Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 10:25
Static task
static1
Behavioral task
behavioral1
Sample
6f3217040eb71d7e7e672f629d546cef_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6f3217040eb71d7e7e672f629d546cef_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6f3217040eb71d7e7e672f629d546cef_JaffaCakes118.html
-
Size
72KB
-
MD5
6f3217040eb71d7e7e672f629d546cef
-
SHA1
ed079b1bcab083479a3dfb5b88225ec6a197d375
-
SHA256
3b42c42bd985978231be39a934c3c12ddf67ee40972ba5ef2e79a297cbb1c125
-
SHA512
3c29097806ae94033446dbd05555e3d9821a62a52790190ba7174898a7f71e6b4fce8bddf6d11b5cdd17edb35c91f72ff17fe1e9aa5c4903cc4307e03ed9adf0
-
SSDEEP
768:DdL9BaoxQaxiUO4q5vyx1hkxmbW0hKmRXe62hWdekflUFfXdi7HP2fvzpgow2g9/:99
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0cd9d037ededa01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2F138131-4A71-11EF-BDC5-D61F2295B977} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428065413" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000073d351e973a29fefdf9671d23d68a0080e5ffd53b2af10225f1984a638574433000000000e8000000002000020000000feb459c47051ea68e27359331565306ad0e23c18547760539df7e9b36d03813120000000ff925b639731f7e07c73102f1da480dd9c18c4d1064853b7cec41efcb84fd56c400000007f87caf70dffd959f071acebaaa92c22a40d1c4a68300311274267034041bcf66b3fe8395378edea61247be5fbaa533c963c6617f13b88b7981356aeb5471708 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2576 2372 iexplore.exe 30 PID 2372 wrote to memory of 2576 2372 iexplore.exe 30 PID 2372 wrote to memory of 2576 2372 iexplore.exe 30 PID 2372 wrote to memory of 2576 2372 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6f3217040eb71d7e7e672f629d546cef_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5806d3d5edd626ca67168fa2b8a9ffc4a
SHA19a8822049d61a19cc2b87a02c82af40c5f388062
SHA256e49e65b5fce39eea77194bd60e2c6190a2526295e9f763bc78fb9a9df3764b7b
SHA512266c55440cfd2de87f8b8e901f1b9d2b4a663648c83619219d09581f8b661d8603a777eb9e68fcf07de47b039e88ffa88c62d6c624632af08f098b02dc466063
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a8036b1264047bdb2c0384b62e8c617d
SHA1b3a5a0ddcf4e95e104b6180f03b59c91b73ade13
SHA25603e89a09528f1437c5e48f97ec5f7a73375202343bb63728e60e0809fd0dcebb
SHA51261862774d144cc6205ca398140eb4c8806e8015dfbf9505072e209a3e225f25d83f328bc7c4065d6386a989056e56cff92c4ed30c6783564cab61d0ef4cb9980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54fcc6caf4fe270ae6fc673045d3f9592
SHA146e8726d124045aa9b549d0747b10f75ed0b7d99
SHA2560c9a1776efd780716c8ba3054ed6c37aee6ecab8efd2bae2abc87acc249d4e51
SHA512e0b5fcd24908d310def974468d9224839ba65d79db42d34cbc33310befa345ca2ffa28f0d6861ea8006f80d18c4b10ad85301d972fda237acec7e9a8316176e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51fb5545c163a85aa67db9f8c86136db0
SHA10cd96534c3e15fe11b847241fff4e7bf19048b24
SHA256568f8a0ae2b3e04c2b02f29d938876bb6581279dee06f2f807d6c2716dee8605
SHA51226fd74faaf36043344922e3cd76f4d0dcedc7e8bcb9fb257460b84cde50db1584690da1dd41205e09af059793db26f464494f83ce299386a40e01aad8166ff0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5606def6620f95411984d423b0031eb8b
SHA1b6ed677b7d9788c150a0f2324008a67b035f89ac
SHA25672d8d17f5f053c0e3ec5db906fb93c83869693407b4170d52b14ae083b4d1d08
SHA512bd28bae1e309929dddf6424b985c56838555aba14951af2a6fb7b59e6b81e952fa967c913299f140ab480e44275b28a7f6fda7f71a8923708cdd0482ced01937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51a728b38d65ca3e803b12de993613326
SHA1f3a1e1e766d3d195cdb0b9476cf9a75b0c69b92d
SHA256d43ef13ff44eb9ae4f8440147de239f60a75a8c5283c825671a2af0ba614c944
SHA512572c87fe25fe11f7f49fde0317a112a3ead846f8f67592dd7f979e87ae650a9818f0abb91a5f4ac6cca351db8ac2f2c67368264cade76e566d42440fadc29e0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD560a664c9c450a2ccaddf8c2e4814c024
SHA160140db0d1087deb30c9773420698385e64b26a3
SHA2566ba87a30ad4ad645afca6e49fb10b5db2976836ab3cc5f4f9aabc91999b47358
SHA5128b1911ef00cfd825777a561f85e299260290a48693d46c14bfcbdf3414a0f1d4684d9f77c602399179dbea319d409033ddaa676b53fb564e23523aa3150f5a6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c5d34f83df1c7adf2e4c91928a587c7f
SHA15b8f6df2bc31d16ad1905de5cc49b3d3b0cdba88
SHA256a30af2a09644f7f36f0c24323cc514dd3328eef3316f02b4ac8631673d16db1b
SHA5121a390c1c9ee11b17ad66e9e55d5dd2676d796a26cdbaf2d494e1c82e058e2f12b55fa2dcbcbe5d2b402596e4fea24d27ff5d7a06038790cde7c278c19125f531
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f4c11bdd9b7e2a6cfbe409e2a56f154a
SHA1fffb8d027502398898c0d2471c98d2b4a64923d5
SHA2565d009c0d0e68351dbf5bf25ed17e7d2d1c4f5f4a2dffa9fc7ff28e16c4c020b6
SHA512c1fb8da55ea7c9beb0f40ae05d06659109036792f84cab7a9ced1d29ad17a7c24b49bb1a19afa06b8e860731d7e29d79e5f16e485c9b3b315389b00dd9ba67a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cb9b8bf6dd04a245c339e869d9a41b27
SHA1e279d22d68cb5cb3aaf24be6d1a440cf042f79a1
SHA2565c3035a1aae42f306ff3a6a00d60aaa3a733b90d091efaf81780d029aec0a49f
SHA512465b153bc5782da0c953af8a4afa1503a72a076f968340a91763e8f1b44638fae135db1e70b4e6bb58915f848e702709a15890b8e8bac5b5b0d628f4f8f3dc83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a30dd3a2bf0a9c2085208d6bd2e5f985
SHA107947eab453605f60cf48389cb44709e43b14f90
SHA25620d8ee1cab2a65e24cc49cd6addd76a0dc87beebc821717b4e4f0b1e240e4053
SHA512e25667ceb426ea44f84d04eb8dabb48b781353f96d6d97b6af242510f06865e9428d0ef067ab049eb2556d15160be7eb7ac7309da9f8bbd32ff51188f7b65d6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56efe5f1582da099a49dcfc10944ed8bd
SHA1b3bebc39233d3d86005c961e152986c8ad6e243d
SHA256393909dd1a8fa8b082c1f7a04c7ae87936966ff0dc108cb9d68be1df8a749dfb
SHA512c9935f85386bcc65779a423e5c83213f16c245a0589dcd45c2ff7d8b1b62ca8214d2624bdeaa3f025af0c00c0dfe03c48e3cf29d18600cabd3efc18b40242655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b751822f55c0300675415c7ece0ef98a
SHA1ce0b765ad9b138969a4bb97629d779b63423156e
SHA25616432221b89eca82dec0152bcf4670b8fe5b15452965d4821a7448904a6ca16e
SHA512259add4482add1e3e92a777613ce462f2b2504382a6e1ac40134756530c8f078464cf6a0dd0424e3bc489f1de8f660f6c299b905dbd38b109f265cc22e831073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b0e1d927c4312381676ebc97551064a9
SHA1720e529546d9159352a5f56930e76715e7224655
SHA2561a92865b4079b7614cb020a0aefc19dbca97289d22a3c0a41a559ba5593e93e3
SHA5121b2c6ca1c955dbe9d65c9e642d29398e0ddec12db3392d3ded8444d4ba98573fcf0c4acd075fe14bcf093cb1cf2048fa3b7a9675fa7cc88b1b21a8271d10358f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD523e6b30630d6e81d95c808f92a2c6295
SHA114b51686f40df52fd7f0e17c0e4ae6ec289d2a9a
SHA25671ab598a8f36e39bb98a48321de6f369f233a05b79be94e2ca6a350a4798b8c1
SHA51254e61c34fc3cda5510832bbca032e20ede3ef9b6b97aadebe609ff8ecde359babac12b1011a1fe584cd90ee7cadf12dd90c0b9eca9590581c228760d21110c79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD591622b8da81ba1c62b4aa197e6bc88d0
SHA1135c4bcf8e8db865346f63343134eb604d808741
SHA2560f3ec47a03915c70601b3264ff5e52d0a00df0de23de9ae83b264199d9ab5568
SHA512f49dcb660b543aa52f91574589e4a441a903f051af107781082fe1d5d5bd7b99142921ea4cbe906dcb747551ba6984e0ecf95def617b090eef8cc2d2740d9121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD510c2f431e29c09a7b552e1b08dcb26f1
SHA1150c7cdfb2d73e9f8e2fe99a71a65362e6ffd20c
SHA25664b2e1e5cd37e92f8e4790649826cacad04fecc53a2716dd64b74f6c59a745bd
SHA512c65b447690830cae813f7a7d6469dcf7d168ad6e141dbfccd3da4deec9fd24b6a39f0957976f53bc67da13d94fc1700201fce0093b2998a8f46fab47141bbeda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c4a8079f55606058e70bb6db9c35d268
SHA1bbcda6aa629004242de77a18c0644b3f06ad7378
SHA256eb8128f4b5f7b4967856f6bf792faa13ac110286da109b4065a043097678c00d
SHA512974132f13cf30095964005fa24c42d9256820be8422fab23b39bd401347ce3e74c74eedcd9307ac6187e9fe4bc7503213b49b535f1d602ad647f5034bc99add3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD520002a8098a6478cdeefdd272ce2e8af
SHA117c2e3a348cf2f796f346756ae4b4adaf8b6a82f
SHA25640fc982e71efd8a0966221ebd86fefccdfc0ad9b7d32d8e37bf2ab9034678623
SHA512756ab28ffe9f2e2ffb43d67b09cc897816b5a77a7695db1c362db1a0a1d51a563bad119c9c462ede42d73c476f357f84b0a454e65152d375f7e2c97e8483ce35
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b