Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 09:03
Static task
static1
Behavioral task
behavioral1
Sample
6eef7b33557a407785ed0ae9b4eb3dd5_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6eef7b33557a407785ed0ae9b4eb3dd5_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6eef7b33557a407785ed0ae9b4eb3dd5_JaffaCakes118.html
-
Size
7KB
-
MD5
6eef7b33557a407785ed0ae9b4eb3dd5
-
SHA1
074955a36b274b0b9a5e342a95b9088b88ddd1bc
-
SHA256
e6b5d9baea00f90be367c9174e98764a26788c179618474bcf9715f62befc60a
-
SHA512
92939c02b2eeeaa49c12757b43d677eb907f9490c840e7491a48387275c46fa7e7a900d3c7d9700c3aa9679f2e237304b8df20a92e8e63530e0fe31e317c44f0
-
SSDEEP
96:uzVs+ux76eLLY1k9o84d12ef7CSTUBzMcEZ7ru7f:csz76eAYS/3b76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BF0128E1-4A64-11EF-BF10-EE5017308107} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40dd249671deda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428060070" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000bbd6492716b55c17e040e471eec47dfae162c43ba830a3eeb75c36e2a577858d000000000e8000000002000020000000dbcc590de42efa0ec3893811fff88d9c783e61057117215a22c688305fbe65e120000000d9f51a797b6661d7dc7b5e0cbb701cfdbb154bb456ea04ea3de86b4d1316fc7f40000000d47a9557df227473e4afbd6fa351323daff3f1d90637de74c7924326bfed562de9e9a1516caeac82af17318369cef2b7fa81cf4e43d2d02a87dcfd8153de48e1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2148 iexplore.exe 2148 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 3020 2148 iexplore.exe 30 PID 2148 wrote to memory of 3020 2148 iexplore.exe 30 PID 2148 wrote to memory of 3020 2148 iexplore.exe 30 PID 2148 wrote to memory of 3020 2148 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6eef7b33557a407785ed0ae9b4eb3dd5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ce5dbec083ce01609e2082393405b16
SHA177f67eadcb5f3328143ceab05611f29a94acad8c
SHA2568bc046036aecf5635b8d74eb47ef4bcf8a617571deb506c3b74adb1eb77b973a
SHA51277e6b7a4d9ac885257da3afd044fb9e9b0a137de6492f867cca731431e1e2c281efa5c45d675311d649646cbe9f2594abe9cb75a9634c0e76ee16683a46b40e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c648328a76f66750a6754f8a8718e87
SHA18f11a7161aaeb4e8389c087d653d17a8b2b8d9ae
SHA256ca414cce01e9ae08579c82c6b553e6058caafa59c8c5c031278ccb753fa8cce9
SHA51257dfa21ca2b77fb53bc12fe377225d1ff568a68e52d13500a44f191190f3bd9a8d3923635e8c7b1a6a2c7fc3ab999902d02a49791b3edabf15fddd1b6d0978d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5556f28dfb07d0208b0ec7242e3c01996
SHA1779c63a0e69faed8e0ce47ffa696413f9322165b
SHA256be86eecf294c320f73f4e8934af7cbcb51a5a27c83ac8aca2265c830b3f853e0
SHA512ba664956a0d03aaf804762ca73b41beb329458293f4390389d82e6f29ff7b77d9002ae1271f7d74c1197bcde668d42ac3052f13ca9148771e7dc0c14252bc1a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503be11eab1b9684cb40f8b3a2b584733
SHA1a22668669f7cf490033ff620a9f2189a4767bbea
SHA2566880a99206aba22b5218a6e1a29325347334f9792e0a5db9d8606d6ba5561fed
SHA512b13ecde8f00f05b399819aac191279f64bf5d022177c0ab194f00b6a06843e0f1b2c35900bfbaeefd58dd601d8a4d443dd63c4c523ef17d678da231cd89abb33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c62095246e1751a0fbcf48860512bbdf
SHA13f94af4acea35dc81c8614e5596d547ffd35700f
SHA2565d00deeb11756c83fb063e3b70b18750f40bccc8e3cadedcee005a046b28d2b1
SHA51204d2d05bf6784a8429249d5c23f005cc6111ae4486fc2a3de5d956ebcc17f1179fe5617885fdf5286f35769f30ece16b3656da8f28110ea3f73761f85dd7a032
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c49d092be0687ef52bb98bf0862992d
SHA1e6de828994e8ac12a6553d5963ec31e28abcbccd
SHA256fae9034058c99a321f88772463ad8a34f10b598d0267a2d87f8d37577f1ed559
SHA5129cf17a1a98e2d39d639e86097ef202df48c77d0814655e0562cfe603ea3d308d0e2677569c07b8a7b2aa5c1ffcb19ed0b6af69a2771551e95605fb2c5c94bd66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513edec32e343ab622ca563fa9b4cc4cc
SHA1cf95a4c6380630bf0925a89fa509f3b5f61dee14
SHA256c46d7187d503dd07895f6a294c71fda67c7e47df50a94120bff539aa7d120a97
SHA51288ac88db3270ac05a42debdf30191768c0caf91d22959c64622da2200df92d82cfe2ca1698650a8b712e632f4c053cb91847ab2a38dd40bdf46f96ce65fe0699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dc2c54cdf583aaf3d0ce078cff69ff9
SHA1c7ea0586549a57eb8a59a22970171b697c12df32
SHA25693a6f9e8ced084bde4f3084a519dc93fd00de86d290d715b30b38c2a2df23ea9
SHA5127be3382d66277baaa19d8aca23d2e7cbc6909e3b8eb2fd4334a949627663de19f160b69f0f65d676bf935355111b1100c11d000c9823e60bfc5d257b54512358
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512be833903a98e3b6d167d20284bd72e
SHA15985fdc9ccfb667e6e367bff9bf57c86e500bbb1
SHA256b9548a89dae0bcf092c08a04059e2e612e7a7797811502515671cdd79cc1510b
SHA512e0d8dfb156503e629a9255d72acdfcd0d7a2924eb831061ec756250d7d67751fe364236dfeed9bffdfb7661d279487405cd331036a622b3e6e6da807eb096d7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541e8cae855bae0c8a5c2360f1b099556
SHA1c21706c78973df51a191fe21a4b7381824ded972
SHA25672e71bad3b89dc1b2bdaff83c3a8bc1913a7fa87f138b4fab8c0a8e7c3d91951
SHA5121f674b6a80d90440b28eb0c759b5188fdda0a1f2a9b0f2ce30ea72a1c2df6408f1204f530d8c7cf3ae25c9facf4d220c387aaae5103a1594a074a51a0f4860b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520cf81ca52f5a6ee20dc4ec6f2387dd2
SHA1d0f94b3eb24a20dcc06355fd7f02d436b46fce5d
SHA256e52e7ecea3efebcec8c2de81cdc632fba60fc25703e1975fc88c3a0400c2a3ed
SHA512cf3c61d1a61a62b93dab82630e7a3b31ec83661b0604391798a2d00c986855fd9110853ba174c6734e06b6c09e3e593809007a2cd0573f761983e5bd7a3e5989
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51578fb876bd1c19da118834465404c5e
SHA138e240f22edf6ec73ae0a4a04f740e12615abfd0
SHA25699e093bbfe76859810abc9f78f5d7b680effe1f28a1a1843d23138ac97cc01a0
SHA5123d409788b0bff852769099f20bb4544b6661c67eec3df5de8c8be9076c5a79ff12d138c2ef6325e9cec2098c12850276ae7c6d02d59eaadc78454b760dc8466b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540c7dddc340ab2c2fa233e102c71f426
SHA17b722f356b45c0da5f8d5d2ec5d10c0cfecc31b7
SHA256fc0e7a2ae1124f3fc093c4d85359d666509a370b85951adc82fce1e2baf2045f
SHA5121de20b417f0c4dd2d9446a7ebc7b8c12452495cee906f3330df6e5f90b486185ea2e3285e99c52b1e54da1433e109c75e8b64994605c23c719c35038f5b227b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ef7f7764ace5f9ab349b012ee8a603d
SHA1464320be135a3b3a3b66232ce61745a2658cf415
SHA2560290a1b122d7cc8f0e78da9d3b7e09b846faaecc623bb5787da931e3130bfe59
SHA512c2c832594628b2966c40c23382fa4ebbdcfa5224ed6f2d45d4aeccf71824a60b0968ca5ef88db6d6a51acaa826084f2995605ca1669496d746f25aa34a079f89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5445f3416eb4ebf4bf4d2d937123540b6
SHA19a6c9275c0801fcb44f202cf97003a325bf5da60
SHA256724eb43ab7c3dae5b67b86c42d5040aab28e65b179364410e9da4fd5c19d7399
SHA5122ce7a037ca5364859cef283a2748744cadf567224f156fc133c4b60a9fecef7265ee137dee5cbc73615a2d261bc3dc3d604065d1dd02a8239353340ea7396a66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514da1fe53d803b01cdc68fbcc9c2dd5c
SHA1b3ae0eee1055c63e8690ca48ea6cd8d4b105c644
SHA256f97f91a581cda5d2abc1857ae6ed68feefdb93af2c28613411f35b421874e7a0
SHA5128c0f205a736ffab5a99cb00a91b0748a7d87d2eb852d6fc39ed54acd0d0894c1a1fad32f3e50bc898c462c5ad0dd9c059364054d25cc550fa1f6d976d2403f39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5622df441e3ebcdf500b53af8e5eaa06d
SHA1572e32d9cfaeffc4e704cdd9e89201ae88af2d7f
SHA25612f97da8e8d70df5309d8bff6430ecb18d5f00f798ae0c71e357ff968521461b
SHA5125b87b1056a7d1ed41988bb7fd3f06d3cd8ee83a8438f1d2c7b38d5059b9cf321af1b7271c96330cc2cd508d4194a68a3fec64226d0ec1f5c3f834e76b23e0b4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572b51225d38495ee5a258dda564baad7
SHA1057b3069c04a6b719c75548e136a08fa1cb33cb4
SHA256f6b7aa492daaf0b1b879250145e7365b45dfaa1f851051be01608d11fbc7dd1e
SHA51223a43d78ba6dbe32083749d756573e5209fdd5b2a635e579a9cb734fc0d7cf380ffc95f6add3150b2b1eb2ccfb73285192fc720ce76aad19831e4eee4e117338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553249a50a3602e26137266d0751334a8
SHA1bf2993fd439de1a3aacfa2384a8cab560f4485f8
SHA25605f5a9f45acd1ddfde2698c649dd030017cfa0736244fe7e96fff85985d4c5ef
SHA512fc125bddf2a7346e3bbb1c18c3bd932863005e20566a3996bab633b608533c958d489b1c3c948aeee22f4b426b1ccfea24baf5974d6533b02748c0c516aa8f8f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b