Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 13:45
Static task
static1
Behavioral task
behavioral1
Sample
6fd3155945d66bfe2ae3218d84940224_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6fd3155945d66bfe2ae3218d84940224_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6fd3155945d66bfe2ae3218d84940224_JaffaCakes118.html
-
Size
36KB
-
MD5
6fd3155945d66bfe2ae3218d84940224
-
SHA1
554da8a179ec988630297b612cb4a2e177e76fca
-
SHA256
b94bcf2e94009b60a1972c937d460f0243d81c152100b60df6bf13e11ae512f8
-
SHA512
28e5ff74b4ca999300cfbb00356166aa91b405be3ac9a7eb8e5e527948395ecfdc3108bf2b9087d0ca55bea40cdb8ac6748170c9f69a19b73f7a6dd23837c21f
-
SSDEEP
384:RLQ/iL95+Iuy89ZNnauV6SB7gqgEs17tPwvBBOdY+:Rt/Y5F5s17t4pBCY+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2FF77C81-4A8C-11EF-880F-D61F2295B977} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428077013" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1924 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1924 iexplore.exe 1924 iexplore.exe 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1924 wrote to memory of 1836 1924 iexplore.exe 30 PID 1924 wrote to memory of 1836 1924 iexplore.exe 30 PID 1924 wrote to memory of 1836 1924 iexplore.exe 30 PID 1924 wrote to memory of 1836 1924 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6fd3155945d66bfe2ae3218d84940224_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1924 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fedb6ad7d999d4b32031c5eb35f48145
SHA13748a74c4d2b04febf620d27a72799b65230d49b
SHA256a66b320e98d6de1094a86f7978a2c3bd92401ee5199466cdcab596b94fbd966d
SHA512472a3eb0888bfe75f19cb5aa86a71754eafe6b3800a1410357196f49603fc9700a0c2a8cd0e54ce50cf5a10ec52ef6623c9e170526453fdb35f01ad55c6d45e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b55c05455d592aa3c4b6992b0b15080
SHA16c1f76b928ba7f6cc0948d3eda452d9763cfed2e
SHA25624ed5cbcc62894b25599e5eff749910b6dd2beb0c02b2e156e40b47f3c32e7b6
SHA512bf602e5cd07dcb7a09f093b9487a23bcd83f7fdd55577b3d48933ae0720f7cb3144bab6b67c0e60531604c26cad9204cf55a10664a60645386f283ed9a5ba299
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f37b7e7c9bf50358152c7ccff084057
SHA1907043212634e4a0f6aaa2bf3ec60a675d10b985
SHA256b3fa22f1ee953300e731a7dec50c5fbd5ed01db5b682f9ef633fbf2ff6b9d673
SHA512a89d515cd1713ff32e26b134f154fd5abbe1d2c2644893279b841b8711b255460fe0b41befef621aa5057ffa3ae51e406ec0ec6943482286608767c5c493e9f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efc160b72752fa3a110e51c939ef5bc9
SHA13d7658c4d4dc7b2ab68a2692ca1a2ee07660f43c
SHA256a6f68a7e9ed444fc565eaa99061fc11c236c3d40a0b45e7f4793e23042171b1d
SHA51280462fb4c50382dd249a3968cb6fddbf43cfe860a18528b4a033a3b0b192352bfed91452de1c3590985bf3b7ecbdf7606b23988a29f85d26ab38cd4f9b6f871f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50077d4f762e29fa79c91fa5bfe47912f
SHA18de94015e836bb17f9b5bdd7fa77e2e486c0eef7
SHA2567ffc31d38011769b81855b745071a3ecdd70a65d6d70dea319dbcba03a84091b
SHA512e99671331fa240f57d4c633037c9cdadc4d45acd4cc52f64ff71bf5935e39b6f13441915390f72abb78094d2c3799e5b705c86ffd096280850188f59e5ef4a6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5368f68ea7a2cfb12c91d256607f38ea4
SHA1374565f7e501f07e50a134a983d15291eb920e45
SHA2566f24c6a2bde1558054c5a1d1bd384dd7c075da1f8e01021550f20bdcd1240233
SHA5122b25ceccbf3064e96c60299cf4f5c761b5fc3814ba987546dd198c10ffa79167e292d0ce991697195bd999670c5c4537a4a8efa3ee8955413dde0f7f888af42a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5455d2b0874a1bfc1b79ed7335b4370b8
SHA17f77a292ab3f8ca4bb3dba40056723f4d4f144d6
SHA256a423820223a5e78947769ab4afd07c0c8e1435155c2cb25c8b9fbfeeb4123ec4
SHA512487efd760e910061d03b708b3f6c637f444c039ed294d5141adf75e030c3ba623516dec20839dc890c83f5ec11e9a5f096e5e4890210e7af2785f026c7427958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cc8337e2c80a263b4c43e899bd9cc28
SHA198655598f6edfd34d373dd7e97254f8a602afa35
SHA2569d7dca01905ce55e06c37736a8e3aee7853eff0bc9238d9a3243cd4f80b945a8
SHA512b96007a642b6cfe19b8ea0c712e707b83f2b924d2414123f5b63f54fdf3124dd412223c6ba949071e858a8ac38aa79de54f8e1eb9879f89326cd5164bad1e1f1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b