Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 06:31
Static task
static1
Behavioral task
behavioral1
Sample
ae2d34a76960ee53ec50506ddef5f38f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ae2d34a76960ee53ec50506ddef5f38f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ae2d34a76960ee53ec50506ddef5f38f_JaffaCakes118.html
-
Size
6KB
-
MD5
ae2d34a76960ee53ec50506ddef5f38f
-
SHA1
b11b133dee27946b468797ef93fbcd156870ab00
-
SHA256
5814710bd513c7852c42766576a75a263f5c94b90e8fb686d6c7e035ef165795
-
SHA512
16fbac07aaaff2bb8fb59dc2be33c656891592e912d993eab0f1d2c77d3e74895364c8fe3160290f4c8c019a6d39a772778fec982df88026de00e3287d1f5824
-
SSDEEP
96:uzVs+ux7DYLLY1k9o84d12ef7CSTU9ZcEZ7ru7f:csz7DYAYS/wb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000b07d1179fec74db3cce9c1ffe3306c27c0a8d419788c4e87f04f55e2466492b9000000000e80000000020000200000002e270a63e28a7fdb417a2915138a68c067ee268d40e94aa89b23374299da28a4200000001d394fb844edf7408ced40a268ab407ad88fb5d60c40cef19394c117b4db361f40000000ade025b6979a8bd82856f9a2df09300a1dbc14485d44be1312ad63e0853ad1a67e1940cd98e323bb027bad2e55f5f344bb93a6856b4a48e323b603728fff667e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430297355" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40cf43a9caf2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D42B4491-5EBD-11EF-A14F-CEBD2182E735} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2176 iexplore.exe 2176 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2724 2176 iexplore.exe 30 PID 2176 wrote to memory of 2724 2176 iexplore.exe 30 PID 2176 wrote to memory of 2724 2176 iexplore.exe 30 PID 2176 wrote to memory of 2724 2176 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ae2d34a76960ee53ec50506ddef5f38f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef56f60c14f3cea0a050b87b7f74872b
SHA1f0147c1c5c0cfa1e96301f1744e5cf921630ae31
SHA2562f0c1821c4e6fe0d8d20f7c996554f5cc3250f7bcffa5c947dcbb277ba68891e
SHA512a6462cc1e084a12981d22bf50b9db0738227cad5131fa26b6536d3415bb25cda92435d7985464736c46ebfc10b20e6806bb126b97984477eab2523c9218bcdbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd3a9a4a895939767d6ad21e3c293c63
SHA1fe211b4e7fedb0c0d480c4c50014d977b441588b
SHA256a842552373f32a3f7debaea6ac2466ce623afb90f4698b24ad33b84e45dce76b
SHA5124fc81ceae2d946b79408acfc74c329f5f0d26941073cc422a4e70154663a6d2a0897784b6e0335aea3277e1d171389a9f6b1ffde725a863294a5863d4a32fc85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531a81694f9f5a2a56d9a8a407f005dce
SHA16a5364007619295c9b2d89a7c887f986034124de
SHA256210c558561dacfd8eb551ac1a93d37433891e23aa5aed840bdea79d103c86c94
SHA512854e7bab9083f9e0b26176b43258a6ace163fe6f2aae06baa8e110e4101ffd248b263d88dd338a3e031f6a32d40a82540d422959cf9ae327ab81bd90f0319487
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574bb6e0372b61105caabc50ad92b9ec6
SHA1f0c69617732172f09780f653b00f7697bd09cea6
SHA256260d7e11b2927ffe497f5c0f14f984fe2cade3df29f6c0406debc8e909fb77de
SHA512f0f6cdfbd5305e6d0c041da58aa06b33f7ec1ed641c4c4a2baa048910562e096d0ae811f815a7c2161856cff312e911d7fe1d903385b3a489dfc705af6e62952
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51749f1eb30547917e887587a5700b5b1
SHA143aaab78b7f257b3f50991fa91e9f4f9fb033fbd
SHA256b8301fd2a1f34891149624df932ee9f9fd039797e2954b56f8d1330b1c39fd31
SHA5129d017e614f2b1aa833a691819b9e109d89c67147bd280f791a143e04608fe534f22ced04a75364bb27c440259dde14952913666cc5949c41c849b57dd29df388
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b48a7c5918da7c8644d4618ba2c754f6
SHA12dd86424f33f3fb0d6201c5fb7356247f0fda3bb
SHA256262b758a4d54f6f2d9b46b9a2d7336c8e2d1c74b088565e1f5ed807369b8501c
SHA5126c0045d68642f1372953899e398f536ba11c86bde3642a74a483404169139bed82cafe62c5ccf47998818439ed1c5254c6f9a4136683ebc37760f10644b1f3f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f70c92ab193f896e73b528a02e696c9
SHA1cf3999a40616fcd9ee1b531592b75355464ffd2a
SHA25638dc6beda5010892fb9baeed5e11923860db5891613b708346f43a1b63a204c7
SHA51227363b400de4e750104aae7b40a20b88e232682b9a18ebcf643c82513d8001a198e2191e5aaf006b2a46b6cdd7076301b01f8e8291029f76f2a2e07caf82988b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59490a40afe8864d255c5a010a06b96f7
SHA186370e7be402a6d0b527da58451ec4497a197e1d
SHA256b3e472d9efecb25bac894623f64e93fa6998d662a7788149af25c2192c6ebb34
SHA512ec4f243a3ee915d077c68030e1fb80f8c45f5d5537a9b762c5d9b48bef37b98086e72797e65620af278657cd57b13ce3aa5302756b2462dfdf7c7c3dae9e8fe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5702f767893f5972da8cd9182479cfebf
SHA12c59fcd25f15d405822edf97545d73a83a61608b
SHA256d6075f28fcc04f6de2a01956004ca91c0d23c854d507f67704061a46dcc1f7e2
SHA51231bbe32ec7639f8622f156c73049f5df6b0cb638ff99062ac0836463af97352db3be8b26d9d737e41485dd1f8ed303018bed27fa40583b919997d6290e370e1b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b