Analysis
-
max time kernel
134s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 11:33
Static task
static1
Behavioral task
behavioral1
Sample
6f6653f39359203e59f829fc4d98cc91_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6f6653f39359203e59f829fc4d98cc91_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6f6653f39359203e59f829fc4d98cc91_JaffaCakes118.html
-
Size
1KB
-
MD5
6f6653f39359203e59f829fc4d98cc91
-
SHA1
b1e8ff2e60bbc189ad1982fdd4e00a09d5ae9d87
-
SHA256
9f15cc4577848cd94108744e7af3c45d1a9a86a24b3c3ddd1b72e363e8450c9c
-
SHA512
e94a280a96806b64cdd82a8e4969694c34d613cc07f4bdfd7a09ddc4ec4f396c9b6bb5cf3cab84c0530797949c977023d0cf6184757da676d0b43f1f92ea667f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 009d63f887deda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000002038fb74324aac89bf3e7ddc417ed030963f4ea37495c24b460d3595ab1bdf9d000000000e8000000002000020000000777405525c19dbfd4e21c8d4e9445569691756362846718c394e88c9a8c5a133200000004a7d87fbea6cc172df0489b3cb4ddc72a28e982918fd6b2957ffa33aa8a1731840000000eef694333e11e288c6d0a0e9eefc177a10c6dbb5bf15e255601a3e683a730636f304f044a5a8dc1204baece18c6130d732bc1954e439034253196b633f5d2fbe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{20D9ACC1-4A7B-11EF-B49E-DEC97E11E4FF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428069684" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2684 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2684 iexplore.exe 2684 iexplore.exe 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2684 wrote to memory of 3004 2684 iexplore.exe 30 PID 2684 wrote to memory of 3004 2684 iexplore.exe 30 PID 2684 wrote to memory of 3004 2684 iexplore.exe 30 PID 2684 wrote to memory of 3004 2684 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6f6653f39359203e59f829fc4d98cc91_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2684 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577517f5632b48a87a6910546b42221d6
SHA11e00453494a173cde560aa652e92a3671c0a1947
SHA25654a073c4e26696bca71472500cfe20e5a23d8d486bb46cf2364be775ad19572f
SHA512a60595e73e471a0ed270bd243bcf41b23aa887cf50a703bdd08bc9ab5277e995f4f468d6f511417ee3cdb36bec6121141d4210e774be3cac0f77f9f3a0095164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57534ec339d94223f91355e664143114d
SHA1adae2b33bfe526e5a0bde003984a5ecf8a17f93b
SHA2565d4f9fd89b722f7d87974a29c258c4c37b1aa20c362276421f1e3462716db7b5
SHA5120e596b9c6d7329e7ee8bae93c8c2461481ee58bf3c914a11194cee57b60f23731bd73007cf4616a5e8d4736ec7d9488b2ab9860763fb07f757b2f32bcd27d4c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fa1ab020beca841af511b0d349ea9a0
SHA1297882dc528a4da3096305070a60cd967b087e37
SHA256342d44f90dfdc822ac9db5d713a6debcd171c6c4ed40e2afc0439aa43cba2356
SHA51228bf371732b5f96144649c95dec6420ac951ba986478e35dd2b3a9dc6eddb288948b32d1c97e82856dbf9f7fb7a4ca1753cd75ef3a8dacdccb05cb2148257195
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5023cae98782395aa5328bcbda9a8caec
SHA155f7582ad671145c4da0a47438f5ccccea672b21
SHA256b2a561e5e9e1e8618a0da3dd13f7efc0063956c19cfd5fe09760510ece73a82a
SHA5127125a648baae9a9955b7dcfa99ffc2fe3a734ddb70e8d8a15543cd947d6cb5ecea5e459625da3e6b8f65d0095f7dc0c612f925bd4bf30344e786453cc1a1a6a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591290a3b79b0c796a832c4f325e56f25
SHA16878816f68d7dfa5d93ae797988351f39152ccb6
SHA256db1383be8dc5641f657f83daf48c2d036277962fed20b091ab71575bf26e8770
SHA512a78c86bea4ee592518c101b87b8cf6ba03c95950a308f6b2d952a461b27bae060dfd63519ac9bd94812fadfdc899e67479f53c6b10cd98de3a1061cecba40e64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5051142bc2dd265a9f46f9fc22f07f066
SHA12b351c06cfa3602769210f7e5ba016d260cfb9a6
SHA2561aa4b64feba3f96d9a208ee120a6d11a8bc8cebffb87892d1467372de98a04a4
SHA5120af2f7a62b327462972d84f64826dd2665d0367d6a044c7484377f373f7fd356552d6d15d5228c5861e452cfff941f3fe38531fd49991abb7773037c298ca1e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d64b2af2519c49e49259ac49e0b2cbd7
SHA137037757d5647f94bde60d15790488608303437d
SHA256689c160d53e4dfb095b0024a15f9b587c23f71740648361ba34db39f3de90ce6
SHA512c00309ba885f2cd758878e17c99e70a551e99978e0681cfcb9acb5ff225b3db5b0ac33d108bbd802cd421cf19994abd62ee3080ef2db0c355113b6ddc1ebf6c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bf5699e630be16fe82bfa684242fceb
SHA103152dbf81e20050d802ffc31222cf4df955f086
SHA256cff7117e9ecc7483a62e4f3b3c046a2134a051003ea6f36d661cd4ecfbdf6f81
SHA51299345b3b853744f210ac3a2043f49b163a70ef88e68dfcd6f1df0ea76ea72cdc85db341ec165439937ce821bb6c926979582ddb3d16e4e91bffad2943f34856d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d2c5f7c5dfaf8deafc31468bd6eddbd
SHA187d742248276b2dd083f52d663d17ccb3b9dd5b4
SHA256870f6691190f242ddec6c2463b847f44b81b784bd881b2237883ae27ce63d30d
SHA512f7439a8062c309f43316a998d14a762ea834720694fefab053137b5861a0ada11c65c3ee298661ece03a9549f3f5fdaf1e96e23f885993386a2eeb1f92fdf774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccf3e325e03a9bee123d7b884dd31c21
SHA1376018d455ce10ae03246829c7f3b5098ec39263
SHA256700e661ee1c6e19e1ecadd9b1f792c8cc9eb343af3e564b1725a9d16922781b0
SHA512a5def0c8fcbc6e124a7d279b0f6ac0de1973c1810f5dcdba24f36cea3bfb602e1f378d9b1a0821db41798f09ecf84c71dacf2e9080658e690d6dfbcc36471c0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fd18e3e35d68c1e7309e6ecbe62837a
SHA11879677fcabb7262827a9026ea832a89516636d4
SHA2564f418c81159e64d1d1191248352b8b51a32d6e581c8c156e12836ab2ea56cc23
SHA512bdc94786042a9b6e6d0a27caf277d31efdffec54814c8740c67e3e60acd640649728ba52c6fa17581a3a9b0d1be0ac8d4fd73adfdc27b4772394cf15cea818f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a006fd7e6d289637ba1255b50c89586
SHA182161ebd75b12c8a1d9506e2c15a88f4ca8f31cc
SHA2565a6f5c5ae07eaedd2a3550aadcf6f25efddf3189dd8a1ec6fc901a050d648bfe
SHA51203fc6930cd00f124aa627fe18188bf08cbbc3652bb1823b43a58baa6cad6dd1d2ae71303ae040dd3a064bf4f53478f3a6e3bded259041205e82b7bd4e82d778b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e6092f90cea580770fb753a383d8318
SHA1c4f1db4fd45f2e32f2ad86d282375f3d9747cabc
SHA256e33e786aa05f1454d9ceb45818267dac5d5300807bb454a438ef9469ec544fe0
SHA512800dcec5764006fbcfbd080dd0efe32510b46abbb82b8c5883657b63656314c9d497f3d6191b114e4989b5547549d64cfb66fe28fd9551f2cc87c20479078029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5511d47b48244895d5b7ef912fdbb6a8c
SHA14118eaa2c210c9981ed90515d31702fa329a522d
SHA2568351639e96ee97d9bb7c09f833ef21b5f5ab1cbc67a41656ae80955297334ae2
SHA51269fe32868d7915fa34c8ffa68011be80cea7ff2d4632710c860491d2c6bd38f960949bb06af03abfc8b5ae68879af46eea908e6498fc7943749373db9fdbf0e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5183a2cb9b649f0f5e6a94cf35737442f
SHA11d7f5229d150d0b0e6ebadb9ef924f1be3d827a4
SHA2562ae9666068983bbd100b20cabccafba5a90dad2e2f7ae8e0494f5e954bc6a862
SHA512b60cc66c4bf9ddce967aee751ed9eeec9b1c5a7158ab3b5487c08a6d0fb8da02358b1f36b8d00aa43b83029cfe1f155aea6aa93da5a6e0d696432a79c5b7f143
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50799e1527fda409f8957c51f1ed121d0
SHA103c6a9243c5b2a5722b180080053a6d628f27bef
SHA256ffddc3f7414f89330774bd5a3f970c5e9c1298df32462c2b54c660b3962a60ea
SHA5128f176c94631fafae404a1fb1533736c45d7481509235edc3aac5342f8d1c5c0a1341c385d56ff3d0ae72d84b3758e4e53067298caca0069269513b275473fd43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7968fb0549bee4775396fcdd1782ddd
SHA16f068e9171a365a46100e3683c14a83ee1283da5
SHA25618e6621173db79f932fb7684b8381f17a053a7bbb9ea516bdb6bc494f7487efe
SHA51208e15a3a4f4a3731a744ee30d17b35e1df8e802302682a1be39b6b91d5d03e70b4fd0da45021d8c6743c0ea8dd653341954a9ed1baf5ba714afb620bd8ec84b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da686bf5891ef226e84775249f301793
SHA1bb49b0c31c8b3431f31ccc6198fa7c5c783ff1a4
SHA2565e92a5055437733891ae29abaf35d8156031258f71260755307689b15bbbad10
SHA512cf85e2e210965e12f0156efed17f62216232ec4473500e8cfa8692ab5897438dbfb31d707d43a29561bdae5d123b3bffd4eaba1cf53e83e8d6894b44d80f0dad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4abdabaea6a07ab21e6c8bd1b06b74f
SHA1e459051d0160817100ea203af8f785b4a5c7db09
SHA25613c4404cfa14d82bc65e31d4662cb32f3d925130e49ef2d75c2c2559e049c4a6
SHA51240f2dbbe9b56d8ff2966765ce16d763e7f52541b9f9b9611786db063b938019319d711a241d38d98a046423743952f2c8bc0bb943d5e09e6b15854802e354b02
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b