Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 05:22
Static task
static1
Behavioral task
behavioral1
Sample
ae00ef330a4cbb3352e0055b1f0ade0c_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ae00ef330a4cbb3352e0055b1f0ade0c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ae00ef330a4cbb3352e0055b1f0ade0c_JaffaCakes118.html
-
Size
1KB
-
MD5
ae00ef330a4cbb3352e0055b1f0ade0c
-
SHA1
72bec50c9836df50fdf8efe9ba4ec7d392f4b683
-
SHA256
7fc4c7d940ac7fe3afa6f96c5c501b2cc9f56c64405015f3605c8516d96758fd
-
SHA512
9967a49fd45cd50e13782029cace9f6a5e99133e2119299cc31f9a120e465d2e0a5c9aa3792eaea5a4e20a3bcc3e56c3e24d5b858bda29ba475a8dd8478cc7b1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90c1dff7c0f2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{23716161-5EB4-11EF-8470-C2007F0630F3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000cc8caad9565a410abf3fbc61c6d4add7979ce22bd69b66418a946cb9f4851d0a000000000e8000000002000020000000f1221ac7a873c150d975d05033c2712df2bf4425b55fcacd9fdb9226c38a93cb20000000ec2c26c1ceaa7ca2440a219399a4d5956bf9af3a76988e4f67abc5ccb481c47b40000000d8f5153db959f93ce068776fc5d4bce90328ce78a9c8971522465c68ff0ee6df24e486a7d5cbedba2f24278292d053aac9dd8a966a31e987e3fe77481b6f257a iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430293192" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2820 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2820 iexplore.exe 2820 iexplore.exe 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2736 2820 iexplore.exe 30 PID 2820 wrote to memory of 2736 2820 iexplore.exe 30 PID 2820 wrote to memory of 2736 2820 iexplore.exe 30 PID 2820 wrote to memory of 2736 2820 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ae00ef330a4cbb3352e0055b1f0ade0c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2820 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cbcc2e9bfd0a58994d188aa72eeeff1
SHA16436f674b41295d680627ecec89f1319f35bb8f7
SHA2567384b76357b7e13e1aaa5bf62a639483b12a7729923be3f152287d53b6df99fe
SHA51292ff7d976adcf7899dcec6991fdf3a8c3fed193d05c49cd5c32c1a995d7bc1b74d749fca699d7f8a24cae441308ec99f01ddb65b9c8dec457f9366bc436e0bdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb011653154e60f57f8009fdec79b14f
SHA1bcb14ceae142a9312b7021b2f313b7ba8a254c35
SHA256724cf2bac6b852c6db1c9f1df053891f8ca0459cd89b7cd3039f2800d0c963a2
SHA512b1ee4889a027b3093f651f37be7c863b569bfe44dc521252308c9a44b4cca4597d8b84f9ff2e68651518bf29f54d5442f25854f50e0fd0a5ce0a0735fa008aba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508abc93b2da3b56c0f5f6ecba538a73c
SHA18ff825e1108f9fbe4d04a8c34120f3a32ed0c1c2
SHA25648bcfef4472b94b59be68c062d6136915918a6b57c121c2eff3d8142465ec2f8
SHA512724326ff1962d61f87a41fc9bc9eabccc00e0e0cc892f5dff9c82c99257e3c893411126afe4c8e2417ae765ca801fee6a33645b36649c944d690abc038119387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbb9f6e8a3e775642ce06eed6d563459
SHA1f08f6c0beca53b798e91964f551586273332ac75
SHA2564f9572ad2e1e8980a79d561ddb38550804363962e99bf89e5e62e1f84e5f1c51
SHA512b66c1a03af5c130ab56b9552a85fe2b8f0a187538d23f18a975e00b37114f7f86aa2ea395ea16c8f77aa3593b208dd90d43f6603de2284d582d9101b92aea5cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af475eb7152a2d055845a70340b60d01
SHA12fcb154546383b09e923151b6ea015bed6f4a3bb
SHA25643cc1683f7801f4737f4f71472646d8595a0512b02921a28a80df5aec66eec11
SHA5121808b945e867e589c7c31f9d3978ef6190266a442dc442b08e2e0cb02da862239506ca5f01d7a9d33f8c11c9c280d76790c738fd23d54ae83848f23bc9cbca50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e329331bd1631b22d771bd82b9f1e91
SHA1da72da64aea53423edf31ad8b61580f5d85b344f
SHA256be47c6aed4c1879d5d7188bfddff6113031dcda41301eb232cd63398b9d67fa5
SHA5121633839c9fc08c81d6087b81ba81b04242977ab9a375d3fd188f1e67b174d4659aa50b5eb525de65d291409384f8ce713fb7d4e4b27a3c1dd633b651e652772a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544fef313b82377d37c9f7b960d00a3de
SHA1f68d2ca025c536133933669d711c5b207184b85c
SHA256f507eb35a2534b0b601b7809957f7f4583b6d2541507f160909526b66385933d
SHA512ff766c7e97a6e10b2832adb946a481744cdf1f01aac1f19b3a809257f6f346e6f065ff13e8d2d7b07beb69aa79ac1188fefdc37f089f149eeb0badb94b8de686
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588d2a3fd9dcb4a887b11d806bb93a693
SHA1205c21376cf7e93d4b0650d7933a1f58d59c3997
SHA256e4a08fc44a8f6160a81e5d6946c08fd1f5dda19db76859c21e54fec3a14fc146
SHA512f8062e5a698fbd0bcac2ef17f5eea14949145d493db9749bde057a4770016c410ce18af55e9e36f4794dcd59558654ba861c429cffb6ed815fc646943c5202d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a43e466e656065055a9fa9b20cb858d1
SHA1b8cf4b92e7a7719b9c887612e2f7502f3b44f826
SHA256523e54c20bcbc515a91cea3d455427cc624f638787d14ef6a9d6a15eed640ffb
SHA5123b612260a7dba23197b3dc7a9b579e6ac76556fc003611815319e3bd266c69ffa8609bce079cbc55e30b24c23bdca3de4310d69a14e5aec592e5c6681032804a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5564808cff4c5d46db148c55c76fd91cf
SHA17342e8b0874240b4bac1f8706036e065a1cd89bb
SHA2564d49e6ed22c72395deec7390f20ee7f371d9e6e78f0d5ec5a0176595ccb79f69
SHA512c1add9ff25d151f0b0af743eeb72ce924abf79da9e05442cd88ee69d964e437b355742ed0def2c370a5bfd22ba8a22e9ac5c026968911e8db53dd1a4c3e51e8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bcd4994d94421522c5f0e00672ebb11
SHA16a6c87491488387c68b23224d1cbf77839f2612e
SHA256cd5a3fea064548ec4364115363b9f096eecb17e77fb07759611b5f347c913cc6
SHA51289a27a7290b075d29feb45fb8f885b401a9482123dab341bbbb67e1847ed3087b05c62a791a95ae5dd9f42ef59529219d77ed2e5133f3e6e364680921601303b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55987134f5ecf780860a1bd07e633098a
SHA1d957bc66993617211a25735239b92f0243eff701
SHA2561a2c3eba152a376d54f22cc27e8064dd1e604b41a2925da294f807a893c02eed
SHA5125ed92d55b235758a9a86edc55492f30973027c690f9913c90f8fe6942b374ce24459c56781fdd26ae32c91ac084ae5bfb66de47d33a07f7c7b7d71f4b3b1ff85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd755ce280307fc6fbebf7d8b80c740e
SHA107cf98ad162021c1b21ad8537f2f1b7fc72e85ae
SHA256f4203499d94067386bb71cce160c758620a282e4fca435e33333b8dd76c9bda6
SHA512944780bd15947d7dd1e608149a2b6ecc860a2542350e8013a34f5c98fac13df1eb33012159fbf6e0eda254df87dff81bdeca511655e670fcae90cb0d461f8b8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58550716d8840f484b0ab156abbe05544
SHA11c0aac35fa5230348f25fd7b581837a43df5c98a
SHA2566607faf9210786c2fb3dfc073b97d559e8988e224aef4c07a53c9c3d980a1a31
SHA5129fc6e05e4d94e61e2c1dc69dcf032391657f8ab6bcbcb341902a901e312b2b5610a5463c7d5655ca0343355caf792016b9b5fb202fb7221c64272e10750b7cbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d397206be4c7d423d623cebb79c56fce
SHA1618e63fc27472b7670d8c791449d5828cfb5628c
SHA256dee0ff3dbcabb2e50c51ff3cbc376f4dca6ea1c037c3cb5f5d81bcecb0eb8bf7
SHA51246b5523fc39931d1f0262158eb987d708b37e9be03b0c0445a0ec077e411be7e0e675f1c0e754ebc46eaa3aed44576d95cf587a337d2c37dbf1b5ef37616e8e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdd640d0c92600c4c0ec2ea79dd2a750
SHA1c7283c13909ff5b1d24bced63a0260e77305b6f0
SHA256ccd17dcdf8bc7d1cdfa272c3ac06fe8e58958393ad6b08ba5673b0191a303997
SHA512c8b24e2aee23eb03d4d638c4bfc34ea2ea8289dba9cfe61f58d22eea430ad045deb43b8af6e25e81518f778761257b65254c98f6494286641d98c66aba9c69ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b267839d505d47edc675078ed6191f95
SHA100f05df33a531307c46437a8d78ccb8fe426a71f
SHA25686827057c4395677fd30ee4d79b6551ae3b0d943c37373c7f33d7015ee004008
SHA512e4e95b2977c3b98b643a1c9f01ec1524c568eb02405b43431a08fd1e439731af56ff04ef4afcaa835fbd8ef73482d77f74a6c168db76a2c08ac39c221b4281b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d779e9fffe42128b7816dc2debf47d9
SHA1ff36b4cc4a3a21ffdb4774a760c8cbf8674667c9
SHA256ff95b1de81f5810da59d36d1f66ba041320f4d2629dab3dcc8b6b48bc573332f
SHA512b588115555235573d5dddb7a3f806942333aa865bb7bb0385ad6e7648b5c0cff5710b48d22e5d657dc68e908561a3a658198699a30e7caaa513f610cedeeba4f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b