Analysis
-
max time kernel
69s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 08:29
Static task
static1
Behavioral task
behavioral1
Sample
ae84cac13da1ae462355b8e9d4472381_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ae84cac13da1ae462355b8e9d4472381_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ae84cac13da1ae462355b8e9d4472381_JaffaCakes118.html
-
Size
10KB
-
MD5
ae84cac13da1ae462355b8e9d4472381
-
SHA1
adfebe5a6ae13d67568d44a95332ec5e812508ac
-
SHA256
7749f4466707696d9cace989fd26a24e69e08c4b021a18698dc314f811607efc
-
SHA512
78de45bb1f4759b0776d96e6de8a605d8d98fd51b7fdbbe36b893c2f396bd50532d5f89e63127cbc939ad985e0a5753eb153e57ca1894bd165f6ec3131c66eaa
-
SSDEEP
96:uzVs+ux77yLLY1k9o84d12ef7CSTUOGT/k89tplNUDMSqI2qlVHcEZ7ru7f:csz77yAYS/TKgYDYPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4C76C9F1-5ECE-11EF-BD1F-566676D6F1CF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000019d2c6a373308ef2d4e7b1361005f78d7ba1cb6618dc9c2bc6dbfcdf9024e418000000000e80000000020000200000001bb2ccce8d36205e3114c891e5f969597da7ca344f4a09433f8778a92dc1c2a02000000032ed3934166d00392301174710628610709c07998a8e2c6654822ec0268d87b2400000004ab11184fb8636de1262f35564dcb27a731a339ac72892ea169aed7f4142a776a920df4f188f852a0bc727c79f0a2346404ad83bcfe493fefc93c8d3d3214304 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430304430" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0cdf021dbf2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1932 iexplore.exe 1932 iexplore.exe 1344 IEXPLORE.EXE 1344 IEXPLORE.EXE 1344 IEXPLORE.EXE 1344 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1932 wrote to memory of 1344 1932 iexplore.exe 30 PID 1932 wrote to memory of 1344 1932 iexplore.exe 30 PID 1932 wrote to memory of 1344 1932 iexplore.exe 30 PID 1932 wrote to memory of 1344 1932 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ae84cac13da1ae462355b8e9d4472381_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1932 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd705f01a5b867e3a945cee40d9ef14f
SHA1b4f00ba923e791e0c9afb6caa334c377230f3c77
SHA256935c5c272d5fc4c4c4942afcf1451dfeef89f58cac7c6eb346f077a077aa7985
SHA51270f76aef1db4cff91aa6fd166f09d8e8d9a78ebdb5cdee90932d1f8aa980236f28ae5de307c0325f5f32cb94ec7011f199e4e5be2d1124ec2082d2fdfbb3654a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e6c4aa618766340cc68e01342497665
SHA15c138ec3efd62d5231629a18fe4f30ce2d377649
SHA256d9b6c3d89179953fb09716abbf1f6994d236b47245d3e0b381a817670db735fa
SHA5122201d1bc5b155ae78d676e7ca1a56452d4f29596855f1898e5d76a646a96a04583d4bd034c761a9f8de6d3b649efe108c898df0d8dc3297334fe6134b09aa007
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f54bb3a6ae899da71823b851a571af7
SHA12421135554aa71e8ef497af6a0fd86564e677610
SHA256e59f283621d00d3edddf7dd30a1270c8b1cecf0b7ba9ee4b06e70dbba71a54df
SHA51259a83f7f27c72524c7b1fd038e37006771fada2f3cd8a94836bddf7dd5f5c3f6350450e7dc606c8e4fc4a4c91df6927fbc661f0fe5f5b4da137313eaefb06b43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c173ccd17f5aad03023a4bf163a5fd2a
SHA13259d5ec4a0a3bec614bddc0dd3c54de74250d9b
SHA256d3cee48c17dcb45007906f9fdf6b1b8fab5c1bd95142515ffcb752380f91edac
SHA512e1d9fecf31df46fe361250b4495f80839bd27164bd6b2b5d85339cfcf29334ddff8a21e9919a216ac0f16de4f9b300440b1fb6ea2adfa9adb734a93396534977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdb697f1d5499c963dfa75957e24b5c6
SHA17efcd1174067e0397c34cb01b3efc5f497934b42
SHA2560e7c2f3053d93f2bdbb014c33ef0552171044fc1a8f203a8c3d5186c0c22da5e
SHA512e12f768321f4a093b9da5cad73429a0ee37a5ddce6baa3b0fe910b328c36e21381478add1c5584e9ddc45931fddb4a859f97b4ed3630423e3471d31ff69f4e8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556c48f313a7c6578bcf9945c4adf1806
SHA1eefa1c2dfdd7cc84c23505825a822d5736c5e884
SHA256c81d91fee0b600d2181ecd7d52b689efec6ee92405b799f0a64f90bfb92c6b7e
SHA512ea2332d29fb677c68750a27c51bd55da4a033538b777ce5f3696c7e5746ed827a78cf870664305dcd41655af4c4275cb44c505926d5bd287464896a56fe666c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52201c1e910865b0ff7200c4d55f22ff1
SHA16b5a9d2c4a4488bbd91441175de5765335999854
SHA2566eb63f6617f9793f2b1188fcbd5d503c8c6c910f117ca74dccb94873f8b7e813
SHA51292d16cecfa353aefef5a0fed6a59e4887357ecfc067cb06f30115aedd8bbdfc9a12ae4e19507a99a4d8927958c94ea1eff266f37e4ff962a58e07ffd1b3d8cd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c115b44fb623e3e252d7d722c62f8441
SHA1553d7f69c46987394f9de3d6568cff6893cc533e
SHA2566caab48cc031ae5be1779e9e763f39cc2a67da5bbf2d369a049b13abc211fc2f
SHA51228b6ce60578f467378acf0d8993b2d43cce11665b66d192490613c59b217ddb3db7035142314557cf154d51c5493797315b812c206e98d726aa19c0979baaf6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8ec9107c64cd6574d5f50554f60fa31
SHA11753734cf4b11780492669a12d67e36346ede054
SHA25698ecdd5e61c4170a62f550571057a0beac8af86c77b4d3455ae19c112db87ae0
SHA512994d658dc5c86fbeee029f05fd3d02f340210b917f1dacd32303cd1282fe7a64b6d47aa231f76a6cedef219e252bf051319f839907b5360c4111bb26fb0a6580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aabe754617722171f3386a2740e27c50
SHA17c891479f8db5ae6fb4d0332696652333ce8897f
SHA256fe3a94328350cd513c56852a4fb2e9e0c68fe6dcaad2cd6d2f0cfbff3ff6b775
SHA5120ef4d90971387e873b3aa219c419113e3dd8c4f273cbc29e35fe0a96cf4f92e854f973de737dad0829e6539191e2ca9f42e53350fd8cf5923295b34b7031c851
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d76392f95c8e97cdb762e05a48b06f23
SHA1e19bd3787de9a11d2b72869c2610b703dcdce34a
SHA256a452d750bc36887a0575d179a58c8366dd590780c7fda86d6a3d0722781d94aa
SHA512d137d05e1b782c97dbaaab6e2066c1e86b85358440f00f2f96f9cbe3c963fde270655293f3a63505b70c3922bcfe0bc4d8f2490057faa39e0e300ab44f32840b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b83b819039b448fda2339380abe80dea
SHA14689743b97e6d4356189dcbba54198fd4d63139a
SHA256d3957006f367c99eeeb0f9a45df01c04e9ccad51b1c4a97281e4406f11e0c01f
SHA5122b97548f092e5abf20cd083ddf1c4b2a2a20bd605328c89d7bb859a6e250368bc4bfab933b2669ec0be10c85bbea1b29c5bc3b5080f806a83c86030f3e4c3b0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b1e0ff8551a2bb5eb73746264537878
SHA1e9630044fddeee1a88d9ddb77e3d2f91a60812d1
SHA2563ca610a92c7a425566519397dc3b71791fb37cd3973ba2ed910310aa5834147a
SHA512aa0105c3f012cb1572a563a0faf50c178b80f95fbfd9f2e6fadef636d25e122412865a8d47363b199b3de83b9b61a878b9e607b48a25a6fad26ff7b32f627b52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c62001ef4a67da2c555ff267d1216480
SHA1fbcde5002a2b5af74c36ce07b2e3b55c0a70fb6f
SHA2566d142eb23da3171a867e5f81e5ea311fabc32d1df6bd5e2a898a2c4d012048a0
SHA5123f5486ee8cc5603196f908271eead0e9e9ce6e6534db6186320b4e43bf00a3c024d30873ccc6ffe18a8c1bfe6161c3183343a9682e6715e15f5637cffedddf6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517c56e574d99a255bd85b82faaf0ede4
SHA1338d01ec1be72d837f4f9c33ae45653ec68f376a
SHA25659f3c35667652552557c98772d70102b6150fa6ddb6239aeb45aaf976b629537
SHA5128649a412b3bf5c28faa96af68b0dc8211370722d6d7c2f74fa4d0a181dd141161ebc63002b6f4f00cb3f403e21a3531599bf1b3cd05b134c7e5f5dacdc73bab6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddc71ec0577d18ba2141ec80382b326a
SHA1a4f1e51cb07d8f53fcc61cc00fff6dbe3a9b832d
SHA25681aea56458a9cf34f6dee7d0fed0958f98b3b6f191b384df58bd02c4879bb5df
SHA51206b2a50ba3379d9ff1444614d57df54238e176bcc148a25bf434c51ea9581cfb0903b3a4250a3ca4168303cabe4f055341a478104c1d74b7c2203830d679d28c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d722a3d670663d99e955ec2c8b2be9b5
SHA107fd5d654e29b06d561ec3b0840e4b28d907bc7a
SHA2567fe780a5c3ca2ee878686a9cf8ac03e527e54593820cb4ed55a7fa30a064fc97
SHA512bbc2262afbe08646992c69c385f36e6b87d257144177b11a3611be05884d7f446800c9f112b825f9bd57b8a90203c4454df1e6e2aceb548224921435a7774fd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a55352af5b36e64c2c1e22871de7e919
SHA18a22d05847f8819baba4eba96a84bb27382ba1c2
SHA256ab5deb0c57f64df447ea3d07437e1b196a1ee9e65282eca56b0988bd8f21cd57
SHA512cb35a5a9bbc5f565a57047b0da5de23b8034aaacacd40690d994cdfc00b4eabb1ab4dc457fd003243bc3ac0127dd5e5fa1af74d843eaad60ba68fff735501743
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5096ba5439c2b777e8ab29486a77aaa1b
SHA1099e4c451045edfa067e2517fa1147be2c39354a
SHA2562353a6135425e70144a465f2a7d3ec4e059db2ec8f91beb17d8a346a5716c5e9
SHA512887394822699fdc08b8747b421fe9f3cca54c3d623078537ea61352464adf3deaf81e27df1a1db6a7ef6c048fe6808f6cafcbd3ee82deb98103710bb2a65fc19
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b