Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 09:13
Static task
static1
Behavioral task
behavioral1
Sample
aea71d55567ec869dfab747e84247aec_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
aea71d55567ec869dfab747e84247aec_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
aea71d55567ec869dfab747e84247aec_JaffaCakes118.html
-
Size
14KB
-
MD5
aea71d55567ec869dfab747e84247aec
-
SHA1
73e6668ff6cfef02b0619d2a172835f5fe9047f3
-
SHA256
b61ca61e80f9c31e6614b0e111c54ca84ed109361aaa00f72959b58b95e5aa60
-
SHA512
54b2f27edb4f28161d24e0e30f446a68e54aec48bb47c8d9af92faad81f32925c17808e3230c484291f7b697cd78e4eb891d5e9afd93a3b17c9042aa912aacf5
-
SSDEEP
384:04lI5NHScmmm7mmmdoLzWHTmmmH29mmm8+mmmP:0LNfmmm7mmmdowTmmmemmm8+mmmP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430307072" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{73F70931-5ED4-11EF-9D6F-6AF53BBB81F8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30228748e1f2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000e6e0cce9122bc756a39f7bed45c646fd2c0c1cc655eb3f8a41e30d6b03587643000000000e80000000020000200000005cd8903d0846abce33ab3309355d6b8dc33282f975d30cb2aa099d3a1c052ded20000000366f7afa33a1d7831a735b9d196b1702bdec39e02b18c99bcb5baf853678ce4d40000000e2f6c92f1146e4f17e36c02c74827fddf6b206ee2c8d0f8fc15dab4a51ba1e7b165fdaf87d410e687ea57e11110bacf0ce69f51be95a1b8eece84856a697c7f4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2460 iexplore.exe 2460 iexplore.exe 616 IEXPLORE.EXE 616 IEXPLORE.EXE 616 IEXPLORE.EXE 616 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2460 wrote to memory of 616 2460 iexplore.exe 30 PID 2460 wrote to memory of 616 2460 iexplore.exe 30 PID 2460 wrote to memory of 616 2460 iexplore.exe 30 PID 2460 wrote to memory of 616 2460 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aea71d55567ec869dfab747e84247aec_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9742b8b25c77addbb7daa88711626c9
SHA16503234531729c25b194d2dd566ef6e8c7de0acb
SHA256f2afc506534e9016091eaf40fdd576755a0116ec36bb011bf7ae315748eeb345
SHA5128b2b119eb6858cad57a6d74cf9f0f7891af85476ac8b0f0c01a13f2b5480ccf2221c5af08e8fc84fd8770e5ea4fbcc7327a4cc9b764b22f4b1bc12ab85084512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ddfdcf3ae4627a546cd13f2a6b49793
SHA11afabc4f3d8312094cbceaf1407a1ba7f117e022
SHA2567a1733e41d35652400296710b8680af941d6b7ad30a8c8aa857d6e4bdcc1c210
SHA512c3b236c8600657101040dd72891fa395bdba32d6ee24ed9dd32e37b571587bf0873cbf424a28368c58648479df63e99d0c4ee91ab1f28eab01eea0384c2fe96b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e258735a915e979f06b06ae2d0856d7c
SHA153bbdb3849c863bc8251ac72b901967277842d2c
SHA256bc326f18d64c3534f2250ed443171f3919622083cf0895744c504a0460a803cf
SHA51227dba7726a1f4588eddeb62aa6fc796cdbae67b1d7c2cea6cc6db14c2d419ba90c6ba92db973350267e29c15db3c5de29f436265020e20bdec2d10ab132c8ec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a8db9f85e0b0bdf1bb007e9ee864f3d
SHA12644168a5f7b4d79e17bd0192b91e2bb7f4a2c0e
SHA2567f95b4e6f3f56abc45c2bcbe2d9b51188f0073bd79d602751a71fe2dae301dde
SHA5125ffdbd714db2cf1640e0fa5ba7eb1d2e07750972d9be6d8f5d3089f43b011a8ab295a496de46824c769850270fea9c12fb5bbcd40dfbf80ed2b5fe146fcd61ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a61dd17e1ad73cfe74ccbe3e34b3431
SHA1afcfbd051c542480768a51964397849c89693137
SHA2569d55c72c6134578ce6db5c43c325158de040b717bb0f5ae3d1ee6204db5108c4
SHA51252f2780f50eaea7dcdedbc94dd00ac001cf3eccc411b4f01b6dd5e7ab034d9e8e1450607d10b868963add70924ad88cf97fede1533edebdbed5a6fe90ee380a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3cb6c8af1403dcddb4bbd5eb0f15dfb
SHA18b0120333c245d5ca514abac76838df018d06637
SHA256b85aabf5229d1e5d0dc1ac67376641e8ccfc40349dd6a5ab3f108a3ebcdfd2e8
SHA5121e6ac11870492ce534a9bfcad0d7a601a6a7e278afc0d1aa27a84ced3e419b1a39557012d9ab808a52a40302f3099e5d12b061057a3d63f487e49b0317b45135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5259af6d7dc9965ce2a79599a0755e718
SHA138f17b15478f5c6cbdf79574e5e43072deb0fd73
SHA25639a3f673963c22897f5a306fa9863b3c13f1921d3abefb4206e3d2009502b6db
SHA5129cb63d847e858f4a6557a37a9b9cc2a10f2eb3620cd4b137c14347213988af9ab546a99d1f69005620d7598b2c0c4edd39b00f04acae3afcadea3e1f62409619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507988839b3b4231df94513da39f0cecf
SHA1c543c7b68a705bab77233086585522db41d2a367
SHA256c58ec204b152f87526d8aacd3d1b32586d241c28af3d6295f1d5b5c178ef53dc
SHA5128be5e1b3f3c99c8da63312fdaf0c6f5c7ff16baf46e9825543cd92333e3ba3393134c1a9c4706c5f44204286f0ab17fe564cf0327f432853c249fbe50de3ff70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ed4d762f8566c14fc7946a1a437ba28
SHA15b4621c64c8da349dd40ba8e5cc46d8576cce35d
SHA256ddaa43cd0b10c1c67532ba52d0f843612bb97e2fb0150280e79fe62f4c1656c1
SHA5122ed2fef2709e11b8645318545972f45e2682688d9f000f49287a4baf5a0935385359373605ea6b4981e9ce3cd57648f74ffba0b13bbe4b7eb9ea2cfb6420e8c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54833fb118b7172268eb1931db7554049
SHA18180bee12d098c21071793618ba4c2391f5a1a69
SHA2566b4e2669a3a8ba67149ac9577f6e3cc59687dd067a54ae4690b393bea214cf4c
SHA51296ce0e07ecded84716bb76b6e7399df61bce5a0773b26f4011c0e987bcbf317bfc97aa2d77d4b15fe391404ba7a9f193d563339acbfcbbf1401e3653ed33d66c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1578780cc6d44ca8775f56de14d8c8e
SHA1d171a3c3a9b4f82cf4cedd8b95342bc0522d2647
SHA2569b9b915baf012893389f9290f4033bc438b53c937fb30c8b9a53f25a6375b37e
SHA512b3b5e54069fe97acda74786bbf0f70b526508901beed4e947b203bb1782139a963b45afa3968d742ab1f08d2584376bac829e99bb5145b5b23c6472daac4bfd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a55c6d1674faa4589c005162e1de28d
SHA110f0670ce181af8c39e9f190d9bdd0c819cf02f3
SHA25697eaa38abbc49f27bfc833fc581d6afb20cc05ab93f8650faaa64d4721aaf2e5
SHA512190d5ed59bfc6193a4642109e1f5ee5973b0a71f33cf01b2e8a2f5cff22944553035ba34f437dd088f927cb7bc4f8b0e6bd19ca923b0141d406feca70a6a6d50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591a6f876a3c7f64912050c69f3dd65a6
SHA17bd1ccb40117fdf509d84a0dd4efa07e91850cef
SHA25668ae36765a147c9f3d1ea112801c73faab1b97e9f6867552f2c16f831bde8b68
SHA512906cb45764ab35611cafc9d4d6715fb736ddd399ab3e046e39c0c79d7e8d7e5f423113b11568b8c9af0bf4fb02ff4da045c830d859657509b6e3891500d5dd70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d47b72f9eb276efb771e17a22f844498
SHA1fcde8bb801e9479f603a011aa8b97f52fef27949
SHA25667c284c10c4379d6de0ad4e06825e3ceef3fe271fe2b2531c8acaa0529b0299a
SHA5122154a2b2b28b3434301f28357bbd1062cd7e7395119a1b7ecf8b31230dfb9f583b4a32e9bf0d826ba2129f295eae5f9d1ac330c539b0f1074902f3d40674b867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4ffbea887a4b0bbc4be71cd4a81dd7a
SHA1c05bc8db001f0039c962d67951a4d8f7dff3f07f
SHA256e2ecc81c055bdbf631268db4605b002147ffde1a0582aec88cf68658ebf7e118
SHA512a632cae4363e950c98656b223077ce05acc25cafcb74b6ab4f4dea98ad1dcdb7171b09d626de0ad44ddcce662caad401d0cb8381a90fa4ba667033cf618727a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd1f5a07d63549c6cd46feed1fdbc348
SHA180762889d9a2850205579305d71cd15d3d006003
SHA256ca67886f0c88edad7e3a638b6b739a3fc6013807be7791900ea59e4162f66f18
SHA512aea30fe020ed7b296aff419c42665334140786bd582b3a9de508cc9f081f1f71dbc1bc23a7310a97864cb278cbf2c3daeadd0ac9e53bc0b263e61c061bd5efee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6eb988c51202ffc42da2a569e8ebdb9
SHA14c562c5044e6c12237e6e362af71a4cea003a470
SHA256880af84e096a27f780754817eaab211966fa5d5e06b9c0825f50b07af2b60efa
SHA5121fc2d6959b80d41f13a3c4fcd37529d16a4d438316774ff79b552a10340731a574796dd7e541a7aa04c517238bef409ba615fa12aaf073fe248424fa45afe7e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583b74a15b9b16fdd221646654b37b608
SHA1dfa6afd917532e11dd026bbe487ba760d9952403
SHA256617acc3725cc0835f9646235405482114a70b92ad7210af1cc081c9485084629
SHA512823a8e8eb1e5602484a45af76fa91d0e47ad7ef75ca2ea803fa6d916f906c865f6d4b035dbc3adf270435e12766a4e98c94e54f106e3ef95bbfe5f5d29121752
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed2d8259f8eb34ed21417ca7e8ff665c
SHA16e8537536b6f1caa1200d454e26a670786310390
SHA2561fe3113c6985a07a6eab87c3310c2b2e6f8df445472a4b8cdb95ee8de85f0488
SHA5122a210ab5cbb4624bbcf5589da46d867ee8de246e06fdac10ed4d97de812dd873f947e1cd1f84ccdd2c62f4bc54a2ac9540fe50a1eacc18e1add6939d3dc92464
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b