Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 12:12
Static task
static1
Behavioral task
behavioral1
Sample
6f85c99be1de453fcccdff6fb6b22e96_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6f85c99be1de453fcccdff6fb6b22e96_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6f85c99be1de453fcccdff6fb6b22e96_JaffaCakes118.html
-
Size
11KB
-
MD5
6f85c99be1de453fcccdff6fb6b22e96
-
SHA1
b69a79abb191c219fa6a7072863da63eeac4078e
-
SHA256
58475a6caf9ce8d4a80b93f21dd2f6bb3d9b75733eceb7357420536f0f632594
-
SHA512
d22d8fa43c87163859811c16473b22c5896a417a1db69a7600270516160249276776fc9a66ca4b647aceef7f474b56e3fc0668a33857f6a086fe4bd5ffaa372f
-
SSDEEP
96:uzVs+ux7VNRLLY1k9o84d12ef7CSTU6GT/kSxp9dk55KL/kLSWVkLulVHcEZ7rur:csz7zRAYS/LiWQaSWIuPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428071421" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2C185971-4A7F-11EF-AFD4-EE88FE214989} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50cb95028cdeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b00000000020000000000106600000001000020000000d52a246d8ec6109789f20c144477c6b8e28fb4df4c01e6b2d0a356f468178921000000000e8000000002000020000000d8562d36f1d922b57a33380438785f6d8209ae94f39bb4106c2ce50a9bbf755420000000d6ac77f9a9bf8c285375cca3f7515252807dc79430b0d7b97b3d9aedd6c8fe9440000000b31c393f4b011818b1b0de73a469c46b40c9eae4b89aa85237774f7b2e5bd20f1ff267108e8be88eae1309040eae4e6473338ee209caa34a65a9a997e9974fce iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2560 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2560 iexplore.exe 2560 iexplore.exe 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2560 wrote to memory of 2520 2560 iexplore.exe 30 PID 2560 wrote to memory of 2520 2560 iexplore.exe 30 PID 2560 wrote to memory of 2520 2560 iexplore.exe 30 PID 2560 wrote to memory of 2520 2560 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6f85c99be1de453fcccdff6fb6b22e96_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2560 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed9f5e4cdd2d405b110c62ef81330421
SHA106392f4dac8af5845272f2b45220c05f9c14bfce
SHA25669e27ac0bc77b1f19565dc8fd91ef581cecc5c63916cef198cbc7591804faad2
SHA51289d43b9916539b81a5a3a808c21c9827e2b099300534a8517e562597a30832f84abda442db8d616cd205a080bd9b13b21f6b5ebcfcbf839c3a9f458955bd0cb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5049c5b8b0a88cffa6e8e5e2de6b42645
SHA1a05d2edffe1411886f78587172f6e166280405f2
SHA256562137828c615e5bc817c4739e578edbe97a126f19cdc94c0c5af6bd99490eb9
SHA512b70996afdb13fff4b87d9a5791e76922fd8fc9df262819d28ebdf328d2fd31e25d18f236cd4fe23108b5a0f4296dcb4dfa95c8837a7558f9e889de2aa898953f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543a9d659b2d33988fe95be8aaa4b2050
SHA11c7bf8164176f0feae3484e9e1a5397c0d96b3c5
SHA2566f83d8eccb91dedfe01c97e7da74ce804661c415a394d40dfd0645efb6d0f027
SHA5128d9c6f97c3bd23d24d1f902fb7e4468d5bab2040462c9943602d486bf23b86db796e6a73064f3506da7e4d3f162dd3c67e4d5c5f957b6db032d43c1c8a3e2e34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb7c43c2d09be41e893fd8b2e8cedf52
SHA1f60b49369978d79443da2eb537b2f7c4eee097e5
SHA2560f2783c4166fe1bed0e37bdf656225796bb58d1102a54a329bbc139bda6a747e
SHA5125c74cd672210987198829480fd41a7ef3e5bad0ae435ac7ef3c0d786001aa3a1d90035808e099e107791a42f8f4e4b20baaff06e5dd85a39299fa1a923ef9807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee7c6fe08eedcdb5c60e2fc6ee9e3752
SHA150a9f5ea01a238372f18d30261013b64e93ca218
SHA2565b4ae59edd595f2235e09a16efe540f5dd0982b5dc9dee822d7101f0d8bb24e4
SHA512276afbd9ed8f5d586f7ab8814a642fe2db377fb9f7f465f71f741bc09bf019d1492dac1ce40fa6e356e529895641885d44c179899788b6d361eb7b9504ab3e51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c18f200d45131827585ec9c89d97d3c1
SHA1e0b584440ea37638b2c63d1548a54c4c21c17bc5
SHA2569ea49af35b2c65b47cbd176223c227904998effae001e971892de87938b254b1
SHA512a113166d483b0a7b988753de1ef9b0b06cb3e376654662edd49006f12731a0a88fdbb77792a999795729a78bd19dad142f1a2b68bd999129a97ce37bef8df925
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5314d1f34eb79e09c2af6004579c8d56c
SHA130a69f679ded30d4cdc2c923dee39c9b04b4e694
SHA25643a689650adcb132668c9c97f252e369313274c4a03db9417b01b0067d030f9e
SHA512ab77aa301989afb5b7d324bd60554ce14a7cd06cbda0a26d6c23deafabfb5151bc9c5d0d6d6a7fa5bbf26f12f159924395062f99d0d13c600e8b83f104698763
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b1855ff83fe108ffb7352f8d8579e9a
SHA1b86de0b6ff4417393eda6e0509015d3ee03b0e51
SHA25617a689c3e4ce210ef3e4520d80c673c41957648a98fa4f7427370a6a3c1251a1
SHA5125f60f41ad5d708a598ad52538b55e1e73864a70cb487bdeb2c4f7290ca0c4b9b3ab1d9a60a1b54ce9c1c6af517f59e7c429bd96e55a5e8ebef62485bae12583c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f49fe0f1d8c4d48f2159a10b741406c
SHA11e4ec0f9f9f6b4e949be6e03cf93c188a4949667
SHA25632d02f8b6bf3d39f762758f4b178a51e5a191f7b2a4b4da5f452a99b0cdb80b4
SHA512d834c887db9ac72be176285447ef76f1e3f3f2fcf4f2b092c692f122d59ea47323e887c7cb67ba493eda9de4845974e40b7df77ea52bb6e99a83df3948bb2f6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cefb6130d8242ebc2114f2c769757cf4
SHA17fb277fc34e661817dc65f71078ed21c80704b21
SHA256d71a13e043b82cd1840ad38957c5523d2ebcf235c621bf0eaebcb2cb3cdf09a7
SHA512466ef25ba5537744f79ae0261daf97ca681c7b12b56caa552897d2b79963d5dc83910393fafb760c0457f74c4a73b496e1695d3e359be082085b849455fc4d3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d68da0f4d6a3f122861c669c1c94a24
SHA166d0496b02d438307282889684df06c37ffae99b
SHA2564c03178d765604d409d556e9b3122c3cfb8e502de006e16e984d2cf8abec5f2a
SHA5120822e3a6c21b63c0e7b618b8355c39fb9bf7c8b9e37ac730612a8c761274fcf701c4386e574e84a69226553470c771f598344f7ab2949143e89293ca56c3815e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eceb3f17931fab82c0ae45ce5b471884
SHA10cd080183ae25f0db922d8c7b3eb49b8f08a3816
SHA256c4185ae046574b2c4c58f5a5e3ced1a0a9e3ccb9f29dc7d2723dadcdc587a858
SHA512606f18bde9da39bbeba8084246d92b57968abe25327cc83f9cdafda46431b4c3aaa6e30f4a89327a6dee03c2b7ea1a158b1e6dc2b41295b9fe5f9b137a46da3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5056558b09aa1b55f12f1902aae8e4201
SHA16d49ce114e0fb30878393ef5571efca339031b3e
SHA2568388c48d4ce51f78c8e712c9ecc164839dddf5f72d40357cd7375534eead960c
SHA512e92ee35cf10145eb37b7398bcfae1a09b53473a3a077f74b2442e12eb2d1e2c85b689ec80a379f1cd842079bf1045be628249e3ab62c5a06bdd4c4d9abd474f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b32e0263a99c90663f85d5f56dcfba88
SHA18b8ae74fd7caebc22b9acdc87d736c2e121e03aa
SHA2563fffdd480bad0e5ad61e5b3a1fd09b92ea5de373570a3baf1455d7e58fac597d
SHA512f4f2f1078ab049f1aa236f83c49e754865a92d8c508f76558f5eab0903342d1a28ccb8c7d77f68ff3d096cd4ff39c6fb67b6b7832a2184beb25fde2e4382d9ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c6805e1e95181b9f5d78b98bdc87d1c
SHA18c17261206f7b8018f318c9070a9337cf211a700
SHA256fd95d22f2e05b985fa2cf311a87e62d43541cbe6be97c80452fbcd05966377c5
SHA512816c31b3a921b6badfc108d68386ee51b3428e01f4221e27b577c8593973bb0f1178f4bf67aa39024cef3fb6c1b0f23164c2f89df23262da5190c9f72394b86b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dddeee260ec97dea984da43637324f11
SHA13ae2ae201a3bd9e856193a09910de5dcb0f2116a
SHA256cff11a38a9ad8810e986e0995a64354f9a7653ee09a9eaf8d43895f5b274591e
SHA51255cd9541f2b83c2c983f62e62a384d985153c9dc5f629558a315e1a836a3c4ffcdacf10e5cdc28164e715759f361f3f0e55149c2f6a8f61da24ac8dbe54baf20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524a559cd5936d1939233b7e203aecb15
SHA1cd5f493a98eac0587429a361a615f831251c1779
SHA25682a928bbb15d10a308c93212d7f3f50d4a6696a01868c646c509e8a518c4cfac
SHA512546c7f2dae9ebf41c4376cb8965018eea071265598f930799bff2a6f7b9623fe3131876f9fb4437d9a60c14a45ff8bf26ccc6c72feb5a4c22170f8dbbdb893d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea28fb66ccf7e01f7498353efe2d92c3
SHA1a012738482434e1f02445386a189089f354262cd
SHA2563138d410f3e6ad566945a17c02d9b5c68b55b31664e803f698c2d43478da0a30
SHA5120d43541ea639f6a303a731b0c98b75b671c12e53ff836dc2fdcf10ae9fb52ab012bd47645e36f3814164623354b8149997065fb9b759c7a0c74a9b8081aef3c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6301e77509399f798e00c3d29ea5007
SHA165038d038c381849e4f309333bb0b5002cc9b87d
SHA256761149d30f4cdacfd19651073fdec6a589caa5fb956e3dc2bbb4978b87e7e514
SHA51260c3297cc5a54659dd2c59823ed4ba0107e2ae011beada6c22801823ff137dbb413ae4ca0d42df8cf4a2ea35ae0eb65eab4193cb926930cfbfa78054c8e7c4c5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b