Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 11:59
Static task
static1
Behavioral task
behavioral1
Sample
a6b1936f170fe921da2af655496774ea_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a6b1936f170fe921da2af655496774ea_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a6b1936f170fe921da2af655496774ea_JaffaCakes118.html
-
Size
6KB
-
MD5
a6b1936f170fe921da2af655496774ea
-
SHA1
8e609ab2ab17f50a17a8b615186e817d2433c492
-
SHA256
94cbb551739a5fdcaf66a576dbdefa97a2022eb5ed1825ac733de158e1d83411
-
SHA512
4718129aac01efde66cf729154b0f096db15801a8e8f66c7e5616b7e1f5912519478e6542bf6f48744c9c9c56b6cf72e745d55a1cf50ddd736516f8b74beec8f
-
SSDEEP
96:uzVs+ux74KLtLLY1k9o84d12ef7CSTUrdOZncWZ7ru7f:csz74KLtAYS/DnD76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5D6F6261-5D59-11EF-9438-E643F72B7232} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430144255" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000003d0af709d33c058a4aad5719e0a3421258cc205eead3dfd6177c429d2a10cf48000000000e8000000002000020000000f8e161e3060d9410b838f6f30287146f63f9b100bcd0c30fc1c257c8d85e08d4200000007e7423ce70598ec61b7e24b9f2e69c117b2a8de3f99df23129721216702077d0400000005a22ee2eee54d12cb29685bde9487e77278dacfa0034c57f1148d59ba5a5bb6da8013d90d69297a55ba27af09277524baa16b33021d8cc45c56d8cc8818c88f8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0c3013466f1da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2572 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2572 iexplore.exe 2572 iexplore.exe 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2572 wrote to memory of 2132 2572 iexplore.exe 31 PID 2572 wrote to memory of 2132 2572 iexplore.exe 31 PID 2572 wrote to memory of 2132 2572 iexplore.exe 31 PID 2572 wrote to memory of 2132 2572 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a6b1936f170fe921da2af655496774ea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2572 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563d017a69f6eb69ebd31306d558927d1
SHA1f1e8bfdb7005d8eff73232e5b3f680ef8c8cf769
SHA256eb30764da888bb09e49a27a2f0afc244000a6636edd5d5313ddcc2d9661e88a4
SHA512875c3fc0c95e9c3dc37c2101f448dd0e87b3ca3db80b3e35352f424a223a73ba65a129aa7b3a209a6a3c1af7539bff28ba1b550180c92188a0a5faec8905f31c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538057db5451c4b31f2648ca89712d179
SHA172f6bb5696c7e961a0a535ec9bffefb7f434eb09
SHA256d26e014d3f6f0ec04c51116ddf601a0f2a5fb1a099abb7acaf867c125da26c65
SHA512d55969ef5d24126608d5fa0a31eb606c7158ea2d91067a1477c9d4f4d0e5901d4926129ed4bfab133f28c08a5caeca6652dd0361894e5b77d6a58d88834ffde4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d83d38caf7cede82f64cfc20f879bef1
SHA1907c3f3f4230cc479ca9b52dcb20433fd9fe85d7
SHA25685c85cf0e61c6084d62f7d22cd48e2974f7e5d0a5ae9104e8b0ff217dcb08cfa
SHA512f53583a7ae06cab9ca1324ed2b3c9f5f8b0d8c937196dffa752f7cc1ad14bfad84d8ab014478ce41f595dc13ec4ca942e85ad0318c9b96a56a652c9d53361a0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501c168a5bbd0896298b2f6735c7173c7
SHA1ed7bd902efead32d452ab6bfde9db637bcec42a0
SHA256b2c832e213289b50df8e585b8c19f1bd4059a11010e685a26432ba88ff412966
SHA5122c72c76fc27346485a878313528d9b171c800437fb75772c1e725a591127e257727a89e2fca7778fff6e1b5c637aee0bf611548322c153582593d989ec7f3fd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ea18a0f4462092a2b992d0ad89a70c8
SHA1c4644b65ce3688d57fd346f2e4cfab33ba0f9cf5
SHA256e7177944f848b873a36b707b5f64773217560e47bd632dc6dfd0ca8318909fc8
SHA5121e1c551563062c6109c46d67585a207b51ff69a80952d7bcf0314334d8e9b65df0c99e99bb888c867837e41b1c8ce3dfae2fc7a92f2d54d23302a16aa2420093
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c55b5ba4d0a06508b7648ad1d1789ecc
SHA1f0d56fe591823a82b8384d528cb4b31a0623b095
SHA256be15eaa98667619f4e933907bb4fcd5ff0252754fc196bab91a7f1162abe34c5
SHA512af19c4f47bd5ffe72b0a493c8f4beb2604a746742ee63a50217b91e2c854667db23c6fc5627837d940567aaf57b91dab9b350d5d4bb860af3fa89d63ad0079b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6f910264118f6d63570bb9044c6b963
SHA1d8f1fd22ebd6d5395ab2eead668763c0c3eee250
SHA25663cc1bbae374ff0b989cf21240a11abfdb1c2759a65d5c06cf2579f36745b499
SHA512a776aa73bf549dde80061d1202eb9e6a9d46e7b66bba057b77c147cb8692d61e994cb543125f9bfac213bd3093facb6b169a0118a7e6bbc1cae150e6feb3e0b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5614f0675f8d317065441b7c3868acd37
SHA15c995edf313d55ee27601c169723fe0731de020d
SHA256912a08ebbb025e6ad5635f551346f5fef65a65b10e2f39de0be7bb4cdb2ab1e6
SHA512aaf4ba488698b6d10f2b90cc538147dd890410ed76213d1640f70523721939b817531411e9dd36509b2ef191e4f5b448f431998e663e180012be210180cdbec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3226fcbe9b6d6b440097caf0f07e30b
SHA11719e19296f7f64d630897dee600518c08a7fd89
SHA256828835ca92c1a231569a5700c5105ed316360e8ec9ca8b36430045fe26e0d737
SHA5129fa8959cddc64b336a8438078f51f79f5027dbf511f643f506c24f57df1635a3c039751535dc5589fa2dbc0cae41a9e0bd24f84307e9f4f2e3f023a9bbd01375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bf32c58bbb8e9ecb2b514643ac57747
SHA17f897770dd97246e601e4902e7d7b7f2d625c96d
SHA256bf37e8b681743fac27b9a002311a42ea9e3150c2d4db69db7f97f5919bfddae9
SHA512fe2eeccff55102dafc75ebf325e99a37760edf60c2f9e4e852542cbc02b2c2d30bfad1771cf4e2a9915c12b1b81feabcbbade08efa31cd94edae29f19c918f3a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b