Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 08:54
Static task
static1
Behavioral task
behavioral1
Sample
ae974afc0145f301a77f34d4826d7804_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ae974afc0145f301a77f34d4826d7804_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ae974afc0145f301a77f34d4826d7804_JaffaCakes118.html
-
Size
10KB
-
MD5
ae974afc0145f301a77f34d4826d7804
-
SHA1
ec25a4bb227bfe9be8af532be54fa3268edb4e5a
-
SHA256
e9be899efc6a4ad7ac73355aef510ef109f3c62c8c583efc7d24f35d9cdb4f12
-
SHA512
59379eca646697dabff3b32fd7294179131f05daa0fc6e584828b9bd4e5eb0a04075e48f1c315874d550c95941615d0d323410ef1913d2b0c5db60f6fbe7c98d
-
SSDEEP
192:bbwJu4UkHwXPqzK2gaRAguoxEnpAUF8lEk3DJk3/3ENsCf:3BkHwXP9gREoxEnpFCpOPy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D430F9D1-5ED1-11EF-BDB6-FE3EAF6E2A14} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430305945" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000def1b3266813df75b1db8b85e117c409f9652ed15a9a7f8a0025dfe6858e51ef000000000e8000000002000020000000b86bde8109659a8a86ce434420b83fd3616f7f6594b3deabd140385ad29f5a4d20000000427c8a6361a9ac862515d11f07e11b4584bd718927e3c175a2fb9c8de42513b44000000072c4df961afbf8957158a30f438cc278725293dc23de22a67efdab42126773ca5850c44370b5c6a39719f27adeb8d5e4ec123e3a9485a3d99c95022a34cd8323 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0f1d8c2def2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE 1988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 1988 3012 iexplore.exe 30 PID 3012 wrote to memory of 1988 3012 iexplore.exe 30 PID 3012 wrote to memory of 1988 3012 iexplore.exe 30 PID 3012 wrote to memory of 1988 3012 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ae974afc0145f301a77f34d4826d7804_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c3b755eee6edf2cf4962458234b8751
SHA15803dfaf94d425b04d5344f7ad0bab27dffb60d6
SHA256c1865a28dd38f1f5de356689be7965c47f81be3cb1d77e50385ce8d34dfe66d0
SHA5120f9c701cfbaa73ebd75f039c2adf1afac4c70367398a7a68aa4f512f9f55c93178ac7e46595e8b94ece8fd3d9a53fdc2fa7a7642a0e31c9750847a54b224bdd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5700ab1c5348f1cb90fb72ac8936b0df8
SHA16d1ea0cf9c65e2187dbf84aef8146a29ee193e7e
SHA25658b0ffe5081f5ec9a3f005d4afee319d513f6cc160d8ec4fb7034ecc18f609a5
SHA5126f2e6ac0936b88876e9614de251bdc26e267cef64212a4c1854cfebab2a9400bf86955da6d1c488de78e9dd2e0f3e23d8803d7d1cd24e6452b4b22720d8f75d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54406b3e1f0034217a96f49c98e703c07
SHA16f002b6c1459904e9ba7834ba70089928dc62547
SHA256b5541a09ab941595e56d514eeff07f2a9640944d637bc1fefc220497054a430d
SHA5123ec5f36c373e2a17c6d1c0ab2590c95dc7d74a5759aeeb2a21282a71440a2bacc1427942d4cdd27039d2a960fc3b9fab2ab46044aac9322d9f3a47862a5196eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53aa547d2b64282ee83ca1eface42da36
SHA134aec8bc8f4acb1d579534aaaac843d737157765
SHA256ee78ec8dd36808983b1ecf0b00251e28ee2e32133b3fe751dd0766f2ec9549e1
SHA5126707e7ba9addcd879d0acc721a482cddf455aed51d10d3f4fc03989329da4aee083a313a6b00a437fa7b6069f78c9f7f0c6df55db3a46a4c1a1c53c78f03c9c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdefc3fefb2ee1220e9281fe0cf25f55
SHA1321b5f9798f367c94ae70102ff0530592197380c
SHA256884b2172850ca11fd7145bd46ec9774047ccb4e42b450e1a70631e9b46c5e8d7
SHA512fc90cd0e0b143186cdfad1747fb326b6d9a19eb27c6d5e779cd3a892b55c10557ffab460408034f07d7feb2a49c280a36c4ade61a4df7bd4a60b45e774529065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54563cc33d61f7af64a03b72528bcde84
SHA11ca87a7065ba1e57b72e6333f1b91c53acb91277
SHA2562faf9decf1690497f054ad6268530adc6e6a7b04acde09e18d3aa6b4b272f77a
SHA51289030b56c8e5fc634a2849a40b1c314bd4c51363215a5399925d2aff96f5ffd7e840318a3912a22ef0dec444b1c82bc5575d3d1a8e71d9f6c4a38ca8849fe9d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d57d94d6d9bf9f535c8c6b58d12b4537
SHA19b74068deaa77a3184dbf1b59587a505276da7b2
SHA2566332f54dad841203e354f80391c293e5e237daa2c39e496598c92de2280c2189
SHA512200a9689711e8e3718225024557d390219a425af5847c77e2812b7cb88c9ea960fede1eb9fa20baaf9142b7c38c8818498f0ebb6949061c08e84017b279c026d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba3a38ee2e7ad1777da72d11854371f6
SHA1ffaa5f078304f683f906bd4fb6afac8697e82ea5
SHA256ad75ac8bc66b390718a17a7b0d0eaff2ac8671649825be0ef0a46c1cea78301a
SHA512c22f0e865f47132b6c1f32c957142ec12fe0478ebb541b930cc4257cae32c3bbe50a3d4d238a3100f0cd8ddd575e33165e6df5460e939a396557dd98bb9d07e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5850055077151b758f90c27efc154b73a
SHA1e939af21115fbd60b813fc7ef0950eb60991520e
SHA256ce9560e52c869927c7087259bca020f3c71ddd94e390f3caf866017c1cd7cc4a
SHA512ac38458decfc7be943eb18b56ab5bd5f290ded528adb37fd98dfc7a6725c95393ae0a715fed636f449cc08e785471555671a32f865d7f04a1bb51217e0310d66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51404bfe12cabf2fec52cb65e034dfa9f
SHA11cdf1d71fdb3c0d4c704c9866235d061d4b4f819
SHA2565f9e5b803113f3118d0758e3446d00ee2c669191603099ed54f3c8c8c7856107
SHA512403114c5d512c387d2d8965158237a36494c5cbfcc62edfe50935a6b6a0004abea2b5d8220fe3e6b2c6f1821c5979080de720eecc3538e0a4673e17b2b672bde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ab88905c4f8af7b1d5588fde52ef7fe
SHA14e29c3e73ef309002f0200cc97923e2be5054dad
SHA256a10ded8b6bc81279ca38cf9f4d09d1e2ccc5dce50194108d780eb873d4d0ccb4
SHA512cf695541935744d5a5b1d0a0e36f144b4da7f30a6323803f0d26bdc1ac1258be2f420b9d52c14643b1fa18290a4fba80a535c97082188af79f52d7844a3b162f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52411c6101c5ca7b605b94b3b863f5dd1
SHA1ff7f0d6e837ce10a628181718813f9e5c0821bd5
SHA2566d6375ea4a0e1c883d38c87cb9a000081bb1787aa8949e726f1379e3afadb18c
SHA5121178ccbd4cb8e4e32a79732d504fcf6a48b60a968ca52d69085e99c6145007679ca129bbee638365127f02e1dd2e8cc57d3e3460b9e91166af670e9a73c7ffe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e73d03a043df857a8a5dd6c031601a6
SHA14040b58ab717fd8f08bc0e15f13f39a1f048188a
SHA256584a2b6c0fe511640ce4fb91552e3a2487fbd7da4f4d2e6aff3c57f27015218b
SHA512f5e842c98da23d0c9abc493307d65706c13bbfcd0a3bc7ffa0f6658d4884a06735112e6589621a9b0450955f8217cf2004efe66dd0c4c1a877bdf70d1f91746b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500161421250cb8e27ae1b22abcbb5b49
SHA17f7e3bcf0c98a824867718024de63f51d06557e8
SHA2568551b6454055526da9c0696997d5dcb00c8cdca03f7c9e064765c39dd64075df
SHA51209ddbca42a880bdb0906840dea22eb601858e56de363245f3fff1c11da6df6e647008a10e64bc2194aef52c201fe6498323a13e3d031ab82cb41dbf0a85e1116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b34f537a114b373e98a9b689234261a
SHA16322a831069ce3562953c5f212945ac375b80a5c
SHA25687352311fabc68daff81d7506bd3ffb54885f221bd9b8bdf0cf161555e374e0b
SHA512112c05ead77ef8fab4d6b3eda776e9b130174a5712dc7882dbb1b92e9af9fef163e54014961c134952736d44e032fa12e4a2cfec9f00786b8d3bd9fc8ab31ac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fdd088e5331500fd3f43efc8fd2a416
SHA1b4da8c05a995504fbbee91b4c82b0524837cd22c
SHA25617b8ab88bbf31a80f8fd16dabf87f6e37ddef91add8d80784655622e87318b74
SHA512f5240576e84a93daf9382ad3b0938a1963597485c09cd1c1199bb27a6e259536fba5cc7c74484287be682a95d66173dc5b2f5fde159a1687a7edce97b73b1d1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526750a135d135d3295b09eef4349b30d
SHA192e60725d0b9b9b8c84ab4b46578c6fc5dfe3291
SHA2564f98adbec37a60b30a1cdb40880a3b6f4f7f634efb79761146478ba31290a373
SHA512747c7093ffd6b6ec4c88a5507f84c7c3145b3e2a0dff163be1fd1af2d55ebfa1e6a984fc7908a9f47144f5bccff41ae32c4a1d2db6a726bf2328b2fed8429fbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a72c2623e6cd6f162cb5fa8c581f5ff
SHA1f101590c405c262a91b866ca4684e8c0e28e8a8f
SHA256daaf811fdff149da6c66d255cc5603d169c73cf591558c7dba0fe584ce389fa4
SHA512c31da90151be1bed875339e3b642c8845e2e96713ab71ac0e4f65fb12e45e488f8619e9fcaa480f0ad6cba0084f56ce4232bf5d65255392715328000abdc70a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a9b112194281bd65bdf39e35b63ee3b
SHA17bba906c6361172366e01396e08a4d80da555b19
SHA256b176052a7839c72663b11bea921290475b43349ab76be852aeb1ee8a9c72b47f
SHA5127eb85dda2a1e5189ca7486add94fde8b75343dec6fabf89baee80e623079320861a70f36207123862d99a49bd1d3a8db55b48ab46be43c4bc18b7196044605df
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b