Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-07-2024 03:50
Static task
static1
Behavioral task
behavioral1
Sample
6a24140006c1ceb42947a6328d939d64_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6a24140006c1ceb42947a6328d939d64_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6a24140006c1ceb42947a6328d939d64_JaffaCakes118.html
-
Size
9KB
-
MD5
6a24140006c1ceb42947a6328d939d64
-
SHA1
acae79caae4dbda80bd2dab94e3b81f81e381d77
-
SHA256
189c54f6469673252c4765b4c9023f5d03a3afac86c8ad63c8d8f7ac6d2e6919
-
SHA512
bcd1215587fffb3bd2509de92fae1d6aff8a2a969b187f2ee90f92735fab133d1a9251d9183abaaf4eaf6971b2614ebc3aea86951ada6c561042e031a30a10bb
-
SSDEEP
96:uzVs+ux7J1LLY1k9o84d12ef7CSTU3GT/kIIhOp0okHlVHcEZ7ru7f:csz7J1AYS/GLhUjIPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427954882" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D60EDAF1-496F-11EF-8FFC-DA9ECB958399} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000007e5987f73f71a937fede5c36e83dfa2bafb862f4ad7a41db2dba0c87baabf35c000000000e8000000002000020000000666e43620210304198283639742f6fb0fa270039f0c2c760a2022ba904e3691120000000c2086c4804c6145f94d37d5cfab8b3b82445589ce652a28a08233f26723b84f840000000deb90eddde0222b15e100cef832478cb035c67f86765f816ea461682bcdcd4cca32dcf931b38913d0e5f5c8a5d74dd4fa9668022bdcced4f1440ab9b69b83ea5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60ac8dac7cddda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2348 iexplore.exe 2348 iexplore.exe 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE 1540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 1540 2348 iexplore.exe 30 PID 2348 wrote to memory of 1540 2348 iexplore.exe 30 PID 2348 wrote to memory of 1540 2348 iexplore.exe 30 PID 2348 wrote to memory of 1540 2348 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6a24140006c1ceb42947a6328d939d64_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2edb79b215899c5edae7e86c67b0d67
SHA1013907d990d84712fd88ed7ded1f799b87e0f34a
SHA256295ccdacbf803d75079eae40c155ff8f27657ee1498fa20685f62065ac9d20a0
SHA5129eae81b9a274a23e56c094cfc3877f8e3a26f76ad75bf1dd3b25b7ee696342203984c8224cbedd739d047ac364df833f8ef39e053602310c4e7e8906289d17fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59064f50c87c5ae76821123c04b1babee
SHA1485004b79c6537b8b3cf726fbe589ed867420fd3
SHA2569a81ac40dbaa0328d754494c3897528f606d7b0ac258e5ac3ab5de62f3c37cd2
SHA51259b7c931a2749ebc1c387638bcafa70242b5411c7fa12a8c48bfd98d905a47bad66f4fb0594fdb1d524df98be98719ac1ceaada206c79475d8ac99d3cfe7e549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d69a3f208f3d105b3975cc9bd146adb
SHA19c8ab48b66ccbd4f532c9308b0b726b86f9caa77
SHA2567107a6d6d4b52e5ed93b784607fe88fb0fd3c5a8b74d9c69653429e1c1f7a60d
SHA5121ca69d6a7caa62157735caed210d23db3de72bef7f4bba0b7cd86faa1bb6dc69d320c29512e1efb645b5f5ecff603a7693668f4b0100148ab67ca35575ccdae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f88b959d5d155c0dd614d01a978348af
SHA11f59e40488b351674aff5d0053a0a627f12e652a
SHA25652ddc04fcc581d0c241871f7f9fc69802e8b7fccd770fec18e04622b8bc10937
SHA512fc272ecc24c786c1ecbe81251cf3e4c5c27ebc9352e41b4197f215d1411cfffb3a0640802d93d6bae0a1209942799e24182988e8dfcdd4d76a32bf8242643a4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1a6e06e1117b5772d0fd3dfc52977d8
SHA108bbd3e57ce1bce7ae0cc03d63690ad512485d73
SHA2562ee9df3e49a1881a3a361718d98444a73d37228aa909f5bb9b42197c0e828e0d
SHA512dfe65b8b0108e7de0dd19d417a4907e4df012c4c274815a59dacc44603f21b12aa1b91e3c176f0bd04791f6be89df7824c177fecf11a458b8a7e8205cb78771d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5513231fcb7567ff354a13d4a085ca3f4
SHA1d7c1ce9690ec040972eac8774fcae0f737808b20
SHA2567476718934861af1f46dfdef88ec82368946a5af8522b87eb00dd49928dcdb4b
SHA5124acb39c7d2654eb73d71a060deae97fd09158ea64b33629edc664dee55f93459808cc49429d65e19e95af2dad2e7121c1d0c96e1c2f396dd1c777c84c94a17e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddff5f4c0fd2d564a335de80b3c55d83
SHA113f432489dcffd33e160b832e99e27e89647184b
SHA2565ad87151ab4cad3b293cd79f5ca4e95af8a55daacb933e21f55afa019067a6e3
SHA512c4e313cb41114d38e6168f92f8b5583710be666cd2c185f140a684368051acaf250920b5608b1e89bdd9b089ca99019d06a227c0f819b2719753ceecd0b552e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56800d3ed79282ecfab98560ec3940eeb
SHA12c007e7c8ea2221e76d38cfabd95c25df3580757
SHA25649c53684d809407b60f01918ac16d222214eec9f72046cb749939bd3939fe34e
SHA5124b9934f0893839d2be3b77237d1921327a01c4bf74ef1fc3f5e3f9419ab823f54f84d7243700a009163834f9fcf5dd4584d1331509bc4dd502d931174a82f0d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51aa7b870c8b17bad6971c8fb4f073a4d
SHA11b299f7b12bfe1f57d39731db38bd8d2e5a37003
SHA2564f02264c69b7b645d59d63367adc090b28d42e5b4b0f6b8728802a333e999a73
SHA512e1e23dc76b847d2e4619ca7a9b5ec0cf02ed229ca123ed5f82c9afad13c71d9981a8aaa00d21f638e3353a9b0aa09d6ca25781c989e4ad6fd90630f29704779b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597db25f2b442a586dc1f947450447cd9
SHA10bdefac8da50505485bcdea8f75ac5b537302478
SHA25698618d2d274f644db76e742c6ef4fd9f7b39800218ef771ee09d504e89105310
SHA512f7687c5b7898365e6f53c22bd44c2e5c30c72fc1cb9fc95ce4af019b18528f7d495214b0a03b45e20e09a2c313c2f95489b0a4a2b6800b87a1a8da1d45259b92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564beb663614dde85a1e10cf77c41a001
SHA1f70d6faaf6cb9662c11279670f4e956d97977d9c
SHA256eb58d23c0b4eda10cdea85a4d8464a0e63a6e355b7e15f443460320192ba6e5d
SHA51285398840081e076ff8be2a1a95d10211279ba08f338be6c2c689c97bcd5be996f5fa4d87ebd9ab356f9c6b28acd669ac7663c7f129c4400f01ff16a1571dc1a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb1f1c5e2febdf5cf7636d5845cf5c78
SHA16d482fba412cc4212fc6923c9afff40fdee054c0
SHA256af1a0626c66a55d19427eda6d64e785f38206dd3e790c9dc35d573e492096baf
SHA512d6cfbae666c131bb67bccb9ab6cb7d053962620b5979b311c51e290895955afe4110617b667fac62f9bef9b75437f3062e1afca66b8f6b96db57faf95e11d706
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5105813a51a4b13a85c4977411bc03b0d
SHA14ce7ea7672b8a617166e0df18cc527b3f2d6c1bd
SHA2567f195307a1d56f076979027906a6b206a068d4a246b346e29cf66936f589bbee
SHA512a3b78e2a41b176d9fa5ced1a8ef00beeb41ab8bc3c9240d877117e1bc1c6e4a952650e4e67e900782eaa67afa7b9fb2bbf67c44f527483161da23f86e07962b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b19f1012108ebf2e491f0838d2302f9
SHA1b06cffab3f446a28599a722a938f6a90d4137325
SHA256a4225680dc2820d13a08154113487b66bf941c44f42f66651b30797765db6b9e
SHA5122c644e7e2bbfc131a850e98eca6b3183eb4e879f166c52bb4b28432f2c4ec729dd6e7035246689125ff2c6c781600d853b5c1431f705ad8eb0a41364d0222fa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54671b14b9b8227aee0e04f12d317aa4a
SHA1c4dc5c21f72359c4816fd8007c48cd886d461c31
SHA256ae4b86c789934becb1119fbea3a9c4cdf25991bf6dcba7380f55fe16253d4f43
SHA51286af4705611304f6a95b4abc11cf5dd2db200a68d9358ec48c85d4aeb04f7455670c68f825962004ca27157dc9b85c605debf6391ff92086af76d15f6b0e569a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537fccddb779c30037444411a5fed3d1d
SHA1bf2a967cf68c3a9efde4c1d35a715a4e8f41cc5c
SHA2563574aeab7c046c1097718465cafdc7c8ef813824c62d9f224a8be75735beab87
SHA5129e5df702ff960927013fd39d2270bf87d382c5937acca17f562546710b05808ca198d14cda7fe4570ab801936e3c32f55a76d9e39236ae6400bf52c40bcac7b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5b5eb2d16d42fe1ad54916212199a0c
SHA1be56e3c21976ea613e91b8edc18ec22d1d9e2f60
SHA2560218c8d48e1131e201116d4d7cdce9024ddd0c01f734ab53a05e3ed4e31c6074
SHA512df7ffd71e123135bc893871e8afdf36cf07c08409796d8c7dd22bdd6a0727334aa52725e97de7924d9189faf19e4e887cea74fd9b0ce11b4bdcb2e03c57c5dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e007893017feee8235d47aa230b7647c
SHA1347e081c6c06f8612db13d7d56e081300a17719a
SHA256033d62c1d846db6a6cbe5bd5bfdfff9fd29a3acf6be340766aa3667a4c68c652
SHA5123535c827a805ebf99e3ba64c1e986f8c8b0c0b4518a00a41b175cc41bd4a514984c41d63f83c6e2dd6d43380fae0769fb1a41b5bf5cd6c7d9d111a42b82de80b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6434817eaab827632d852e692b072ee
SHA1796fed00e1e72cbd80cd75971a3e01159c74cd8d
SHA25649a72cc33e75abe8838805709e51a0688d3b5f5afa99bcccff6e83a119e5def5
SHA512b32ecd830667de65d93b5fff5464b3f5c63fb0c265f6eddf85da6b77f3528dab31334808388926310b3c3a016e72dab80c3598ef35698143535d37d4e30ae7e8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b