Analysis
-
max time kernel
142s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 08:44
Static task
static1
Behavioral task
behavioral1
Sample
6af566c59d2910421bdfbd243daebd34_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6af566c59d2910421bdfbd243daebd34_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6af566c59d2910421bdfbd243daebd34_JaffaCakes118.html
-
Size
11KB
-
MD5
6af566c59d2910421bdfbd243daebd34
-
SHA1
23e54c947fca89d274773e7876d551df6c28402a
-
SHA256
b660db619ce753edb638f333deebc41cad91000bad162d4bdff7ad54a6f748b4
-
SHA512
708468a40d553959fefcad265bbc1986a2c74d6fd517453b4eed51b19743b476c2b34e9092f9d564afc7e6dfd42ddc760eb42f97493f8f8b845fc1f68d06870e
-
SSDEEP
192:l22gCKN40ZHMoQBxY0XU4+eStrKTPYADgJsDZPSiIat:l223KNBsNBasU4qGx9au
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000004f1353b69c43af01c25b799f6166b0c29293c2bb6d26e7285c942c4098d2f9cd000000000e8000000002000020000000ce76dd3451b926633631a40ba6f40f11f3b6289e51c02b05b98833a1cc62315f20000000fc0d08e81eeda9373d02a3c29955fbc06d2e1251072a5b3c9227e45138847fec40000000d6003a5160cf017c25c397bdac94bc8a9489ab368690547aa260e1da2e8245b5c87f04ac2dc72ff148c264e848970d42123cb148617a3e578a823ccc54af2df5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427972537" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F0B19041-4998-11EF-B585-FA51B03C324C} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 609218e0a5ddda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1460 iexplore.exe 1460 iexplore.exe 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1460 wrote to memory of 2336 1460 iexplore.exe 30 PID 1460 wrote to memory of 2336 1460 iexplore.exe 30 PID 1460 wrote to memory of 2336 1460 iexplore.exe 30 PID 1460 wrote to memory of 2336 1460 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6af566c59d2910421bdfbd243daebd34_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1460 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7b1007f6525f0b2b6bb98cbb66912fd
SHA132cb966614828e2a6711753115b9aef2ccc052d2
SHA256c8302b136802d756ad5762ddbe56d081373ffd2dffa8f12e43d955eb35d90950
SHA5123440520415c023f4beef65f0d000c71ccc212c8f95979247c340e2257546edf843dace2e4a9b2cbba79ca49fa0ad07e7f9dfcea6fb7662cee1e87e25f19a0127
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5914d43398069baf223a41441f6985424
SHA169dd812ba5e4880d8afa433bc91655a808544434
SHA256788d813b16254edde96b73d245192b4cb2951979ec38e2f4ac40156c13b4b0c9
SHA512fc3c3d1e492871d2fc3df58c5ae12676bcffda6afd93541e5cd0d956e4e1fc67dcdd4d4f6c1bf8233877dbe247ebf80339402f2a7a3bdc7c22997c5155bd5173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547a6f5c15ef5ec3c423375ad33c92e7a
SHA10e8f6256850d6bb7ef80e92f1c0a1bc4fea1ccf8
SHA2560816b28841e52ef3e9e6888ede4a08a125e2c615d2969483219aa0dea9417047
SHA5123ce44451555be1952ce637f8af9c608127820c1e47ac0840e8bc52fdd2af4a4086c81dbf5ea1ce2bb0ed3c2e78541a5894cbc302fc3a7c5d5c0cd95bfb7cdab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b1fa35701d832f34ace69af5dd734d6
SHA1ea8d3c023e1e0950c6393fe72ad9d780b7c94a86
SHA256f30a3852017bdda8b86952e8b33ccb32fe879e3dfc4052be575e8eab78c46d46
SHA5122a23f2145d0383655d60d1b7f2fc2849707083c2340ca4316f3ba75197fbe0c8894e6d61b8cf3c0e4ead649bfc5f3d4221d3073e5955d36a393c3abf5090ceb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5513af46e57322717644976fa4a4a1e32
SHA1e2f34685da8409a4ca773ed87cf818b2d967ba81
SHA256eda0547de1a65bfa89ebdc064a171a8581312164e4bf3681eff46325795386e1
SHA5122cff4c4bc239f8e4245897afa91944bc8403df1fbad2ea4b19c4a7b236778da05bd9a064dae9b332d94747d7c88335ed44d6fb0f60bfd725974c0ac437e7506b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc50d7f0a0f8c070efd2e172a6553e47
SHA1ab54954af110b0e78ccbc9d8ca434a3766656c51
SHA2561285271be15595bda5ff5fc1a0e1a3087cf70e13b90939cb0b8bc79beffc824d
SHA5129ffb2647fd79c4df6b7f668399bf5cd9c0d4347ccc3aca4fe13ac3ba46d4b7f5829833e2290a8277a1aeadb45dd89e589f69e9b5511c38fba2c3cb9a2ac83e65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1d89ed78b3f4ee7147f8af3d360c8e4
SHA1b3657650ff8e93006a572722bf761a33b300a4aa
SHA2568f46578bb782a635d628a8b5f900e97220cab8482c253f000b484335c873e50a
SHA51209f512bee5845f6399d8de306ecb4812f9eb334e210ef57a58179548ba489563aa8e42248310fd8947d6e0a9f9aea94bfa69d26fae9210cc490bcb0bb1f1ec0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5032313f4838ab30dc2c1b6cacd20aa99
SHA130c1d9566698019f1043d53e6e82af1526876401
SHA2562cae2716fa0275e595794e73eceda2b60d806b521ae47158295645220da1b04e
SHA5128124b84539109213c30ee619c7462e7291b669953693bf91171dfa8f1536e9b50ab45bb5542210b80a5229033f2a5d5e431cc241357f62b47381b98a471d2630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f58c0b85fa469846916e241af4516c5
SHA1f5cc068297c56ee898d24db2067caaad947766e3
SHA2563ed5f739de5beba1735c708359790f417c149d9b202293d1b7e7f9343b020664
SHA51221e5944077c2ce0d92973a92eb41a528986ba9d83b382f969dd78668358b36013ab3f9ae8fc6580ff7c53efe22c3b77beac1cea4a686f8cebda68efcb34f855b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfe9422e199c7a7321216e92d9e0745f
SHA1e228b1db497607df159b3d2f105964a282144191
SHA25693520281b012b16d21d530396f6ea4fb5ca38b308e5d97bb39c844766c95c594
SHA512d13f812066335b5af9f171ef457ab9c967eb3cee50d1b7b337db7138580a45a3d0f4c5e333a65b9a64593bd3b076e26d80135118b6cb14082c08cf036f6f2053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553bf52b6b9cfe917af635522e09cd574
SHA11928b19c100b5408995c31feeb571beacbb42d7b
SHA256e8893d29c8fa4850415be65cde6d41f94c9b937dfcf61872eae89bfd509aad40
SHA512d6be153deeac8d1455106476eaf4a4671bff94189b2ca3659caf247b37ed08cbc3c1894412fd70b59fc958628e8e949e515fbbfa5a847e368753b08d7a865bec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f98452e03ccd27b74d5c71826a62fa4f
SHA1b0ae1bcc78787a2512c23eaaead6185a8b2a1858
SHA256cb22b091c796ba5ae7b272d95c19135e423b6f98811e39d55610ad90ec97e41f
SHA5125769c1853b94c76130afa1ee48c025fea1283ff4ccf34eab65cc243b0ada7f6ca4f33be0e4abca6e62937d8a8b34c8292cba570d1e37fbdf46e3b06d42c59cfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b49f3ea7b2d5e91eab0ed1dd6d776e69
SHA10d6ab44dc742fb8b26a2f55f9cff6892bfaa6872
SHA256f37f0929a5ff54cff58ddeb090692385acbbb01d18f7b055e0e2e01ae336c7be
SHA51288be02660a06b2674a3faf0aab9dbe86b73e7bc2efee23078909045a4536fdcbf765c9c7aacf70ed9e7a417b3ad9d75ff199997a1e0b20ca2a6b35e12ed61971
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e447e1438b7f8828909740f42a165beb
SHA1fc68ad068c4f4d4d304050260e53a1bf8fc483bd
SHA2566d2e792a4bac8d06f944cf32094acd1e6c47db64071633670313ac3457ed30d0
SHA512d1b27cee2dc396dfff6eee648eee2cbeee04a9956e69dc82fe7660f224699c8919edfc2a6a8348678195bdf0c7f2f5a089c7301d8f36ca2adcb82b89d50c8f9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1fab43f88cf3a36711dbf3b2891c27d
SHA1e37ecd4a02448ddb061a378579528d074c83cbab
SHA256149d33a0c46d5de9246acd2023ed73e7e64f39d133f357ed167624507393ef63
SHA5125248cef0caa5fd13833402c9ee700b7e8f481e3b6e22653380b575514af3ee7781fff3d38f33909f7110de1cf561826f6d0c194b04cf07f9da5d6d3e01e458fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae966d7db2a8d64e37085f392950b6d3
SHA11f5acbbf828591c1fb6a592306e3c18b4cedb6cf
SHA2562ece4e498dd06d491813ad47f1aa91916d73cc7fa220b170ad7ecee5797f2630
SHA51264ea6726427ef96cfac0cb62f5f938da1a4a6f8d25ece21e42fc4941d993bd3c04555dc561d96bb06c1e3fe3b1b80eec5e0b3254ff462eae8a131aa1cedbcc33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5724a5c3f454aacb4432222ba7f767774
SHA1931e916821730ff1e91fca008e39b228f1957bd0
SHA2568f1ba37229beb27131abab8026408ab4d897e27644a55a9a6fd522913f33fd5b
SHA512cc0649d1142b70c511c24fc3883e40b51c19806b497ed8982feae0d535c5b56fa4b15661e3c185a86339f82a55c111ef516a18cc055106a86cad4ad2532f50d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f253209cd6be558dced6584d275c07de
SHA197e5d64ccab5657cda6657f3d8dd08d8a9be9563
SHA2562655c1d08ef0eccd4f3558dc752e5e21ae63d5a6a70fa799e1d63476eb29819c
SHA512c6b0e6cca187199a0f63096b7f13d9108533116cfbcbf9f4638d42dd04a0d8b8605836388adae199e8f708d4c3ae48f141ed02574f9d2f743b78733bc5e9819c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566615818c2352b06325c76364d6d80e1
SHA106785f11363ca979ee30c5864cee3a8fdddee7e1
SHA25631e8466396eea52ecd1e700e9b53129b38f6b17ce14d028c268f52e71b708a41
SHA512638c1c3614abc588db3aba56020fa9f2230b8f6c71603661343bc894fb1a29f6afa336a9cf2d27fce1b272bc558fb68332981a6a6bd25fe3f564803756e54e1e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b