Analysis
-
max time kernel
134s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24-07-2024 04:31
Static task
static1
Behavioral task
behavioral1
Sample
6a3e9a6dd6359792379376cd06928af8_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6a3e9a6dd6359792379376cd06928af8_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6a3e9a6dd6359792379376cd06928af8_JaffaCakes118.html
-
Size
71KB
-
MD5
6a3e9a6dd6359792379376cd06928af8
-
SHA1
0ad49f60d5a7c6455dd213fdd5887b7f4551f15e
-
SHA256
89e51f4da8c57cc01371829433d36bad5cf87f41977c809d50a2063022e38586
-
SHA512
3bf6b422348d5581878c00424f394879936d4454df25fa4c3ff05c36bde1b1551f5d1594a1f65f225e5bb727ef223a20ced32c04fc5c340f92f239181766c463
-
SSDEEP
1536:tQgowmvVjsP32z0yI/AY3QTAjfmEK2RneSmeGkNHGnPY5M8c:teqGYYqQTkfRHQSr9Npc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427957373" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0fe0d6a82ddda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000e91f621315abb5459f4bc959af17310eb3c767d5863365294bed50aece78c4c9000000000e8000000002000020000000e8880ca205c3000f61fadf9b6db9f0154327a7353d35b8fe71f6d77415024e5120000000ace18d5e9d1ccd8d962bb611e1c63d2d1d9439ea1df28184ad3c03a10bf579594000000011bd01dddbbd6ad6611863a74131aed130a9466e267ab1a8f53f4758cb4e4273ba011bcd3a68e44cc7d269fddb37e04b3d03de3e7e06755db135580333f30a83 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A23515E1-4975-11EF-93F3-6E739D7B0BBB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3032 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3032 iexplore.exe 3032 iexplore.exe 1200 IEXPLORE.EXE 1200 IEXPLORE.EXE 1200 IEXPLORE.EXE 1200 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 1200 3032 iexplore.exe 31 PID 3032 wrote to memory of 1200 3032 iexplore.exe 31 PID 3032 wrote to memory of 1200 3032 iexplore.exe 31 PID 3032 wrote to memory of 1200 3032 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6a3e9a6dd6359792379376cd06928af8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534ba3afb341e8d1d94e285f04d96e2e2
SHA14f25db339f182e9b3f4bcd1b208b2cae4c16f9ad
SHA25652c7cd7ddd9fff4401f81e2115776af1ce34fc50e075af6e641f641a52bda683
SHA5129dbdcf0687901f15527aae9ef18dd532c6ed308c0c9932dcdc121fb86bb18bef0e216d0e19c253e0bd7641e04d1bf5a498a94c31f07ebce3f7f9c8ed3373d80f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ede8077d478a3ff312b57d0dbca08620
SHA14dbf31dfffd24512cbb6ab6d4a69935ae11569f3
SHA256f187b3028e5fc681cb74536b536fa7d7aaebb2a49ae69969a0edc4159f073db4
SHA51228f8f385d5c2c13fda2dc8aeef8aa0a3bb88335511f7b7aa7f24a2ab04921e315dff7f1ebcf59f13807c9c25a6ac202a65ec379df301c6df46b1efe677758b62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562367779d0d207bf4020407a28c0a165
SHA1a72ef8ec74a97d23c23c52d3b8379bc85d826d48
SHA2563ecf45e6159f45557a832601078aafbd56736a04e4cad881119bbcc8e2fc3ca6
SHA512126d41af88689d70d5853847d9bea1d7c7b15b4bf9fa90424438219af5df64e5b9551702efdb6be2d7242b01b3cc63b6f8ded0bbb00c4f1e28903527bd3f959c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c50b9a35d694d1355f1466e429b8d821
SHA173876bf8e991a238056f3a0550a712309593c1c4
SHA256acbf5fbb9f33271c2c8bff472bb10d660bef533d79bd6051b6cb9ab1793ebb69
SHA512e294a6590a986e79b4eb902d060c43f9d525948876d5a9b3d8a3030f0327d44fd4a7a2ebde502678199dd7ff75781f3287323411c4c45edac37b16fd7f8327c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e57ffaf81404a82388f751ad45f3aa39
SHA15202eafdf65a6046b6de683bf6d57310b9db1a14
SHA25680cb006e1cabca371df096829bb7674064d9e214d1b9957da45b012d37b91f8a
SHA512f41049497e531d8d14f6f0cd1118033403b4595f0e4ca7cb534785368dbd7258a3e5ed6cf4c87a8101f9b6daedfe9e9d04d435735096e172338fa3a7a613978b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57249cf30647875b7550156b096bf8840
SHA17f6141fac9f2db1be278c203c5c1b2a06a24588c
SHA25651d4bc3d11a248b657e7605adacdc89d04fe11bf6df78f2241ea950fd3066045
SHA512f6a083924ef1e0c7442ebce64d5e26ec967c7bebce529db401d8acc58bdf07460ebb644b64275d93a8f50e2f286feaf50f5744b1ced39ede8782c0f7b3d5c252
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd3bb550a51e5e732016eaeee13d88ac
SHA1bba6345029877016033aeae80226c6af5824f33e
SHA256414f98d4a0c1fd9a23c398261571746e9ea45e0b1e9a3ea0a34738d9919ff122
SHA5124e0b28af6ad40f536f7f70078ab1993cb0f2fadd774535828992188eb796ff3bc03f4ba8c5c3262a1d9641274ac301b320ffd4c1b5395fe79cf0dbf86ba6b150
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566b18f1ecefb0eb991e3245214822db2
SHA1a7fae7a86787798e9a7c73bf8a7eca9eb9bb82bd
SHA256562398dea9ad6272e9d69b1b35f73e455c1a65a33967a7a71d2fb8e74fd8af8e
SHA512a202ad8b77549d8aa52742e04c37514d6cfbfb57d172f2c4eb7fc19d34b55a60a41ee9f5fda92fc8b603aa9f6a2df0b82656a756b251c5f8e7a4a61f343860ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58eb2cd2f058aa0a39d9f82aa53955398
SHA16532a10b6a71719cd7c568e203e2ffb22f07b56f
SHA2565050c12af512b11ba364dd430e8620c2e22af59841a863fb13d0e0ccf42ddc92
SHA512315595ffbb3e838a1a62815dcf6eab0d70c7f1a6470444271f5a2876b16d9ddd2e68f86370239a83d76963f89e112a7676d47e681cdbcb0ffc2fc2c1421db6b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59928f3759d3be0153353c2816dbd1785
SHA176f7e96f4b0ef771b7d17ba71a59b300245f1458
SHA256affba4258944401f18098670656d27584c6fcbb7d566f289d3086656210e1d72
SHA51243214a36daa40f48554c311a786f3614318a95ea31e5b7c6bcbc7a344ef31781116244a3334c768bd065e67f703eee6d61f043606252ca97b36cebedf995a655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c64f6aff9d3a539ac9e9549222bb386a
SHA129bd77f1ebad1ee5471321eca0ca47cfe12605f4
SHA256db9cf62de426a2f1efd9e46da7567a092ce2999b1a87c67a49409170a66fe041
SHA51230c1cfc776a413c21b4d96a080bcf9d43d9553fe73e8a2388e156f0e58c5ace103ef48b64d09bcf9d132996132a841be1c29bf1f32b14c18465f55e0a83376a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5983c31a52c81a1a400199e1389a1e2ec
SHA1252bc2a54e038cc9616521c1d095c86bccf9c765
SHA256b9d130579a6dea4c58c9bd4ac5f5fcd601ab3b4b3a1c9ef25e59f786b386951d
SHA512cf305d5d8c82275e240e29a0f2eeb6f368bb6361f3f1e6046fa59a3a2031eb0d9917262a84c4cad743e3fb7f5c91539160af394df091be408c7b976dc12185c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c832ca360019682d23f70f57ea09dda3
SHA1839e3f2f413260d23f7075ae556d8966a223934f
SHA25683eb8a800c727d5fda3445ad3d5afb1e6ad298fd9a1dd98259ee99d939f952cf
SHA51259573b2ab57ae5a04a5b551bd9b89ec7b75695414aad95b424896c89fa58d7d2bea42806fd34269e84deb1aa33ecb26f725e3399adcd2cc08810dc950a1670a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feb5d358eb5fd43f194ac36618f06c1a
SHA1830d3a3d1f0aa8448d4fb51ea359675af3d8df8d
SHA256a0650ec91e700b01527d59b7a485d981bcd65f7ff4712aca4fa1eb863edb81e3
SHA512e2c00eda73b15fbe8e584fc7126f0923c35227f5525d6259fe5232ae5da3cd5a40cca3dc19bffa20e5640900db1aa851b8b103c9fb85cd732f35f426dee42384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5604a8de2334c11f729a76916620ce272
SHA1fc70c83d0a2976778df35a0b7029530fa957b910
SHA256b16fb6ebe0007b8ff8269faf1047daf95efcb5f559b6a411df559b2b4940d610
SHA512bec5b2120c5ec9b845b6ea9e48a420530072b065cea218b5ddfade77bfe2d842038031b0f673f7d12e5990872c4b9271f41e468ead873d5d5648b6301444764b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58559e671f6cb68de43069b7fbc022c60
SHA1874f8d127cff04307d34028c883a293ebbdbcc9e
SHA2560fc3961318a51e8f9213671c851d67086e7c4d2b4b6d0ac4d2b216be2196e421
SHA512a104f58d6bcbf118f3621362cfa367fb9529e41c4e87b637777602e79ea508ada5e0018cbcd41b497ed75ee4030b0878ddfa2d38f26ac2cf6e3090020fd06e52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52743921b1662bea8ffddcf08e53c35df
SHA1c1ff778adabf1a4026dad1b131fcdc0ce812456a
SHA25603442399a355181418a5904c719f58ad37a52b237c305afd6f49678e35048835
SHA5127fdc6f1e7b4921016c834136161e04052ab11526e8fc55781da88ea82cf03ab2c7c62b0afb3f3ebf3947032f022564271afb21f87074a85f6629de28417a23b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbcccf77e51a0886e3537131c209eee4
SHA121c01132fff3f58ead3076caccfcb704d7a63da7
SHA25600fdbdc19e3975c2189ee96a845102dfc4055566ec4a0bbb712c339b830fe050
SHA51270b84df16bde7aa3d35a9dfc36350d54286c231e3f192731728b21ef0d5fc3ed4adbe315843c5f5ab40cba870ead1e46bdce14c3997020f3fc01ca94e8ac1d6a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b