Analysis
-
max time kernel
119s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 11:33
Static task
static1
Behavioral task
behavioral1
Sample
af0db193d13ec1a47db6ad1578dab32f_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
af0db193d13ec1a47db6ad1578dab32f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
af0db193d13ec1a47db6ad1578dab32f_JaffaCakes118.html
-
Size
2KB
-
MD5
af0db193d13ec1a47db6ad1578dab32f
-
SHA1
d4ea9cf31c8a3b541ceded26f87b25cd4774be8d
-
SHA256
ef040d7f5d6db63ba55375d3e8be1f7f8dc1ea229506cf2e8d76b66faab280c7
-
SHA512
c55ffe4e4f18a2db3a28b74460d0a03674311c7717a9e0691762b32adee6262f8400754d9224278b6ebe49572579c19f7908e816e9ff79cf18bf3319b0626f2e
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0E0E79A1-5EE8-11EF-9438-E643F72B7232} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 103901e7f4f2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430315493" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000057118cbee712d594b255925aa2a1a33ab776d1e4aaba4869ff6183a56fc0c343000000000e8000000002000020000000a04b69b3bb38dc9fe1e293306c6d2b9ac978ce8e3071ab86e720159937886ea820000000767427fcdeb96215f7938082d5e9f12f72ecd8a4d5d775dd429addf8afc6d78f40000000754c18f0e19e0094dbbbc1f90a8a7746e76441c0bb0b90672e1a4e6e20bbec56702e463e5942b1e62757b84829f9b505daa83632a699c6494f83bbc8edd529c6 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2436 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2436 iexplore.exe 2436 iexplore.exe 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2116 2436 iexplore.exe 31 PID 2436 wrote to memory of 2116 2436 iexplore.exe 31 PID 2436 wrote to memory of 2116 2436 iexplore.exe 31 PID 2436 wrote to memory of 2116 2436 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\af0db193d13ec1a47db6ad1578dab32f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2436 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f3116e8b561c9a3fd148d93e3358596
SHA1b07b8b22fb662b2a338999d31bf9c8b22a57b7cd
SHA256ce913433ad58ccb72b9558bb61fdfe50984ba92aa7be10f9606d01e5f7d66ac3
SHA51262a8917e838c76fc31c75abd2024615dfebf983835e6607a115064d3f69c02e8a3399e4781cc20fd62dde328db79063f2e7654779806cb7e564f620b3a9ccaff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ebb94bdc0a18d655c5ef42a5dad0691
SHA168785c211b01950d7be597b05aec5815d920a94e
SHA256e68ec34cb7b9f1ffba24fe5ced60fb3d04ead1562a85e89457340d36b8d4726b
SHA512e4d80caefdba68d093c99e22d2fa13a83e599dee6c5ea01661116dcd682ced4b3a9a1a2e376af149d171d077513db9f60d6d2a836548c3491a51722f06899e6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1547af9570d7d60ebbaec7d7a18f783
SHA1ad2d3f23b91e1b13ebeb208be95e6d8b95dcdff0
SHA256d27a0bedf43e49f10ca3e8a5feef7b10f509509855ff7681bc36633667f5b75c
SHA512c897075509011b0d01130f6cff0f99efa73ddf92d55e136b6270590ca25ffb117ebaf2c4187af8124302b342310bc0285d4881dfd006309c52836648ee9fdddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2e66c1000e81fce75010a17ec9ebd01
SHA18af02591e910d55225c902a683dbff6c8812c6a7
SHA2564ae198996ac1b2b1ac2cd90a8fd0d3f799fc2d536a5320474ba9da76468b3968
SHA5129f3744c04e96321dbd3b5d67f52aff1a12e2f6939afabc2e2a3cdfaacb553d5585f2eeae19b537965acfb8addeb04b70d08e580c5184bd2e352f560bdbd79739
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c76ba16e26de0e67b0c50386dc861c9
SHA173c23ea2cd07f3af104f4cda3435aacc6f2a7e01
SHA256e94b56c9b96abcbc2512a1fdfaf2890249d5e4dc099fc15436c963499b3f8e27
SHA5120bcaf13b4a3a3c3ddd8f21942dc6937f544c48667d748ffebd99fdd04ef2c49f4d9d3c65c7f9492ff1e4c74a81d76da82c92d41a1e13bf8a0f936a51eca12ab6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559a72912b64d9f6a378e0ad376fc3814
SHA1badd3f104b8a112ff10624dd1fcc4bb8c320bc87
SHA25661c3f67edf6d334ee5527ea3e09ae0ad4524b0f679306789df97709433e53660
SHA512f34513fcdca8087f08ff352801286a83fe044a3ecd7fb9a01fc2e8867728cdbfd93a8be515d5b5c0db06dcf4a0dd524d9dc93584ea0ab2330186eb27a7a34e57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9376b1c7225c101fcf752b452411d75
SHA12cd7db92dda62af090aff0d32d9fddfb0d8190e7
SHA256d41a56e34422243df4addbc5649c7286a24637dc63ba7e35502e0f9428d54c61
SHA512f590ca8d1b1f82cf100bf55d38387588dcda92b31757e6c7e5329d8c87658db191572b1e7970457bb0ad04b90aafbfd7eb180480f2195edb44f4cff85e5ff31c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504117714ad76f9e11eca386239516ddf
SHA1290d1b91c625a1f035288ed3e59f3091bcc807bb
SHA25626009be2f56b16a202f1b4272cb54727b0568104b0fe673b3edbefe89a83b244
SHA5128455d52f81b1932cf9b3d96c74f6744bca5c6859e38a67e7e44f8f5045ab04459779ed9d7e78b65e86eb6f735abc86f7b93d29d7aa7c7cbad1907d62fcd74bbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592dad4e9de61f3dde7a622effd8eecb2
SHA180db6d3993c6fb0417511be6e79a9b489fd5188d
SHA256e0e7a467ff6d685285382af71330b8a4895392ea14969e4909a55150dd06bdac
SHA5128b5ada87fcb3c235a77e3a6e17746662067f43b5f2d7ba8c7820604844fbc5dbb4a452dacac19b11b07c8f2ced8b3f5369580c90f5de51f729fb2cd8232095c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543d5c9f9c8c8615435b1ed8409e2733b
SHA1c4a19e1c2dcc431204e9644b21790a5a729b7ff4
SHA256297529b0b9677408947cf82210ea5945123ef45ef0d0d7ea7950499ab5246875
SHA512f9b4c93230e0b1d465b5c77692a7c0968018444c60c9fda8974164dd2346d135e5522878f90e851fa8daa91b6e0e6e2af072a5a58527a69ed84d5a02fd6bfb29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e78291c47558577b20712563dc77250
SHA1c2297439f0e862af176ebb42769bb47ec1dd2b69
SHA256ff56e4b03ffd07e5e0d49745ae4af1f1547bb11e08747ebcd84b1c4604276f48
SHA512429e61bc39e7ffa8703aa723e8ab9dd9e7f9f63313da7c4ba1711c3577fe6456c1dede34234029149e45c71dfcff1f29a85a89f51018dc4d3067ffa0da6586cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5765599a744c8d92844376bc8b168fc40
SHA199c4ddf4ce338557cdbd4e8a678820b84eddcbc6
SHA256eb675726425bc1525490099f9949981f31006047f2c77e6701ed542bfb44d46d
SHA5126cad160a0f3c183dd85e39043c6bebfd368ac53998d8726f9709580a6f2394240ca40246ee36e080c8b11e25dcdefb0c6a2c672d096623ae773bc67671cb1f9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519fef48b5f6cd975fd74b4155a8e99aa
SHA1ac7bd018262e91235d05e0fa03d7ad74d243e972
SHA256fb662f2db97d13c5c6fb9fab02e2049b424ef0953000c89b7c5631f9896ba2b3
SHA51219a351129e271813c7128b28c7ed78aca9a8a2ba8d1862c7e381cd2f3c83f10febfde4cb98d80654a56bd9652e28e7c95e79c8657df3a31dc1bfad8146e1145c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580213cf94a0f934b90613315ce1f7f5d
SHA19cc872bc8c6eb105b81480e6b196b601371b6258
SHA2566736c2df728f678583f069bbb3bc4bfce8ec6a617d451642b6045938c5edf720
SHA5123deda5f7a307e636a57f2f2709e771daf80f454903806b8a32bb90061b47df89e3d08dfce5659778fd3483453d470d36ad627c6264571a0c74635251a024928d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8c3041fe57d68c49244640413a99633
SHA15632c54fe0126bdff0a74ca505706db570926d1b
SHA25643bf1fbc47fc130fbfcbeb70f846bc064492f7f2cfebe364c114c417ff264001
SHA5127fb14051822c9bb7cb9067d932212c7cf2ad76142207b4be5b23643720083d726fe3755a38995e626129113b9f02ae5396eab43bcef5eee99d076e7f699e868b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a90d8b472a60e9d9ccc0413e73d4eca3
SHA1566c204428db035c219f5822a63489746ea91905
SHA256637ebede0773880d3935ff6de1f9f093b2b39f9cddb793132cd63b039cf9b2b2
SHA512c5d495a98be5e7a2a2583dcaed460957d4dcf81f368270b177480a5f2ffb9cd488cc2c7ced9cbb1b5387fc2ebd934695515f452736048d6ad1a31062fc86da7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bcf3578e9621cf02bf9a4b299946de9
SHA1578c9005e13e832a175ab30cd3a6ad3af74dba6a
SHA256ea1d2ef218a2d85063b6c898d833c76f33d94bdc71af48db8ddba260a01061b1
SHA512cb4223c853093ae9b9c9c1bfa23c237a5c694150c9f54c1fc3043ef2e1c270d28be51ffe8d7c5a7c092c10cffff163763fdbda388801845474cac3b46a284778
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4aca496421a2235ecd1f428e8daa0a8
SHA139eaa6f8cc212d2502e287009a3765bba2038041
SHA2565faa5392156fc025c3fa493f5151c17c1e02d1f24e5fe374a44bbf5ec47ce669
SHA5122280a77df65924d0bf59768f18e6999c08b62c61138d9772011db8b52c9fbaf746ade3eefed753f5b42dddcc82658e956398d25e863f974f62567cd037eb3b71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528bd0117a270d09f67791fe06a160cf4
SHA1b511060d6321c318026f1ba32f5ec316d047a122
SHA25664a09361a8c3f35be5308c83b15e0bb25a72f85a1231d405deb1359bb893d92e
SHA51279ddeee309f8a3e7a38dc6906c41eb3dd1355fbd1befb0754fbbe70a55afe98ba7c78c3726ec7fd33168a7044e096da202cda29a77f2808677a348071f40a6ff
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b