Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 10:51
Static task
static1
Behavioral task
behavioral1
Sample
aeef2a682748e7d6c6974f0df9e325b8_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
aeef2a682748e7d6c6974f0df9e325b8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
aeef2a682748e7d6c6974f0df9e325b8_JaffaCakes118.html
-
Size
2KB
-
MD5
aeef2a682748e7d6c6974f0df9e325b8
-
SHA1
46592317a0d3085742a685a448f1e8267d00c82b
-
SHA256
a8381b71879e7290e74f5d8c072cfc88c40b6fbdad46a508daa9817b3ac8606d
-
SHA512
55c797d4b635ca17d69f88dce87a38b315a235b7674555360f0370f27d98449f647e9c318e349994827f0a49518a7b013606f65e860f01995f70e86ee5dceeed
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0eb7906eff2da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2D9CA091-5EE2-11EF-9FC9-7AEB201C29E3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000bcca200de4bbc60139cf6b99a6e03abd6d143161747df2806a9d4ddf1eeea55b000000000e800000000200002000000010fadfbbdc434a20ced9dae41e76373a7a0635cf98fbde92cf22c0c031df0e7c20000000e5c90f44d93204b58077759aad010f930f4f71c0b61bd1af9a814f7196258d1240000000419f4916c0cddef877337c4fc7338c601130a5d74cb372df46eb46d78fab88ad04949d64eccc98c723172deb43c05aa78b7072d22cf18272d95c33cb35ce453e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430312967" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1716 iexplore.exe 1716 iexplore.exe 1296 IEXPLORE.EXE 1296 IEXPLORE.EXE 1296 IEXPLORE.EXE 1296 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1716 wrote to memory of 1296 1716 iexplore.exe 30 PID 1716 wrote to memory of 1296 1716 iexplore.exe 30 PID 1716 wrote to memory of 1296 1716 iexplore.exe 30 PID 1716 wrote to memory of 1296 1716 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aeef2a682748e7d6c6974f0df9e325b8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1716 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5276b832964d5a8b5b2f11a6e4e4e81ac
SHA188dc2f30432de8d09da153d0cdeb42dddd9708af
SHA2560edab59bd31d384a95d46d127c1e7b03c0528eb3d2e006be30062317fc26fdbc
SHA512d1c4a3383bb593099353f36a03d55116eedfeda8357119935f652951a848ebebbc414f92fafd09fca1ab990fa4363e469df4c7e098df353a9896d03542cef83c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561e4bb09de07e2b9df7de20e1aa2c91e
SHA1f24186eeadbb959813e59ce0a9926444048eda69
SHA256c85fb54f217b78c07ca3b6827d842554465e9acd65a0d0c20692bc2564651716
SHA5120dbf360240622914a19e12453692a03c3a9f04c91880d0ab7fd46ae67f45871608a39e3c6b5fe4fae2efba28e4089840e696172dd5c4293c9f58947ddfebbb4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510f547a79a5e3e4b17ca6e9f44ff2e25
SHA1de40dad37f6a85df592b364c33e29e6da15e07ee
SHA256afa24acd7297cf32bef39e7fc567a88ce7eeb74a8b713bc0ba134554d4b17e79
SHA5126b93a43787917bf03b6cc3dbb62754a3ef35e9186cda52bbb86a6a716c1e30e69aff743bb4bb9d5954e7a1184032f89227abd94f8ef656839030bf12902c2d73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560648e9dc8a5855a490af9f1b9d5f331
SHA1359cce58ba328b3fe0a6a509d5231ac34aa8689e
SHA2564f7c1fb428bc7b9bb61731dbd42ccc499343fb94af323818ef98ba992048dbdc
SHA51235d5d4952f71cc16d4dc46874237574d0803a6981318e849a3e0009a179bbad1a6b151ef7905c00f84e2715783796b0d0755d64ee2a3c6749accb083c6e893bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb14b68d371f6554c47f31fbc6dcede2
SHA1801b3533255a490e8f8e7d2c29deeacfe7c9b7f5
SHA2569467eacb72694d46630fc179dec4253d6c48d412017d8902cd9ee9a635767318
SHA51210bfab0506d7ad7fc9fcc627d13388699855db2c4a47c4beb702fbad4edc7c17b3df40b0fd9d3f248d5b071adbf25f61ddb199dc2b73aa28549c2850cd5d5d2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a304688944552f0fdaa6cce74ade8dd
SHA1f37d0705181c26fe3710efdb5c0d40f5cb5a6a5a
SHA256fb7f953774d8820efd4fb96f2883673340b8990fb4d77b599f265a20fa563b40
SHA5125970c7b34e221c8b45299c1fbc89408fcdf42e9230682b7796116441b27c0560b5a84f03a2df1ee2f4388bb9234a10e9710e6abcdcd9c1a681905ade322f2c43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523e4b7b935fbe77149fcff5c55ff3b67
SHA142b837333f065880abdd1c6776e6646d0b10c594
SHA256637d9ce8c03a3fe6d0cd4ddde66cd2487c661f42a4039cbf23bf13a3283ee58b
SHA5120e694aeb0efff49113f10144a5c9cbb4fc1a6d2505e98939908b5b302bdb501de94cfa440ae1c9e37323e6325cd062999567501604a7eab26e9b86d8a0e70e57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b0fb102673f999f9c3f26afba70e265
SHA197a88dde09db01eb5b33ab6798e2f99eac5f5206
SHA256155bcbf98f9cf5db9c540eb42dfb0072b4696eff7261923957690a1848ef9b8d
SHA51298b8e2856008163498bad5b197233795b66d8b4047a2eefdb78b9dde1234992403d7b9072a0c686a4e4c6771a269402764f575a9d9331291636480055fb2c643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfcd8983b030bd4ba0820024eb9624b8
SHA15dce38d33f7328fb738c4df563144cc4759dae5c
SHA2561c8226008e03d264086210e72498750be3e5d6100e40c22c68e48c2bd5881e6f
SHA512394f2748b1b8ae33c565bcb5d209ffe2051b278698a68fa8a6452edb0284d6115ddf2e27c15d0e34f53a3b08d898453e5a274df41a51de45f17eeed6258c8747
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50903a755e3c5f77a3762c48febd8d83d
SHA1dcd1847be663f5aa4f611dd7191f0d6afb36f88f
SHA256591f447f9b7839694b14c91dd30e1acdb477327214b4ad49ad0cd7e406b65c48
SHA5129eaafa0948f63937e19a1db595a714790da6078c40045c99b3abad69c1dfcf46b1190f708150480dfd0285a5f997822ece95122d2cdc5a3bec6c400efc2d1725
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534a83f26cfd126d9b79c440b38dda0c6
SHA1cb4751ecf1eed86bd6af6c6fb186928e3327b2e8
SHA256e9a65c72bc3c9ff9d3993bea5d86ebc28a53b9c10f3997a94b2ceec6226f5550
SHA512ac593d1302dc87db96a5f39546261ab4615e60fa327f30f2157f7b806ced574477dd0e342e0edf95f1884867fd2686cb214c01106b34c424d461e84d85c72a82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598f6d489ffb647a702e9479aa8db793c
SHA1040cea1cea69fb6068ea83b0c926d070e52d6869
SHA256e0568fd6405dcb5697fde1ff328c68ac630273e9c81e5d37d4f2d6287abdc8c2
SHA512d349104fc2f5f964a5119c62bde2260267a446bcde63bb98b8bf84db40be193d6af9a6cea69a61118ada01d02ebc5edab622488592aec78525421a3ef262033e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0ed0d1249ab25e2742668c7c3b7df11
SHA1f50f6e21fa462a1d852146f93fdfe209e23879a9
SHA256bd8edb264934562eb7fabccde48b697bdda3cb77fe0e80a49e0da97d9899d9ee
SHA512c3909aa56e9a155612f3aa9f2943ab9149a065e66a143c983be953d3916b687c05a321630b6102aa60a97a3653b87036c2e171143d03d1907d1f3c1a517a03a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521796907f38aecb47f7490fa528e0f11
SHA13f50fdaabd6f785ce22cb0595898b60a85941c74
SHA256200ed64430cde95089f6693d239ca1f2bcc6746fd92df9aef7ed3a8c0fc82cde
SHA51238abdc439ad58f5d96c0fd38040429f3120b0dc7198f525c75b264579bd3800f37dcb9503d012ea7749336634be6c376b98921340d98d696aa0c1497f34bef29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536e6f87fbec8dd460be92b49af52b973
SHA12671c0c5ddee948757a8c258ef0a6bbec88c8ab4
SHA256a8441a1df92872694a01d47d0710e2bb188bffeb10943ecbaf3935c0b6f2ace2
SHA51212eadc4273d114ecfde92dd92aab5bad1c4ba708e7883bfa4da902e8e74fda07b4026d082c0acb2239e626923ec3d28e3d5b53633ad7a5ed7277e092b8ec8013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51837bb6ba61ccded7acef79c4b07c775
SHA18362a949576fdc87d47a42f6a3d68db1be7ca860
SHA256be9c448968bbafdc35cc55fee9e3b77ef68237c093118ff6e2d6dc999479765a
SHA512835032410e9667ab5df1d91af348d5d8b8a2d80870faceb19f5e072d3d4c1345954a75b9f9b9bc97ea3bf2b9622e943d503440d1de078333816e776e6d737128
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0eed0aca1b684f0aeb8744ee4d014f6
SHA185490d596c138fbf204d8c9acbeeeda76339d117
SHA2565c8e304a1e4506db7b57c9e9a14ca8630d6cf333317af13956ce36e640c14b47
SHA5124d1aa9ba0d6ee430b5743001b5e5890815cdfc84ee32a216baa42c894d5ab1b2aa6e63186dc2bb16af4a19c0fb5c881ac4d6c09a6f4c409ed7d42db4f45ffeba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582fc7c2d9e86d8b07379fe860e3e1480
SHA133a2bd0079dfcce04c7ecc686554b57930e6a371
SHA256eef08013344780dd0870c7ea98811122988ba2ef78619795fbfb5ed71965b922
SHA5128f2a490c0bc8921a4cb53e491895353744ba554590fafe727a5188d9ebbcdf70d8a61e5424c6c7990e5111eaf413e6479d2dea24c36706b30409be580b9873e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5368d1f14132697d672887109ecbb9c95
SHA1296621868d61e069c5466a196a96c11cad0afe40
SHA2567e40369866f46150912a6edb88bb4730a2e7a619ee93fd88e9350b4c25fa4cda
SHA51290a64f1366ab408c0c22d3f2542d381d20c3358c3b71b01a8f58ef0faea6ad61d6ecc96f5b404745d82dfda0a8482b5f21ce7f35f630bff5981d1e82f933c2fd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b