Analysis
-
max time kernel
68s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 08:23
Static task
static1
Behavioral task
behavioral1
Sample
ae8059de802e4c6f94b700ffe99218ff_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ae8059de802e4c6f94b700ffe99218ff_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ae8059de802e4c6f94b700ffe99218ff_JaffaCakes118.html
-
Size
7KB
-
MD5
ae8059de802e4c6f94b700ffe99218ff
-
SHA1
02bc5a0df332304be46dd3e21915fac881faf18c
-
SHA256
d5109fe8d20c3c76ca6dd28e8fbe4e94f4eb0ed40e685e02f5320ede44484b7b
-
SHA512
82e4cf326f945d74e164b1f6949f1243435f5e870661f9925ea6f6d86f4eb7f6e0fe24baaab5dae66366ec6442ef0a77f91b4d799d333f30099b733949cbca8e
-
SSDEEP
96:uzVs+ux7wELLY1k9o84d12ef7CSTUBzf0b9qQ/s6fcEZ7ru7f:csz7wEAYS/3tb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30275554daf2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000bf5726ce5a714190d1301f0e98fcffbc44107b79529c343ded2d546a2b94bc60000000000e800000000200002000000057044c8d78863a46ba51c718de584b48ca31b84715aa40fbbb5bffa1bf4ac8eb200000006443cf64430286a4615cffc824abd9fb8e368829c4f3ee27f5d9be0f512d5ecc40000000b2f75e311743979577e47d1c460fb2be948bcba55fef99af416be59519ea48c9621a18a67fe7518a791034d6a4f9f5e10bea185e4798a3d14e286bf5214ea4a1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430304085" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7EC46711-5ECD-11EF-B8DF-E649859EC46C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 480 IEXPLORE.EXE 480 IEXPLORE.EXE 480 IEXPLORE.EXE 480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 480 1732 iexplore.exe 29 PID 1732 wrote to memory of 480 1732 iexplore.exe 29 PID 1732 wrote to memory of 480 1732 iexplore.exe 29 PID 1732 wrote to memory of 480 1732 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ae8059de802e4c6f94b700ffe99218ff_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58006009ad41c0b739a527aefc73b9a15
SHA1946f435271db62b7fc6e0f4c80b389b32ce80480
SHA2567d13477bdfa0fec4fae5cabf2bb93a3e2338c07f772e652cf508370d981ab023
SHA512e509c7ad9be71692231aa422f5090ec818efef42df5e286d63bd18a5efcfec98438549bf587589820c5d2bf8ee6634efe12392fa1e2c3793e59ae2eb92d98b3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d8e8668c2935ad08edd31bc5abb7d7c
SHA120d549ad80716ac6a124ee6859ecf6d433a1da8e
SHA2562c0c384dd9f8f4beacf12a5c264649b607de97bb6a90a69dd377c1ad99924188
SHA512f67ffeac027dbd77ba8a3287104425ef715cdfcae0f7f3f3d0a1466d95c799fea91e1fccae01ea858eadbefebe134a8a0766bead08fa1d9721b1a1326f5b5b8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bb3905858a20b6e4c52634e5c8e9d0f
SHA1ff277dc4764e3c77f7f4c7da93c88654f27d6612
SHA256c5ba74b00040546b89902ce27c2e83584672e43a9acf7127d98073eaeb0df7dd
SHA512ee94d208f58e19cf68bd30ebe9b147d8a122319e71aa982aaea6198bbca8efa7ca108b1501ac0c43451cdbd4f6a0612aea39572632084dc897047ae43fb2cf01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1f14fb3f0a9dd41736f0de11f6dc70b
SHA1a5f884fcd127b37b0889f1f7a456b88db9e4fe9b
SHA256656cb00f711af2e7f1cbbc8f80c41984b9208106c7fa6f964b29daee2d3847c2
SHA5129169123f1384491786878165f91c70ebb0ee50cf76702fd89e49506954501cbb29035a95e10aa688ec02b55145e81cd85ebd56c48cc628c046235f515a8881dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2e1e818ac750e7cfc6eab2bd3704a53
SHA11b5106acfabd0eab41ec6fbc6addedb264c85ee8
SHA256cff1486ce6254d9d1c152548cb0c6acf33dd247bc3f764fc062fc2ab15c0d2e0
SHA51285ceda61c2b482e31a970c3bfc477690d97e1239cc3844dd94b189c87fbc198780d1a5ddcb6cc8774ffde09315aeffe91169d643d15a4d98608bd348487772c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5820e8d858b0fcb919b8fcef3da28a448
SHA1e501be6271f502d736e156f9bd8a1d479cb58cfd
SHA25682c9e9df17ac6f7f703f80b555cf89d7ce464ecc78f49ef134a83033f285ccaa
SHA512c5ef16fd09862ff7826f8a106c89ca357ed4ad9739b5e689d547dcbcaf14cdc6b106c8c4f6dd7dbb12a3ddab5fe5223c7ff806541b2fabdbf1373651ec734c4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a31cb088de8da314bad2be39d86765b5
SHA1623a94252411590b50081d83a07e884376807846
SHA25678d04b5c6eb4e8540a180f9cf9e6fd2f2e52d8a62ee2ba3f8063e7f27ec3e499
SHA512c2c310133ecc41c42058aab22e02c4bb97d30b1f6983f3ef27f467b0baf9691cf945e102aca37da3e1cfbaa207af030600fdb525263e51cb8148f3c76ab2b8f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586702e7aa3a5ccdd4d60561ee3daa930
SHA1f059274acf42db7214b245bb6d763dfa91d16890
SHA256965a442c311ebfc0844c372441edf92f07d8300e173d2f69d83d48cd6a334891
SHA512aaab5c9ceb4f62160ca63e81c496db957d17aa86b712c3f3d37ba8228810ff39fc47424468af0ff7d61abf3b89d10c7e91c24dfb33b5378a480647b0bb140059
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f4d2047f2f0bafeeb3975ca9ed2f197
SHA164353d4056f4c4ef5713f542db57ea26f8290243
SHA256915b55c9b5b6e6e1e6b3d34b3034593706600e628b960f80722aefa55f0bf1ee
SHA512a641f42a26f5abd89596b70bebda4c04230ba9d22e090a59b812f60ad751e9985ffbac325b816f103af4bbb2116584f88eaccaec91c191c14a53a2c24f5ffd90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fed205824996c1667e7dcc9b0fc6ae4
SHA1f2635f936eccf6c7b8f4edb3d399eabb3c5cf693
SHA2560a383021350cd7e58b3df775587c7d835a5840439fee3ded90460990f62de2b6
SHA512e8e003e19a8efe863c2dd13f06055a786ad4682a993f3d2021d53ead3c802b6dfc0b737be1dc9dae0915d166dba7bf6de0a46eaa7eeaab72106a5e551bc580e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccfe28ff73cfa586ac62e52bf02a106c
SHA1b858eacb8d1acb2380aaadb000dc2410303fe404
SHA256414677be01b533a462951e5c8de3abe082254d000c9b8aa8f0e4e6d4b23d142b
SHA512ff4a4bc5b1ad270453b0edb59d5162d2442261ba2117ff7b4211b3c4213eef5642b0d9c3b4ba77acc32f26b90e448cb788d2b4bed404e75f3cfcce87963fd76e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ab033b052d7cc82ea45e655373a3b89
SHA19b52063c6c2a7586715863a40cb0e03bba6e1e7c
SHA2562d2643634516e8172579d755f15cd930cbc043c2a67f548591530819abd6a517
SHA512c56549ff3c67b038051533048d03434ff91a0ff9fa5afb0148b3e8d0f3a488ce8bf2590f678e75a89950151b8bb0e4f2aea30b71f097525f543a2edd221afd2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5900bd76cbc56ceeefd97d5a73509d573
SHA155e4d2f2acaf1519bb9ab5c6ec3e7767c133deff
SHA256e478ce57963e2c70388c28cf9011f0c0cc4505d81816bc768b19b32a3d7892ab
SHA51221abe82e6b6633f6f657ec11a51df6cac8f7a264d562a5f8eda6c69117285d4345cc6bc300f420446a8e2e9fea73428467ea5058f785d13333a50b021b09b306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b867155c6cf99e391e9791102f16de6
SHA154ca36515ce600c8b2a11a84b9a95d427bdf1b5c
SHA256e4669af51b8bdae342fac7e6a33df1b9d5e35dd2c68704e31fad5f9cec7f941b
SHA512cfd6fc5487cb563e8a0b1af3390c618dc4bfcd1e7fa4aa4df61c2891af73464e4cc830a30c63fcb07113ed8700bf341d20d969d23e5d5151fc7af688ff672f3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e060bc83a2a4da4d1468b7074ba64a4a
SHA15a2c2bbed5f2c767425f404fa738f8f6ca823c2f
SHA256b5f29ca4133b66a025aa58b1c805db4288772677b5cc9343f26f1f00da8e9a0a
SHA51202d1f5de44ed02e7aabb662ddc653f01d41f05137ffd82468dab92e2b4a004533cb7c2a5a4d0f301d2578e1024f6b48bc80e55c71f5a02f7becedd39b0fcbcd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de4313db2e4e80d7a7cfde3c5c13566e
SHA16c3761a989c741343bf2f25dc0d13fd3b84096f2
SHA2561663edc736aebfce6f75e17067a2e8748027fce9176ea3436c1153dfbfd69c07
SHA5123d97e4de977c6ae728e798b3fa229d4599161ee9564b73d2f57792dfd56f9973d6847dccad8bd30cff8c40eadd168ad2a725ea5db1aace85bae53a0575e08d1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50771a57f0868e92fe54e1c034e59f372
SHA12974f86d7ba2b2ec776e9d1d1c48221472d6e04a
SHA2567f2145a2d2d407d8933ad0337edc95b62ebe23f191dedbd55ee465eac044ae1e
SHA51276e352f714fa275698d54f6dc91360264c2df0683288fd5d4a72d6a0f3dd983a7d484f730a430983ea79bb3f32413c276b4a6cb37fb754d858998a0b70ef75d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8baa647216f2995afb728b3008bdda6
SHA1cbd5793889eb20a4b32ef6f147d125b9e4ad0965
SHA256b50cc7a3932fdb7b641eadca3445b24905d7ef47e88b8b0d98e539d5121d4371
SHA51270ab0ed36a754f312f9f5b43ec94978da133e19f8fe6cf65971131f016268532100ddc8cbdb2c5652736536d636c431659a5107a432bd8987312cdaec04a0b07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54faab10327409dd247dd6e35c46a771a
SHA11d94ccea41ea3f67a3187b5fe75f76fffc1f4901
SHA256e7d5c613b29cd6192b36ec0a337adb9968d312c950966bbdcf135ca108019f8f
SHA512af1843e47df215b6bee818913b43f34cea9a24695305fa36a0da211e219144cc0ab9655774a4b82bbe7cdbeb1d6a0ee42f541e703b14db25a913e3284cc4e447
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b