Analysis
-
max time kernel
119s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 14:08
Static task
static1
Behavioral task
behavioral1
Sample
96688046f172be9959bbf804ba1fbf8b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
96688046f172be9959bbf804ba1fbf8b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
96688046f172be9959bbf804ba1fbf8b_JaffaCakes118.html
-
Size
25KB
-
MD5
96688046f172be9959bbf804ba1fbf8b
-
SHA1
e13a9442c431cd101ab080aac6b52371a2ab20b7
-
SHA256
c283bf25ead1fdd41f938812c705a3ffaab5d724b85343a9e0d3e4f4f2ac6c31
-
SHA512
c9b96cc5ddf14a20ad15806c5733011b10a896a4866330374c167469e3df61ee03f6bfda9790e66563a4697d95a2ab03314b73c3b75eb09e7174f16ba47bbe1b
-
SSDEEP
192:3ZDqEuCo60OBnod1oQvV+p3PCTjfuKNiVZ2xJq8HOya1yUVV7lvbFSn5KcylsjJ8:pOpn5VwiwHwmb/5/5N
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B3DB02A1-5A46-11EF-90E9-F64010A3169C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000c4e49ed7148a96e52b782afebe84397973a994e50846a9274d4366914c3a2674000000000e800000000200002000000034bee7d1240251232f2bdb5e6bfb2e1e484dd46bb0464ddba02f31f52d3259b420000000dc433afe164d0e872b742cacec28f54df6a5981162dc6976664cd8a0a1b0cf2740000000bf29acd3013919bbe9ee43fd04619be14e465b87814ce18663303dde7894f652004f07850e675a45493f7940956e80345c1b6081b15c58167d6125b7ce5fe790 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429806388" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80d9d98a53eeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2088 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2088 iexplore.exe 2088 iexplore.exe 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2488 2088 iexplore.exe 31 PID 2088 wrote to memory of 2488 2088 iexplore.exe 31 PID 2088 wrote to memory of 2488 2088 iexplore.exe 31 PID 2088 wrote to memory of 2488 2088 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\96688046f172be9959bbf804ba1fbf8b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2088 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5cb6a61b3703b546f2983a42ab24d8c5d
SHA13735af0200115b3716b74aa70ed8771175f9e475
SHA2565f49da5f1581c076e525570577735305d9b1fe6b0735b3aba040813fb26df031
SHA5126742fcc1a5dddba9dfa0a2c6379509635f48ae89fc9f27363d824e952d7fa67eeb3a15ff7cf0f5bea3c75e215c1b3b13675fb181b26089a3d47b23aaf04d6aba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e7ad3825b118249081911e8991d2acf
SHA1d287c352fb36b7c94566f4748ab4b72fad5ff745
SHA2564367b9110886d8ecf18f258a0b74daa622ab7cfa5e32511d8793deaa98642b14
SHA5122641c34ce5793afc89820434369fcdf4bc70b8637efd52085f0fe5be77282e5d1f402a3ba1431009475ce352a7e1c6d9aa23ee16502c932c15893ed9a5660cd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3bba4d75b49371a738742dfc0a459d5
SHA15caa5489e3f9c2cefcfefcb71b1a1a0295309d4b
SHA2569f810ca39fcee41d9be77fbd97cdfe6464df3ac82232c64ecf5177ed863d5c4a
SHA512508a3760c861195d4a0a8d0988081389f7c7e3038c14708e92a075e4624fecd6f1dc315ecb964b78d7a9ee7634e73b4a370d49d1cde28d0e6349e41d233e99a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e0980a5d75a5e9f726ce85c28ea00bd
SHA1f3287797123e257dea08c967d3771fff00baae30
SHA25684409d0ae1e8c00c278a94c8ca431543ec51e091ebef58442073729a560c2836
SHA512dfdc6272038d5faf191f52d2342f5fdc8c6c463b2afb53110fd54cb89d969e451f15f469b7456e899471280efa3b338356410f7077552f402c0f17fb07946f8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e73d83f0b6a2944e9e46c398d0309425
SHA1020515346f55f7efa2cbceca38604f08a29d935f
SHA25600230d5a1a5ce0a6a80dd0fd155c1af240599f7c5476c08479a2a0e98315db72
SHA51222faf99294a1897d8fa0e9d92a66f27ee0707f66917b4be2fc060a3359f39deb87d5cc377ac01e08f4912641323b9d8ba6365ceb6c8953abbf91b809c5a82764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5093d918f3619716882c97f40cb0dff35
SHA126d300424135876747454d6ae53a0770f0bb3ce2
SHA25684794f3cb0546968a8d3683b38bd50100e7d9e1eec3e538ebd40d8691110e2b7
SHA512abc6f7b396a3962cb8154e91654cea23b11d8cac992d7d76b22f6a344a4c1f76d7a4e648f7e64d0d40622f744ef3f3437d7ed9d5c4cf59b0eae1230acc62b66c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574dc072b0c6f62e14c8c35a055d063c6
SHA1d8159193bd47dedaa77a1765fb596dace7cc2915
SHA25611e335748e2db6b6857f861c698641e29763e84c4fc075ffc8502535098b35c7
SHA5121059cc10683ca532c062f5be238c8b8e77aac30c40ba64b615591368e4ce33f0d2b2e4859cf1272ac8fc887df33d494899355371165b318d5fb055e1f0b3f0a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541247a3bf99eec41e6f90acce3d56687
SHA1b72b306b0a4661e8fd1613399d6e5f8e2dd18d18
SHA2566f685d0f82b41687cd3082d2d7f23cddaf4cec80bc46bb797d19148a1fb6b9aa
SHA51231bcfb07fa45286ac39801946206b2d86e68a7e04757bd627c2dab02e67626a7343d450f856570b3ce9bb752c3c565383da38006877730330d07ae4ee8db80d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56536002d20789946bf91cfa2b6b98cb0
SHA1d3b392b3b64c1dd165d255a080960524bce6ea77
SHA256e4ed3dc3904fc028d26463f252ecf987a311ad5ba0b53a7f5a5022259a4f6544
SHA512b6ab551dc9df898d9bc7985a9ccc9c4ed0fb710cb1511239ff092c3ff43251e8814ec476e65edb9491cdd8735e840647e3c8c3145ec2f3b8d669ba279b8890cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f21a9022de5327d47534428d86462f5
SHA18e8d8c32f33a44726cd97292b7012c462f7a00a6
SHA2566a267cb275c94c3c8db6e579b5a220825061ec7cffa1f5f2e238c7692760aacf
SHA5122cc8ee8b6d700689933dca21effdb4edcb7ce9628706f746475b39dd4e910d2225143abda03134f45e3107e9d7116acbbf2556d233df074bbb646083e7b3d7ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD534c133cceb2ef78813a03e0b5ff5c7aa
SHA1afff040f4b18ec4cff675a598e1dce33816234c3
SHA25626dc2843f16a894a1edf247d9dd14aab9ae0479a280be34ff7ec0bdb9c499ef7
SHA5126f8a976a78987757dacf6f2f05e4b074611f925724c7550e4c2de8290cc8e034b90dcedefafbf7b952bcb487d9e958558873dbaff61ee79c5cd01d12123d2046
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b