Analysis
-
max time kernel
137s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 10:47
Static task
static1
Behavioral task
behavioral1
Sample
aeebaa108251774b9d54bfa37add5fdb_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
aeebaa108251774b9d54bfa37add5fdb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
aeebaa108251774b9d54bfa37add5fdb_JaffaCakes118.html
-
Size
1KB
-
MD5
aeebaa108251774b9d54bfa37add5fdb
-
SHA1
e3365b4562174b94ff892867212cbbe44d022c23
-
SHA256
00a2f5f46f1bcfbd918cedc7df6475d2c1400507cf61a5caf07d5502558ead4e
-
SHA512
edaed06b6bfd50b3079f1760f66723fb07eb84324e00849090a97c4dd5e80c9e44145648f3c9828cd7098effdc8fec205b1df8a1549312549a676706e9e8c154
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9E971241-5EE1-11EF-AC6D-CE9644F3BBBD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000005d2afc5c84705fb905291dd6034785a0bdf24121816383686889c154264bdde5000000000e80000000020000200000006a43f65d8fb326d827f8a3008353be9e145472602f0a4da4428ae6ed29cdce192000000085a8d5b11940edad8b97c0408219117868e3cb8f8daf4ec06d5987f78e8d3bcb40000000330b7eeb6bbcdc206fbf166ef279c3fa8659858edf1f5cc276010d1117cdbfdb4297f248cddced928df1015f7ab0d79749d3d9e05304522ca56ade2c927535ab iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60c2fa74eef2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430312726" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1704 iexplore.exe 1704 iexplore.exe 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE 2080 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2080 1704 iexplore.exe 31 PID 1704 wrote to memory of 2080 1704 iexplore.exe 31 PID 1704 wrote to memory of 2080 1704 iexplore.exe 31 PID 1704 wrote to memory of 2080 1704 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aeebaa108251774b9d54bfa37add5fdb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541a2573a1c2c1849a16acfaebd55faea
SHA146ec25e7cb438053fafbe77a6f21c35e3eb9c69f
SHA25614d899d9807b639441c5ec8737e24040c8deb2b2a6b5f5a78b96357c6783052f
SHA5126ca5837eb294d086271f70fbdb3a0510534707c2b307491c8a0a590702c07b3645543f21ac42af76d477500aeae489890c95137ebfaaf9ba922fdfd9f9190e35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae4a63261ac75f3d9e03e3de11fc0668
SHA141487570c166a47bb275344f6ff9492b041fd564
SHA2564a7a5f68b94b868383149ee3ac5bed55846ccf24cad4da9e2fd8f5d4e2bff215
SHA5128ca1aabb3c6a6a01e045f7aca31cd71207aa59e22fb181e0c41ac64db2837ef5c55c402b151583a66fcdda02bec7d837ca54aa2a4eb9f83cff97d719c07330e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548c211f782ce524d5839317e0d45dd89
SHA1885efa0fe8c11c3d5a4b2449962ad5b27c27ea54
SHA256151f6f0400d80260dd018ac24e48ad534cc5eb5c57103e14bd50c29c27c525da
SHA512aff4a944ff610c4a21019452c3418225bf303266643b20077ec12bf8c7b45472be7723c10214f7171e74be4ba7bef065a354056f3c707cfaf2ae80ba9d885c26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ab7b455289af30c495424c003410227
SHA1e711678505235963606a1f4481393a27a46c1cc8
SHA256d5fc07838d4c077da1e82048de0301a02cc5241e5db34adb1a981cd3096009f9
SHA5127895cc22551c8fb242fa92e99071f0426710797757ca38873d12e2299dbaef90814f4372ef5a15e6dfad3cf8ad9554a0e9c342231155a66e3f56fbc56676aa9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5b3a8c1e55894a44a2bab338d2264fc
SHA190828f9f339cad4308957bb0f3b9e2f975a86cad
SHA25645db7c2b9a8b6ef95505ff9033a51db41411495608c03fbb78c83148af043f1f
SHA5126733d74baf5aa3d3006149c086b8c2b01949fbafb1665cd78aa962e2e946c44c98ad459d00fbd18f05ea3f26d13b77a09298bfc762a3e8fa82e696254bc1533f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57be220f9be5812821e2ec9462f171244
SHA1ee855d32f60e022fa04c42663b35668e73802b4e
SHA256565dfb692ccc4d3b7bc0fc3aef7dd0596e0b7489d34107f45862b4dbc1416076
SHA5121c6133f18e8a57234c778d7daad0dda2660818879a76dc498e0fdd233306892777dd514316fd80b812a3a94ad95fcd428202667c3f1337e735d48ec86b28892c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dafe45e0995c8681961511ece44e6c67
SHA1a7d575fcb7ff3f5b79689dde5e8529c40df69717
SHA25682725c865d7fbcd1d9638a03a1cd7eae65f54628da3844b2b23b10da0668eb2e
SHA5127f15fb3adf7b8190dd84dd5e53cec68aea8abc927adeebffa2b535332b5513a51fb691cfde8b31131bb54cd27926c8931e7a3ca00e112be18fd85a59fdd62ef2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5dba5d5c9c1d38db0bd7578a0e902d7
SHA1647d2edfa4ebf00dbfbe76ebcf8e3cc5a9483025
SHA256c46139b7ddec15e02a408d64c067c43695627315dad69beb148896ba6a6c3d44
SHA512f41e864b205419c53f75d6043a309d1bd7053752208ed8e47a20ede50e98cf41ffd1da47d3b36b21a2bcac126324e4fb73e75ebba18a8d634ba7198d1ced52cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5804e958ffd0e158703f300980e4af577
SHA19a696aef9f4ba52ae7e80bf804dcca5557edfdd5
SHA256fe8e50ecf29a09acc716e2d73e1694bc71e25207812d6accf9f4a17b6e9c9d43
SHA512ab84f8a0d36d787277d3d77e7e503dc85c0b6702bc20cda5e7c13eceda6a3815018049d244558281e65be119bcf35a769be5e8e9d4513f100b04d1b281843a8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52470f7106593e4887254e1e4e1986619
SHA1562567d7a6c4874cce20a95529b860de5572d94f
SHA2561f440ee43656d0059a7e451a9c8c3620c1ddd17e3eda2dce3162f3de7f9e7b43
SHA5121338bbfc2ebf711c658814c1b26efcd28f736264f5e36fed6ae8320fe1d80cf60cd88f3bbdc69bb23b033759d1abd549fffc415086b79555bb75ad4aad012586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b702dfafc6648f61abb4d2055d2b860d
SHA15aab92df3b52b5a57614a686ad649f5875d50ce7
SHA2560718cb6a9f30f6539d5d10b9a3aa63478f20ff40c1762e147f588ac6b0552468
SHA51201b1a329d64f5a5c7a0495e5060a13d6587a9f87ef471349227671648992f6a5ea12b5cf570f9715347fce86bfc79d9573c4b94ac1c0ecbd5b680ae06c81a967
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d6706cd31369c4fcb8e441c43c491e6
SHA1aa82ecb48e759739118f2f892dcea7fbe22d53bd
SHA256a60bba09d9d34e4fa2005156f50a5d114ef8b3e15a7314abfd97d570262a2c5d
SHA51237401989aa988ba3cc654f28a6895afee768dae45c14a89c6ec966a19c033e37cb5dffe34d3116cf00b4153149ba33a0a907887ad485f4f9a53f0ac5b9e65ef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b82bb0e7806012f85955e712464951bd
SHA184bb37579126f766513d0906e7e6fe55eddf6b1e
SHA256276e30f1e794c63403bbb2e42006b292251eb2cb96bc6be276a743f576023f0c
SHA5120e88c39fb14f7598efc45b0744ccb1acf044d4d20fcdfb1b4e9abbf95069e03ed5e0c895c3e9419d70bc8ce1b969c3409cbfb00f1797c74c2d5de8aac0e41ff5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532e09a49ac44a4b6a5bd6cf00e3c90f6
SHA1a5853b140966e7a7f12f955e498450214bbb2fe6
SHA2568c1036c528bf4482f79783b80ed48ecbc2aba6bd7d1aede6fabed5e24fa0ff0b
SHA51284eb30b2bb0f9a08f7e3a3eec2971675dee091867298d5b3da13e2f09310d3a92b1cf43657543937b212dd49d1b1c3d43397ef500054c6d23369feded2f62b61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5996c7ec30b1c04bd5f2bed8567d1c7a1
SHA121de699fe66268d8b95991fe3a3a844d840e1fc9
SHA256c714a11c941865d9500f71e050c7d11d799966363bdc82ac2d10d7b093b5c329
SHA512001a8e39a3a294533e8418a9c46329a4b874ecf911c93613c31a902a2c6d87f26d064f3d2ab832758d23b650738f26420e56070feb47ec922d92df365ccb1087
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56328064598d52e4b275edfef38fecfc3
SHA1c5df83492d55ad0a062016dfa0d46cdcb0979765
SHA256085c40331fed0798c1974699239ac3bd4f2a58919cf65b517c06c5de1184ec4e
SHA512fd6a404fb0b3f5022790042a9a9240b36f30d2d7bb2c22202d592b3462e7f755b49ba08733dfe49b62dd3f865c427602af60366927904ffffc271041a130e6f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2342baf4740751c1cb8372ffb057849
SHA1214cb5705ce77dad2f323f074e494e9344e7fd94
SHA25697287f6684c0d7ad92a480620f70e27a5d6c516260d55212a1aa07febaf0a1c8
SHA512f8dd6bfba6d254d91a82db289b2629436feba23493f325cc3752dd17688c5596e5b90f60b0a372b40eba15d64565d210743b7b4cb991d640fb171dfc13888f62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588bf0c7a951a516e4dfcbd569ba8b3e7
SHA12b1b5e163c00159a022acfdd574d20b7a05f088f
SHA2568462c61042cdb1f33a7207e8c5f037a1e7ad91ef628f158f43b994268a01819b
SHA512ff1646ada1234252d3d8672fe8aa9cd7621542c3a6d65cb8b423497d3f889aec550a5e6c431c1becea303762f56effc7467281b84c991ad4b31d862037a293e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f1b4f77005cbee724d9c3c1e53e416a
SHA12ad434c92f6bc233806a78e24281e9f7a8a6a861
SHA256a8cb4b764f26ebdfc520455df2e6944489d445643cc1d087b61884363e6835ed
SHA5127c28e63385387ba926c977e44692716cc08f5384636903523a15f3d860c382097e7df039916272afdc102e4dba4df654f6f1136a0f3edeabcf0a64a56a4a1a5b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b