Analysis
-
max time kernel
120s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 07:12
Static task
static1
Behavioral task
behavioral1
Sample
6ab2ef960f366fd401891fe44d8aac53_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6ab2ef960f366fd401891fe44d8aac53_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6ab2ef960f366fd401891fe44d8aac53_JaffaCakes118.html
-
Size
10KB
-
MD5
6ab2ef960f366fd401891fe44d8aac53
-
SHA1
fea8c856024addaf1608c90ca1990ac9441e5ddf
-
SHA256
43e282724034d1a7909353a5d800b631c381bcd1bfbd800e775cdd1e9ac5cd69
-
SHA512
04811614f835569b47dcec0ac2d3151cc5422c6dbefde82ef087eb4c53d9161270ede8a2a17cbe209d27e2bc79afa851600e2df0d04776475d3a0f4453faf157
-
SSDEEP
192:2VWlIsr03JxJy8k/w1whqJk1J+BJWJtnJkvJuJUJnJw01y5uBuLbdU8d:sWlIcuvE/g6sBoTnOvsiJG0y5guLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{22673161-498C-11EF-9BBA-DA960850E1DF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427967047" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1196 iexplore.exe 1196 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1196 wrote to memory of 2804 1196 iexplore.exe 30 PID 1196 wrote to memory of 2804 1196 iexplore.exe 30 PID 1196 wrote to memory of 2804 1196 iexplore.exe 30 PID 1196 wrote to memory of 2804 1196 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6ab2ef960f366fd401891fe44d8aac53_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1196 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bfe9d4110d97f680fc7ac5553098482
SHA12c483cb61349a75c262e8a546b701f98aa154513
SHA256aac69c112b9514b9574822e144ab94511230647b6de8a61620b2c0ec9aa7eb68
SHA512f15969a56da6f1f8244780b9e2de7d982787e99820b9f3ac804259aa7860f4dfa14b97a2b19758bcdbb7bf7f298d726c17db0d96954fe02ef5bd26a3cea5f609
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa13fe71c54ecac6dd01e979c12516eb
SHA1826635d2b3ca13bdbf555232f41634635b82121f
SHA256e1256cdcfad44e0480e83d6416979b58c99c58245687e9c8865ad14d7e3c3472
SHA512b93d5ce443ff18c31eb65854cd70565a614e6ebf46b952b8e64f4962c2051e71c565819e44df67f40afb2dc0fb505ef4bc31cbc1596a46c54d36c82d5157deb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdcc037d002ab31345b854862fab2216
SHA103a404e7a7ff8cce1f5fc0622ff670efabd37251
SHA2564a9b1ed773b83b076ded8e119b3eb361e3162b4cbf3d5dc024d13e013c08e899
SHA51292af3e3e7fb2701a91b73044bc82483fa651f374cbe9003320f0aaf55d0de6bba20c0618843206a7465758b9646da39c6627330ac7eb152f0575439512dba484
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b473b79c25a5934c89192313dd748183
SHA1061f1be3a93cad896f09783465a7d01458d0be25
SHA25623bdffebc86c252e685f2e5cd54fb7a47869dcebc177a402b852fffaea9c2c84
SHA512273ca373a3b4f98f735071c2a3b1037bea25751d025ee6005b5843b1f1924d2dc0e53f642c172a249826a0d37025a3ae030b53610c6f0418fa6fd98b858c6361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a2786199782752f5571f235ac7a0097
SHA1bb08b6791420039e1a3ea91c0c524834d9a4bfd3
SHA2569d0507cf701d986a8dd5a863ffc23abd979c72683fcb1b878a2b7f21d7e0434e
SHA51201da24e626f03800edd8e800ecc87a6c4def74f8ea1c038b5ba683dcf241949ee8e8f03c17f5977888e2414e4d7eee404963b8bb2690798f701a4c35ef864efc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500ba8526d88f121196760b5ae6f5cce0
SHA119b34d021262ea23c686a3bdc6be783405dc9ab8
SHA25653a79fcdafb8c97c6a1bdf68b3e4d12b819480d0f59051a706130046553c74e3
SHA512a76de7416ced6c045e56e36be0d66ae99330c1606118dc12c2dc85bd4132682319997b0fe86b25ed6db7c463e003780a8309d0f8540609fae9f4377086ccf762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab4517d3b8c5a1b0e14b226457d9352e
SHA18afe24cfe54662d1e78cac617845ad0e55da30e3
SHA256169c6398e5abadd1831bb22198751dc2657fc7da57f1688dd4fe05cf0b292b58
SHA512b6321fdda16834f79ffa12c6b48463493ff5b2737a853e39e27e3936b929cc81c90600b082705b6f3cc2a0dd25e3de04349375361cc74a887e76932200dba808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a84a2c838f395ff27c604b7e79bb8964
SHA13acd53530c4a9b8a9598aa49c788df951cc92c88
SHA25605c422b0ceabf4d19ddf77d8cd8280a3b2bdc324fe686d9ca07d7aef325eb1c7
SHA5120d03c6048f10693c9494793cb75aa9588b43a969646d542aa875000ad9d678e3853e272af2a48785f41bbb2e886dbd9f0d49e00726d1c15d759a6ea76e81cae0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5167165cf6e52acccc858a9d81a55fcf6
SHA1c0865a6e50dd09910ed02be8fc68e32f10b18198
SHA256ef62ac0e27b6ea49de8fff528216eff38f267ebcd02531a73846d3c0960b0fee
SHA512863ccfc7ba612f1b7a5a6f4428c71b2255e305b5141cd1d65023ab7d0b5716c434c9092233009d4bbb149dea763166fe0d51773a1373f427d18c517ac6f30170
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b