Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 14:00
Static task
static1
Behavioral task
behavioral1
Sample
a6edbdac3ee0087b3a75ea132e452d34_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a6edbdac3ee0087b3a75ea132e452d34_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a6edbdac3ee0087b3a75ea132e452d34_JaffaCakes118.html
-
Size
30KB
-
MD5
a6edbdac3ee0087b3a75ea132e452d34
-
SHA1
5ca113a786610468f8b9a1f6f3faed135f95ca3b
-
SHA256
215f1bb639e49f2d925d821b6fb945cdb704debaf749740947bc191738969be3
-
SHA512
bc2ebaaec4ad75153762f0224f711eb876cfed2870c600c99cbf2afc0678b0b3d200e6b38a57f7933231d0130d50eae18ed101a92821c84d84fcbb343f68c5ad
-
SSDEEP
384:iuuNXC2+FuN+xitxiZxiZxiXxiyxiyxiYxiYxibxi6uqqkp:wC2+0uqqkp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20e0861a77f1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430151475" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000008de7a55a0b29e980a0a665d87cdccaf4e8002dae8867bd084a5163c70798797d000000000e80000000020000200000000649d248d0636bff2ba5f461527e9f9167dd2b57c3b60fb7a8e3f4cd9b59ed75900000002df75da56548281fea8570088a05502aaa76a8101595c85f192c00ea3d9c982f7e53a21a7bdd04a77326b7b860bae61f670bbcd265b71d724389b89413e8bab3ec42f47047badf89be2dac8ac97c98cce45a31634e492b3155ffd92ad8cda26f3757b4fb457ce48602f97433469c050ea6cc29acfd5c372066119080f272b6a278038edb7e84078308aea6894a346ec4400000008c2f5aa0a69cd9e73480b58bff2eb1e1df93827912c2ed2484aff13b65a524eb7a36fee32ce3c5183fc043ba29ef80684a5bd5c61254df9ba451d90b3a8f64fd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2C1939F1-5D6A-11EF-8FA3-EA829B7A1C2A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000b74878545a17f73597c4f0bf4d04552fb7092c8c4188623e82b822f4e8bd0aad000000000e80000000020000200000002e80bfa65a29f619ad3ffeb9fa1797a43ba0e0c435cd06669c43c93006510565200000006a3a4e3d29b10207392ff585544330f6bb3d7c255bdf9e3dc071e6993b67f82640000000c11e05764d226a7056207fb8589cd89288b724d68b7e59b3866fa1ffadfdb611f24b7747cb7e4237a3beed7899b5cd3af7fdd98891cc0e85a4ae9ecce217b446 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1052 iexplore.exe 1052 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1052 wrote to memory of 2440 1052 iexplore.exe 30 PID 1052 wrote to memory of 2440 1052 iexplore.exe 30 PID 1052 wrote to memory of 2440 1052 iexplore.exe 30 PID 1052 wrote to memory of 2440 1052 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a6edbdac3ee0087b3a75ea132e452d34_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1052 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d123fb00dae83db303ac0d6242c0300
SHA1ec16dcfd683a940b9b06a1d60bfd1e14e09db9dd
SHA256795fc4bfacee8caf26fbfcf5991dbe4d0431e7fc5202cc28eb60a4883bb0ffad
SHA512d1898fee3f090972a995c0bb92e8597d395e7b741ebbf7a19781d9ae936cdc05dfb8f407eccc4d40b102dac68d9663b384609e47b3df30ef611fcb23c7f8a26f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bc8510ed210917e37bef8456499c6ee
SHA1bcc10f4bb055e9a39359e34ec1b82ff9060e4c1b
SHA256e0cc66f4fad91c6007a826be06582d54da72aa4ef08f12dd968d7a79705c4352
SHA51233af173194cc2c82bd4792eaf32fa092f8cba164d749ecf73ad659654e30a1dd8b031e53528866a0e0fe26f17896010d70b01dbaaff3ed77a984d6a4b2ae5c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed9eaafc3823cf72602f341484f1151b
SHA1cb7ed6571bf9b4c104e00d6c6063afdba3d3b507
SHA25696b6c4eecfd4c9619f139d21c5b09fb3346e5e90ca6d6e65372f8e00b1e7ec27
SHA51237195fa3a7342d2756b22d05a2df1360d7b16f92e284b9f0c4c2aeec9dbbe47b349bd8693277ffa8465c79427c2375362542c37ae1f62b94dc1bb7c8ccf0043c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2039bcf051fa672692d150886cb73a6
SHA1ea9a016da98f0eaa2c684d7b561dc3088a9126a4
SHA2566c2a242b7825c0a52e0a8b6c712a60f6000c65cd01119fe608029e78b702b0a6
SHA512ea643926cb317e1d5b20e680926838bae756d1024638f7d994a07b5ab522b93c6c04cd333c40072538cba7d30ff367fc076dc703e6784788d731d389de58befe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d03593284d362688c38a1a397bd7848
SHA1091159f73c79640656376d39fe4c54af2b23b983
SHA2562a344b58e4c5f0c2fb08ce854f7d0cca65d73417d92f882056f43cb95febe940
SHA512079bcdb504511fa8b657cf415f0a4669da2298b5d8b13f0b0b3b5e00a46163d84d0a2ac3d3bf77ff62ce06065526f7a9fd977ea56b2a8a1da8d412287b3ed6c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54973067063a7fc84124a5538de90d66a
SHA1ad184428bfd2877ca19eb7546e346abc9eaf2aea
SHA2566a6bbcd076e89f5ff006899ebe5b2f6ffcf1c6e967efcdfd289e554c9e4b1c57
SHA5127dd0cb59dd4df7fbba7f22fcc38e4fe16c0f864fa344aafe5b1a02df4e1b5943865ccd13604d3f5a386b8dd7b45f5c5c50ab3624ba1b3ef1509dfcd7c2f2c3ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6b5e512d8177aa07c399c77e6f02faa
SHA1f1bb467eb468343e24f24354d54dc06c6fe1e58c
SHA256b119926cc31819349ed20468f7f1ec150e2b183ee1eb3c3833411ef009de0215
SHA512f731797a24417fd868f7dd399aee5e52342918fa5e19ed72a1c31323055379e6def98708f240f19c2e591c9cc6463eb6b539e4fe58f92297e2d41dcf07b9928c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b730485f07db250d6897470ac62cac68
SHA11952cdc0de4a2fe3afc07bb9f384fbff8f2458a7
SHA256abb4c28277d223b9af063bf0c2554dc710843e1d5f467dea012d36964d47c112
SHA5123e6d5d3612a22ce19df93585cf5dbf1e937e7507b2b7d9552da33ed094d231651c71fe5130664d88fd42d1f27f40fb5ee612afb3e429b335bedda941317c32f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596b7cca3c1f233f0068be84ebdc491c9
SHA11be4e933f4f56fc1b11eabe416ce97a738868359
SHA256a7893abccebf5dec343414438fc47e89b158131bf5a4c130236d353b4f2e253a
SHA51229d62b160800dd8636cc5f809ff1a780dba4606c83dc27dc2e29fbfff7b0c470ad43f507542f51e880790bfbaeb8ae5f4279859ce5491c9f6a230e15a4d8439d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e899b3ea44e5b51b6cdc42adc080f27a
SHA1981a4f28416b347b1242e5e6618e31a3cc95dccb
SHA256b4951b50ba4480c4e23f3016e1432e75caf77191a7237385a09731f3d2e95933
SHA512d9adcc7cb5733c95686b541737b0cf0fa0bef19277f5ac38053da36ebb564a59110eeb1422f7a520e97f4cf563e1083e22ed9a3d65845628a9cb17556bbfc592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56da46f3fe05e4bd514acd1b7a24f22cf
SHA157e4dc1cf0c5df1e54cf04ff31c2fb61978cd899
SHA256a810ebeeefaa2af64562a87d9026710769fe179857b26c1d7c91cbd2ce530fbf
SHA512c9a6e762b33059f8a3e391277ad9bbe697c0676d75608faae580a0168e2687ec0dff569945bed6585c6c14d15418a111e9878340f2a97d30bfe38ca89987e2f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552f55fa99eed070e9aada4056c8c215e
SHA16460cc0deb574fdf1bc7c997006b6af6461bd2f4
SHA2567039a68d54aeef59120eb95256c62e1ab2f458ed2d57ac57897927850b6498f4
SHA51200867ca72213a7467d061cb1bb9db7ece36f03b3e2b761e6db68b3bc9c5bc7af3bc5e852adcae250621cd696b57bf876a0fb83aca6c543f35bc10e5d190053da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508373bbbea07d10f4e74f9f79f7673f6
SHA1c878cc47211c331e6896d7297a530773918975c3
SHA256e87ec6dcee2d1aea173961312f6c82f46a7248dd89fa21f0497686be0502c8c8
SHA5121b99430eacb1b4d956ad1934ec53373e75545ed24edcf3a0956b9d904eecc57bfb3ffb31bee3047ee6223cb321c12c9dda6610ed58854200bdd7b73d145af1a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a18d9d25058674ca395f91ab9b052c38
SHA1b3ef96313a4534d39394b2fb341a904330db7ddd
SHA256bdffbc5381e007657a2cdffc90c5a6bbb5a2b3a02c58e044f99875393a6a8379
SHA512b7655df402e68f2e05296935e494ecd79376b692f4e799b07e66ff7ec2ab882ce03476371354e9abe4ecc052357e0787a95533529cf5b1b02f14320627bb60d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b21342b33c197745e9a0b4cd8ddfa9eb
SHA189af0b111ce8f20de403d578f4bfb6507ee2ae59
SHA256409fa5bc55480f09f2dc265065f4b213d4e797d43fb93a8a36f8179081d542d3
SHA5121dd5c6aed8b9c13753428ea5b25b4ab428e655261702e0be8850846939a5366dca03432daf9102330dd8b159ad63330a33d6712a269a276294f549b8a923f3a9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VOGNAB2O\errorPageStrings[2]
Filesize2KB
MD5e3e4a98353f119b80b323302f26b78fa
SHA120ee35a370cdd3a8a7d04b506410300fd0a6a864
SHA2569466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66
SHA512d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XWMUP5AI\dnserrordiagoff[1]
Filesize1KB
MD547f581b112d58eda23ea8b2e08cf0ff0
SHA16ec1df5eaec1439573aef0fb96dabfc953305e5b
SHA256b1c947d00db5fce43314c56c663dbeae0ffa13407c9c16225c17ccefc3afa928
SHA512187383eef3d646091e9f68eff680a11c7947b3d9b54a78cc6de4a04629d7037e9c97673ac054a6f1cf591235c110ca181a6b69ecba0e5032168f56f4486fff92
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z7V06J7Q\httpErrorPagesScripts[1]
Filesize8KB
MD53f57b781cb3ef114dd0b665151571b7b
SHA1ce6a63f996df3a1cccb81720e21204b825e0238c
SHA25646e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad
SHA5128cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b