Analysis
-
max time kernel
132s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 14:49
Static task
static1
Behavioral task
behavioral1
Sample
afa7c10bc042ef77a6189ca0d05e57f3_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
afa7c10bc042ef77a6189ca0d05e57f3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
afa7c10bc042ef77a6189ca0d05e57f3_JaffaCakes118.html
-
Size
1KB
-
MD5
afa7c10bc042ef77a6189ca0d05e57f3
-
SHA1
33102fded47688e2a9a11a02d42629fc1cdf496d
-
SHA256
0db8ac6c1271036b8bcfe6ec572402b9e01e167e30ddd6bdf913dac897776cf5
-
SHA512
93865f208b0837c4acf666c422c9926f4a5aa944d3e547f56976665284126449c863a8cbbfd02475dc36198906f568dda1f940b6086cb101d1b63287cca8180d
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430327263" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{76B5CFB1-5F03-11EF-BF10-EE5017308107} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d99090000000002000000000010660000000100002000000035ce1a2b8cc0a0fe79962d4d11fc0e3607d21ad014ae89f8c9c4b2ed4df03adf000000000e80000000020000200000002a64ddfdf33e45acfe45dbeb5cd6c32a7b004b30df70230ff38fd7bded229e2d200000009911717415f86f87464f2142baa0a6c1abe17742436540b5136c069df473d7924000000093528496a97c10693bd7734f40d9411671611829c62aeb9ca1860b3411576432f3be82e4c46ea3c7f74a00a97d7df228aea6ba4afa20a5f0b46ebe420715ed8c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30cc925910f3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2996 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2996 iexplore.exe 2996 iexplore.exe 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2996 wrote to memory of 3004 2996 iexplore.exe 30 PID 2996 wrote to memory of 3004 2996 iexplore.exe 30 PID 2996 wrote to memory of 3004 2996 iexplore.exe 30 PID 2996 wrote to memory of 3004 2996 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\afa7c10bc042ef77a6189ca0d05e57f3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2996 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3dbfcd292f69107e4e110fb27d5fa0d
SHA14245065ea224820ddc486923bd501a3661d6c632
SHA256c785a9a46faa4516bff9e5a2dd26b461e6140a38bfa466552aa6ec3dcaf1ce8e
SHA5127f5bf3c137bbba140e09db6a00b84e3e50f697f2ad1542d522e81ecc48a83cbe77603f7a3b2c89bd4d61dd1391858794f766e9271f13bc8a35f5f5253b97c7bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560e4867092afa14c86d50ca8346c4b36
SHA11887e5a78e955635c4115c19ae35898e70c6c388
SHA256a2ea54d8ee021015ea64efc7c919cc01cf6621380edb09e55645fd70c41689f3
SHA512aedff9c938f20d63e5a4bf7402137764b3a99825f605a7d8e3e8bb68b01fec44174c47b67c8ea5a4520cde48105ecb5ef1f7921a0c8d9ee3693055873de10b80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a74d3b1f13a9e94bf8992c1341512b87
SHA1cbdf24ae0d117d50dcb59396232715d307d48f9c
SHA256d9fbb2da0a4ed3f735f16d69a85a9ec7137e86a8b756f087b13182cfe7d0173d
SHA512ddfaf63ff743cd7a6384591bb16a29ae546c42299894c86b878bfbf4612f99e1de1a39512dbd60def0f8cd652a0f9f03d9928f27be469dd6f984fb11a906abbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0b2e344287b667f5daa76c664900b6b
SHA15caa946bbf724edf360f37c4896b7f158086635d
SHA256389d884f8f607959b1e6409240d52ed7078bf256e27834925e25bb60d98df698
SHA512c45766320bae6c0368947f993e1fde166be2b3c5114ab1f4b765a0b1abe18ff6faefecfffcae0fdab8f45a03b0793629c618d38ffd923a2484c7499c3c40528c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4241a4b206322aed20acaebbd78881a
SHA1ca60a36309325dc60f3389cd7422ce51320477ac
SHA25624a8111e1c989e6e47ae573232c25643223776da690a4527b5776c65701d09fd
SHA512b8c054682d229e659906809704318d98560dbd2303e8079ea92629e76b0d773f51cb0559426056f6d23f92ccec8c0f7c07e1f2181e28e3ae96e0cf571254b7a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552e60acbf4fc83a5d580fe853f607cb7
SHA125c9a1e3c4595337626cc0a1b1f66f118323ef87
SHA25643a45ef38d9662cf12c6c43e71358e4c5bfaaf25a95af9eb9117d7346c0959dd
SHA5120c2cc33b67b4ae7cfa25206ff86eb51ac3ad9519509a4db0436b47bc0123fc0f9bff2f13b55415dbf2ceb3d5cd53290da7d08f25e162cd8f23d94406790d8c33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e50ff06dc94201bf8dc40ce1620a6d6d
SHA1cba2d2c799682b219a76de47839b209ec14b05c0
SHA2561df4e4c0e25ef22c68852014984423ed311157e496ae8d8cbb12472855c5a753
SHA512cf9c2b4c19e08b520469a241669ebfb0d073a61562a0414e2fd506deff4ef30af78d17f28b8b9ad770652ee3ea3294aeedeb4f5098ebd7cf524c229616f31e5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc27f4bd069a225282564ae17b71cdc1
SHA18dd01237423a58976138f2dcc503f02004e240a6
SHA256b088b92d3f25c5920169b37b9efaff5b6a2d6135c1e2a6d9e5b2fa827c256892
SHA51232c447fa73a4cd8bc9d600c245d90053e2274c52df55f3aaa4fbbfb6aca2c7c71d20ae2c617a5159f906c8f19f1ffa4e25e3b3f034fc272b3a524e66ab70fcad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1a63c54c59274773af5568a3efc4fc4
SHA1a951e6b9c092f80a4be8146f5b70d3613101f442
SHA2564e61cb519c8c9cca957a82ecc34310a9465373d6379ddf9df5f3350b16c03065
SHA51241e92323a117dbf0d470af468ee2d268420232b93541bd3aa3fbef4732a416f50526b8d60a4b4fa4feda461abd21cf9347c69477bd9bf64b7a933809fe354c46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cf454f09259d91a03bb4b9b01ef86a4
SHA141cd49fdd6c5f2ba2cc266a49e5671145d7666f6
SHA25697e5b488d3a67e48962247538244832c56248b860730b5704a37a7b0e00fa2b0
SHA512a89ad978efbf5d45ea86458e6da33ac21ae1858550dea624beedd21f2c9eb2031eb0fed924343e011dec789c57674ba9ce4526c8ba8e2ed12fa75126f05bc90f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531a2a74e2a4e4b22191bded7708f8643
SHA16ad3c58d62cf90521d830633a12cc77652c74933
SHA25629475eeb82cf6e464b146e4c778419794bfb490a799fc55acf224633dfca5edc
SHA512cea7e35ae2b46872a3afeaac5e301e49def6fe27ac00e3dc0fd52bd34666bbd1f5ec42c7e42642e5c6b6b49d71d0901d2c25481f824814fc1530c2a13a1071b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5084a8530ac0c8b59c02a7261a4177289
SHA15be6c13f1f18d342197331e910806f68b9ffe846
SHA2561d22ebac1dd81dd710f5cfe4476a67039c76be8bbd873ca7e216ed1491d61ffd
SHA512c014e8961168573c57f14ce7e8e62d1412c8fa707656896668f7acce27609d0bfc839bcd4710fbb8e476c270233d25dc9006cecb9c9f6a9ff59bf0ab022c6d86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54454fe1056e6b49bb509556ca807ca33
SHA13c3e5d75b4bc4e308b3a82a6535f777d8962fdce
SHA256d6e3b0a5bd71164d26c8020913f72ecc9cf033836f176f354c0a928ae33aa891
SHA512b632785b710fc9063dafa2fc0ebbcd8eeaa66abe822a3ed5c5d7186a20293bf4d42f5d34509e9fbb6b5038d0cc60f4cb1ba158d8ff7d70861416798759e770fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1c5d2d36f344c9f13f7259fd27bad7d
SHA16d92016e4498bd69d1f679c8e6de57797bc30d6c
SHA2569474dcbfabd1318168baf5ed1b18e26f8a0ebb1d931b266482963c665c96bc13
SHA5122956e5955bb10991ce8407866294a372774a37c68de14eae6df3389d5764d060c623b3de5e125ef3abc5c7d27d01a079aa7a7e8977666007180729abd3ba2df3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5286ba67deb2ac5fbd8a01b5cef858008
SHA1282a0896f89d8d6f02466d9da89d963792a0249a
SHA256a6d20daecf0fc394b58276a8ac1bc8ebc7b78d7b0ee05badfa3d607c1a4ef5c0
SHA5120934bc56b4a9f482174b3a8eb90b651bc3c1d5077190b73a01779e90fb6aadf17bbc65675481b4158f38beb34e90989aa03d0a9f98c024d38264caff6dd0caa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bed8217607ed63650d7cc0cf6b68ae1f
SHA1b8f14dd19b1fa0e0e2ca5fed06f92b23d81e1f36
SHA25674584905fe2f0d1bcc81ea960d37ad9136043e33e019559eff1c8f78799f03ec
SHA512faa866038c86604757296c531bde1a643d56cb5bb5d91644a843878a76d0034accf745fd964db1d007d296efb556c337aa6048b56418b488226912da8211e3f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b55fdb09da2163b9c6d0244d3f6903d0
SHA18eb03709719f729dcb854984a4ea642614659e80
SHA2564d3d787b9fef911cd6125c2c82b6f07a8b5c6ed3189f9f769418a2c3fc3c7710
SHA5129b16f1e001112ce5aa9b00dad099244f6670abb0356173e751a4c4263c640cfe74f52732685fca6fc38f6c603cb2b6cc9e94d9b4fe22e49403ab96a8f5356634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d77ae5b6a26fcbf05be63dd0311b4b4
SHA1c06264838427d615c82afff3b71f4684ab02668a
SHA25695c6a09c57ca4c028e354ea3e01093fbe7314512e4c4018a07645f8b3c0ca520
SHA512de694356e315881e066791c2b87dfe269047a115cf1f5287c214e0f0d9dc6f4b02d2befea77ab7f3a8db25c108221e75f62eb5c41a13882b94b07c44c0dbf0bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a668ae4f8c5179bc00a1d9a37afbe7f
SHA1a20e52aa23d3699967ba4accc1577cd5066a0ee5
SHA256839b5111afa9c059a4ed3b71438e19dbefc3c01ac34358fc5ededc3d18fd2d19
SHA512452af474b64fdb4cfa4fcdfb0dafe369c5350300a567afef4f419fb3a361c21a34af41ecbd288c9ee8801edb50280a15c808e64e724398bcd762747208ece9bf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b