Analysis
-
max time kernel
69s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 13:41
Static task
static1
Behavioral task
behavioral1
Sample
a6e09663830f68fac9463e48f43b8b1a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a6e09663830f68fac9463e48f43b8b1a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a6e09663830f68fac9463e48f43b8b1a_JaffaCakes118.html
-
Size
95KB
-
MD5
a6e09663830f68fac9463e48f43b8b1a
-
SHA1
a2d5ecf0f9208ab2742febf743a6a5d4aaf0ac51
-
SHA256
413d63cd8df825f661b771d6849bd07d5ae9e23a2759ca96bf8e0d29ac182753
-
SHA512
93f173776a35ce599895185dd91d967d787a1633cabef670e8ce18cfbec9434723bb07fcd6c2e81e9852540efeca6e7d356de3ac2959bef34cae7f3b6e58a224
-
SSDEEP
768:AHepf+TvEAmBLRJSnisamW5PPvF2rOS+571iJugAsA4jymSb8huQOR5IVchUNayC:b4M5LjSnAN7mA94Yb8hnN06uZtQ6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430150345" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{89FC2AD1-5D67-11EF-81BB-526249468C57} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000006842150a3abfd8a49ca44ce863cb5049bb48e07e304afbc7317a310cf0de3973000000000e800000000200002000000023e5bcccc28b2c02db42b7086cbcf553c0eac7ec0f5fca7a197d2806c050ed8c20000000802b51952ac92116f95c4fbc8507b36d81808a6b6a51f872b6256455a9626b8e40000000e6d6f9e61d1ce10d24f1bf75418c66da9b4b4f3ed6aeb3b053574863ccffdb55844c246756565a756ad0a9346325c125e390440b6926a87e4c5ad84b83faf0b3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8078fe5274f1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000aa3970f5405c63243e7dee1b821cd45581f455d27b252106a1b25494cd734b98000000000e800000000200002000000095cb86df0606941a16712c80039e30ea847a38cfafc7b4303884c5e7ba214c73900000000b9bcccb7addb4f0e70d83a95b0d383dfa01630c11255a3023ca279717878486f4bd602e902d1ae8d07384bc331747514af887377e2339cebcde767fe74ead3ba4e438c067feebcbcd5d8cda4029d5f11bd7ea0de28d07fe22a01ec8549eebdfccb5bba7731e19869f73f6f053be34f77e24aa489f92ef3bc2cd4ad8720af142525d7d1f6093f48baa417d3012b29ed840000000925162283ff72f04e6691a267515a036ca70da4f5f46f07426777a95b503cce4ca9a9943e2944600457bfa4c7a24462de2dcc5d1bb49f6a7c54a0967296cb0af iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2564 2364 iexplore.exe 29 PID 2364 wrote to memory of 2564 2364 iexplore.exe 29 PID 2364 wrote to memory of 2564 2364 iexplore.exe 29 PID 2364 wrote to memory of 2564 2364 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a6e09663830f68fac9463e48f43b8b1a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae6d98a80b92921f9f7afc29e680e491
SHA13ec1ea4cc818f78ad7fac205b222d64810626e35
SHA2563d72e5ed175a03d7eb4840b6390afce1db6b1f1ce9b0598a1c19132519755eb6
SHA5127e001855f6d2422adf165d65ce944799135e82c26d857fb135e8aca3620b5b77b139a1387dc2eef31c64f023213862524427fab9bc174c1e377c1f409f471565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a81914fc0c52b9a1485b9df488654602
SHA12f046e5c580c21135e27cad55eb88257427373cd
SHA25673f41de1627e67321b4020f4ec79c56bd6ca6c54a18b6d95b77ce6bd5c2040dd
SHA512afbbe317b3367396e6d362b28f69e31e6ec2687d08d189c092d7021f9bc14c7b4c2d6309b70b4acc8d7da856079d4e136539b6e2cb904f8e7b422eca750deffc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bed624c6911eeb1c0ca4e132678a8333
SHA1a50803783b5cc98ef8419775ac6f6f3afedc1249
SHA25695d482444f188c300c2cee7ae7a8fcf8189ae54a608f9fac7db4af83814b90f8
SHA51201a19f77c421411827cf04576efcde37b0028c9c832ce9d89e942d68ba0a762b298016a97a82b8df04950e366e1275fc4a34e6f8224def9fb76ffb1506cbebbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5684b4c5a5aaaa4ef8a99f7d41ad2cbf1
SHA1f75dad2a71cb2c64e0c967d998078f4b4c3f7edc
SHA2564c592037b83e3011928488f5b05ee503cfa88f19fb4b5045f2f06567775660db
SHA512c2531fdee1382cc9c4157bbb8c6af76e8cac8901b5500b4b51c1cfac4f34b24110a5e7d1e6456d14d1838aecb2c403bed6a0c18afacfb1d2f258d5389c2c9e31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526206e79f73b95514b5522c7df9727ff
SHA1a05c8a5113d1a13b736dad5af71f4083985232d3
SHA256471d043176d767aafb512c85b14fc24fef65c0a7c406c12d828819dfd3014a42
SHA5124f929ab5b5c559ff3934547620425b33e17d48c172412518700006fefedaee946118c3cad4363f8bba092a30df64ee4e0b17382419b678a8c8666b29cd3aab00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5553b21e44d383e6baa78ad32c46b04d4
SHA1c87d080cdb9e71807b94a30fa3791889c9e12184
SHA2562cf4c9f1bb89a7b08c556998775d0c13148b72802beeaf771bc7b0f671254096
SHA5129a79732147aedd8d2cc1cc757860594c6ea53dd370f86d71aa6f312f16fe160ec2a0ee835ba131d7a54da91ee5ad5bdfc0cb2b458fafc41e1ded2cf5d88104f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f98f2ba1f07a2285bee52192c5b92acb
SHA14bcefa9b33a6fb32842fb06042d56c3fcb8a7a4d
SHA2561eb089192c1a3dc6ea72e7687a9d5b33bb77a01f2ec1df9ec5f21f8bd459ffd8
SHA512ed460358b612df04533046b81e916e91be9e2fc8b1328d540bfa8176404358e93cc5cfd1c1f549ef093d92bb606c8b0988ec9c4d51360670bfc4c25711d7a32b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50566fd05abf2a029e8b60fce1317cf89
SHA10bfecfbe9c16de84227417b6b237ff205aab6b96
SHA2561b61dfb1954958826d0510763fe8a66b7b4399bda0c7f4da90bbd7768b567e7a
SHA512b4aed304300c5e53076da7c2861afaa767f22914f624b4cd3e55fe945a67b7ac923f5392961680f48f8bd00a6223501094f90145cae7125d2e0700dafd33b280
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd8c58d60c9469be7859e60d73bcfbeb
SHA1a64c86463e127d8ca1935cf14c680bd3524c7d79
SHA256d29e8798a6109aad21682e1a538ecc5d09087bda3d062556b9c58b43e86884c1
SHA51222a413909e9304e0986087a49e8b5e5380dd8fc870cf50341fa93b3835e4071b87e19b361d15beca61877eda8eb8e0a79777a3eb1dd847a9c8bc1880a547f28e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5854bb01fe931fdd1a8fefaf6cc5a0713
SHA1240fe0c0d0dc1d30bc6ace116e02a2b5025035ec
SHA256808bba20bc8be92ca6f3fc6eabab47c019bec4bcdad7c841b54f3ad9a9550aed
SHA512d8f407e6914197858532ee2a5610223b6ea07737c2d0892c16a8eb76ec6471a6700142efab1f4648359210a3cb62537fe05a1d5b52777e4839bba8e8a387a0c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545fbc9a3b239351f35423ca111b51833
SHA17a804d3a44b04916eb33858f53512d703a3be141
SHA2561655ea022ba20b951f476bd9ecd7bea7a0a70e52872fa49ba6190a6bbf36f247
SHA5125a30a830eaabfe4a78f9195ce7e10b379aba9c3769e4da18fa0d8583899ebba4553911d4b6b1ee87700b1cf7cbc20e079c8bdcef2a2df10c5d02bbc117d073a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bcb2f6c9d9e84afcc9d5819d5d2094a
SHA196cdfbb06b79ce2ed9f154911bb8a685869ba321
SHA25697f6daefd8f5e5d947cfccfea70ca48bb336717ddd8e15b0029bad8098133486
SHA512e59aa46ee4fa6d3b5d1650619f4ae2c476637071159ba73f94a03ab17a9990a907db43ca690b45b3a34a22ea7f8b00d666b673242aaf3d580111cf50aa49cde8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d41a956325dc07d668d90492d33ec11
SHA1dc0e6871d23a990f767599a4400ec887917ce4a9
SHA256f6baa5afaed5a564aad93dc09525193e8711c0c522d8e3c3d4a52bd24ef9f85e
SHA512f2b1d8c4e28fa9ff115c753c4e08ba23b4ae56967dd117c1489bbb5598fbb1c5d28929ac5b5837fc3ae9d7fafe6e4aa0cd6d3cfc43b5beb5da778665a07cb989
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5130dcdb739e44999c54247f6fc5ef05f
SHA11d491309b68194d7d0fd80fb3478cb9597a329e9
SHA256311017fce9ad056127ae882335531744c2307991113f1df4a5dee7f4277efbe1
SHA512f5d69a72209708a757d66618c684f43ae9c3187b6f4815733647ea50652389a73bc039c9ecc5eace1658aa88b30768cd9e3baaac3e902310a69df460caef4f61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff0066405a52b58c9f0979cea93c0a71
SHA17a9708d4be32845db6f600e1e7d12736e28db2ff
SHA25648db7229dcceb6e3f7de5dc07151684fc940fcbf7702c86a7befc0aa3bb5c77f
SHA51272f18fb7c34f969bc585d527ea8cd3aadd6f82429bbb04f1a68e5aec74a13170fd872f6d72ebe1c63f0adff48ddb0b49ba581732d56fb5c9edea48d441b3bf30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8087d275e62e5a4f241e8f387b9d202
SHA11014f84f58e8ab51d8b5ee0cd2296a774bb56eb7
SHA256a8808b74b2de0d9e6ef8cf1d1a3c6de100e277c8b8c1e428399f9df2e56cd990
SHA51230d7ea031c180f91fa5963a5cc8592b89adc5ef860eaa65c29893e9ea500fc060e97828a1b329c30e710017c2add0ef0456094d23c86508c0df0c6e142e7db2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4f1e3d635c1ea85ec26d95c78aa22dd
SHA1cdb5dfe3662cd143195ee4acc4cb92b2b6cb3a2f
SHA2564a2906e7fc65b3bfc675d8f5ff99e1424438cdb96b75925193381e38ae209fd6
SHA5126be9c1609284397f1ba206cf6d4b857d8e7eaf785c128458fa5d8dafdad6e45114a1726199f592079f397075dcd21a88f5d6de3bab788960d2313d0ae7481f4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520f18fe3a56d0f84989afea2b9c3e671
SHA1bf120169e24b59f2c88b5c2811a9f65e25981c68
SHA256b35a6186206bf85cdd86ef6529f0c8e72ca014455ec0fa1d89facf32dc103777
SHA51220830082abd592364c78d692673cf8865eefcda45fe6a1d7e9b3ac66d2c84e26e4771a075295f21296f82d9c2ef1c3ec85781c97bc1f0b2d352b81f9def22112
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b