Analysis
-
max time kernel
111s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24-07-2024 05:09
Static task
static1
Behavioral task
behavioral1
Sample
6a5989353e5eac8c6094e38ac791eb5f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6a5989353e5eac8c6094e38ac791eb5f_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6a5989353e5eac8c6094e38ac791eb5f_JaffaCakes118.html
-
Size
7KB
-
MD5
6a5989353e5eac8c6094e38ac791eb5f
-
SHA1
76b42c2236db8530133a93728819759c17f2475e
-
SHA256
d656e29d773e1347c84a20bb1d3ac7d5ea1db3f91d15b2cf5438709b8f12a2c3
-
SHA512
161ba8ff588b4bd58306ee994d3652586b5516221d529ba66c27629b0a4b772194561ad4e06eb7a0748f8d0e42d91683e45c5e8f1023ff5da7370ba06ed71389
-
SSDEEP
192:1ugU0NxDofbaQbd6SB/OIqoWoMFFbBbvJal8tNYLMYRhi++mziMCF7ABuIDZHe6U:1u70NxDoD7hR4wgMkp9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427959676" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FD938521-497A-11EF-960D-6A8D92A4B8D0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000006124be394b81ab9462ac02c60f10b25dd591c2bc49c182b7d8e106a891099e9e000000000e8000000002000020000000ab9a35d458f777d205bebf3f8d805a693e12e2dc415cf2437c497b7acbcbad7c20000000a19383a5cbdfc468ef8026573c05e882c7315c3f833e513ddeddcd086901cbcf400000002b5c93f7ce7fefb71bee7e2cb0b69423ba1149270f5afcf5987a0f6b7cde8176bb507a93cff565ad60a7ee503e02305a26214f4b34635f7e2f533a410b3e29e8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 507bcaeb87ddda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3012 iexplore.exe 3012 iexplore.exe 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2208 3012 iexplore.exe 29 PID 3012 wrote to memory of 2208 3012 iexplore.exe 29 PID 3012 wrote to memory of 2208 3012 iexplore.exe 29 PID 3012 wrote to memory of 2208 3012 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6a5989353e5eac8c6094e38ac791eb5f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54afa5bcb9c9cf9c8601c84328f9ecef7
SHA1fd96bb9ab9cabc9cd4dc673e8d0297043dc7f6cf
SHA256cc7a470c835f3705959f365e73a48f8552e0c7ab265505e68ff6523ef976a6f4
SHA512c77a96f9b6464993ef4a382c4c46c0d5e704bc05401732063a51117460bc08ede029b2d12d81c4e3d345eec7afb6c80ab2d34c5aaad1ba5a93cf3f080a693523
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5715f7348be8517c0ba97e52c7101209c
SHA164d1b3062227b36dbedb33bc36a5bab920b27d53
SHA25609da43b6bf3a3929b5765aaf93b3d12676dcd864d945a7d05e53f722e7e693ea
SHA512d5864af697aea3cf47d8e78302fe5f829b1e22c05925ab38257a0560b9824f9a01d083e39f5cb810330f16be6542e7c897bf77f6d88a880300b9ef8bed7bd791
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1de0a6119207307f5ba61389033f6b3
SHA1d3909c26e71e64d3f4ec65bbbf278fa5cf22359a
SHA25632a32155197af012e475869edf4358ab93fbba5949a0260e88344875071445d8
SHA51265a060a18d4c7f2f2a14011d21d329cc0aeed920316671d9845ff8588757216b5eac55160798ec0c9ec14baf67ea616247bfe9cc076e2ab88784deab466eec0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b488f0fba792b1d50ec1746f3f3f008e
SHA1111f81a9633056d8c24781045f43889417a7611d
SHA2561f5953ccb597aa4985f0682b07ee6ad4dc3fd51341a823e328c41f9462e8b940
SHA512ede37714a5e38882522e5a976dbf48a173f06fda93302b1ed1c41f12fcc1b0c8bfcf6b8c4c94f5759879b3ab7662829f94944d032a6160583fd08bd21575f8d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5550670fc990c1930e8deeb390405a0f5
SHA181a30d2f23334d7f28367dd6440782bf227d7391
SHA256bd8f5bb2c41796a4e51821ec41584743f719f76fce7f8454f507c3de74735e81
SHA5121f7128fd496685046553d34ee7f00a12820fd153b9ff18ac82b6c15244ac983d3b9f05cf94a163b8664d34093eba3cebc433039a7672e53989bc9f2c1ee1eefb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd02f0ceccd29e54e3cc79d681b51832
SHA159580a8e6f3839dd1975b8aceb6d5b317b845b02
SHA25670058f5cbc4d3be439f6c6ae3717094f1fb667277b5ceb589ca8eea3c4b6501f
SHA51285b0a35739b914c09030e7eebf70ecb19cd2a51a6fb1b57bd91f06a786a485e94053934844d04a1fa63be5daf3561205afd0bf36875d52e63a7a736bff6c48e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac883a0add87671a919397025fadfaf8
SHA19bbab09ac2aeb845ab6d0d3d00349cd8d84c8648
SHA256941841206ab387aefd799bc5f127119e96559715ae16cb741fb26971c5e9790c
SHA51204f745286a218797acf5bc68a67c78f7c1fe3d87834e3cd573824f6693412b185ea4001a92fcf5f0c364f86a3c0e230e588d2bae1f7f14b017b4c716391aeb16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5829111f628e133f608f682c399689615
SHA1059a838caf74fc0f68987031517f048c141f71a2
SHA2567e2228f461acd06d586f9fca8498dc8259a2c50b4d7493078beafb8b39298c96
SHA5126b838b1047dd8baa4c67be3c10da2fb12e198792f734d3accc8a2d41b20d666831ea5d5651595f2c18d323c361dc6b1ba7b1586ca21a4c9213a50ccab5c2ec3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5801a72e984b4735e348ee386385357fd
SHA161a9c632fc157f690e6ef01a16e5851c201412d7
SHA256d1c525dc62e0e14f1f34dfa6ea18cb8a081fdd941cc3367f92b3b9d1e5ac0dcf
SHA512e8c0f6be7f63c07e6b3aba0b4f10cd82a9aa557685e4372d1bf8e92daa88aa2563e517302c5a00861b77978f36ab4e490ecc2e5dd38afc6eb36456ba0b118330
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f0b1ec652ec5702c4d586a8aae938b6
SHA15ce24eaa1264ef82675120b210ca7ddfdfef2abc
SHA2566c582ab565ec909c8b4a324c9e5723aa8344d255b3645a3b2dbd591a12f6632d
SHA512e139e80d7d7e613ee69ed1b429cd61871d5a72496e96395857bd3299f7207bc15299c8b65bd21ce52b32f4fcbb3ebbc75ca8f1cde1a350f5950338391b9583b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54be5d737ee95bf91d27133ef31732db2
SHA1b246951557c6f1f5967cb77785c73797fde206f0
SHA25680c82db2ef14b65a12cfac4cb2327fe8e134ff984356f97c9362d007a1f1e872
SHA512d35ee8dd9d42abc278d027bd228f958093e8ba4b0e6fe0a912f10d140bfbb3ffd4332777b6fabc619b04f2cdca1d286f3e84384e3d0ebea2995bfa29d394888f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a782c197d906c7870426ee09a8156655
SHA11f374b69a086a96cf796a3e9e681746e2cc65653
SHA2568282c205c836fa75d22f0a98c7d10b66ba167052f9eece719ca1fbf6d12d6c1b
SHA512efa426a6627c33363130f338c359808c66115dfb66694b59085406312bb8e67f2d375bc1331221c1a389a1f3af5b8fe7c85bbc031adae9fcbc54f011832ccbeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efdb6c2fea52773a6443b7928193f2bd
SHA1b057811c9ef3bfb09e5cc2a5ed4aac65b188a988
SHA256fdfe0216d1f53e4129c97ea9a6c5ba2bea892a68118c2e2816dc0cfe0e0804a7
SHA51284a8de6798689bea0de248d88304e2dacf138a32413a7bc401a55d7731c6b4a6279fac17661ba29475d21489ebae70874cef7a6d2eedd5557126c99065ffc1d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7496bbbb96156833bc2f63b59371cb3
SHA1e542ede1f37d42e24be528f78a4f7a24c6c8d5c0
SHA256b7df73e939ec8fcad5541bc6cc537617854d95cac9a52cf38129542286f4d583
SHA512a9098acae298f4119f3f80434797486763a23eea605cce9d528e9fba522cd6d608a2a4f5fdf07d7d49c08ff55c0c6c5c2f3f89f1f26fff87fb9cb6d7f2ca761d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b62ebc693c96b7d305d25234766776e
SHA19c807e43f9a97e8b2b2dd60d2e53e41ac34258ef
SHA2566b1b127344c3b5ab6856dec8b67206541315ae11bd10fb408ef4a8da6b1b702b
SHA512ae276c1c223b0a9eceb3f2179b860ce937c472d02045e8c5351ae53ad0a1fd3c85813179b22481352817d961a53e3b6b1a001a13d8c0bcc45bc16c8348c0aa31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c8ab373c1bcfc76f3be80611a17e774
SHA14d4044ee1fe84346452ce94e3a4e4eea98888155
SHA2565fec01426f499e701fb97c805c07dbf9760affa678f011112fb7ed6bd374bc38
SHA512beab3e44227fd724df625e2147b699626b310f7db1690610ff5829ddd47a229a2f56fe8a736182601c4d7abb02f49caa803bef3f75062bd8fc84b7143219edd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558e387c9a587162f9ab0950e720e4d6e
SHA1bad0db2c950a3e439f0368c2f707b1a8ec121bfb
SHA256340c6c9cc3873e290fb43a37fb8a98e5ec2681887503bb0a24281d2e50457cf2
SHA5120d70e9b71376cca379f50863fb9adc5330d32b45d369a7db572becc44dcbc39057da8ab2c1bb9bed626f8817353b1187268a23db95aced111159cb659229f0c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d67fcdd2083ac12ba002b3a2603b16e
SHA1ea56ded62e385977ac5dffd2e0f5e4e5c71a2f09
SHA25678c9d3797ed45ee1bdae5bd617b93564a86f8a4b9b788e3b53a699aa57aeecd5
SHA512a73a605683736529eb17bb29c1f08d340bfbcf8656f19c61444fbf864e47a3e5933e89c2f0be8c0516b16547ae0923ba12447771c310c8977930386fa9d6b651
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519d14d7fb87cb577ef27136fad5df4f3
SHA11c2e9b37dda7906e78048324d748bd7eab45b0e6
SHA2569efc38a40bad819041820322618321219ef43aa161ae0c2341e4eaf890d6ca5a
SHA512a8cba97e2bb0d9f1d57f83aded7e431858a2349c518633373871fe0da5d20f022c369b5b9b5cacbab30c308c8f4744fa83cdecc56002a6612f0a9a38b24c1246
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b