fdbbeedb23c17a983ac9b190e75db158bd19a8e75fa859
SHA51232d368a5d1668a0eba93fcff87aee911200516c2239e5d2a2a59137b582878e5a6c107a4dcbab12c04ef884e8ab7340a751ba214cfd94fe6f4b78e28e7de82fb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b