Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 15:54
Static task
static1
Behavioral task
behavioral1
Sample
a746ad6c8bd23875640a791f401af8ea_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a746ad6c8bd23875640a791f401af8ea_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a746ad6c8bd23875640a791f401af8ea_JaffaCakes118.html
-
Size
29KB
-
MD5
a746ad6c8bd23875640a791f401af8ea
-
SHA1
b5d7d376191fb785a3c591db19614633ba9ec69a
-
SHA256
2dada5ff0cb25a5042f3635f69966da451a33697c32fd736d1bb9186457e4266
-
SHA512
03a62a9e33c8f8425741880060c3108944e8c7bfa1f305605bc19d905a68fe612bbd6d65d06cfca059257bdfa73ba2931763a3116ba53c31934178bb7503fbba
-
SSDEEP
192:ykKFmh2dF0ExV7Myi+YdOnpGlD71iUGt6baYiF92oNTZi67P9UH4uj:HV5UpGlEdQS95fUH4uj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{21998061-5D7A-11EF-B9AB-7EBFE1D0DDB4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430158327" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b09efa1087f1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb780000000002000000000010660000000100002000000003e28d542ff2bdf51e626fbdace7cc2226c32eae37791b2391b9ffa5c473264c000000000e800000000200002000000014910bcceb8a34b908b51bbda934f57855f4364f5d1dc218861e58b572b59cbc20000000498ea7cbe7d1cdc2252cedf5565381838e584f7926f8af67e942ca1f1f6bc34140000000d44206f0f4766477ff3562a6431650c2683b076f33139396caa90c9515b0afa897318287d5f732b639e4fd0a7e91f8e91dcd75feb980761a511f3fcc1d6fed88 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2680 iexplore.exe 2680 iexplore.exe 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE 2412 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2412 2680 iexplore.exe 30 PID 2680 wrote to memory of 2412 2680 iexplore.exe 30 PID 2680 wrote to memory of 2412 2680 iexplore.exe 30 PID 2680 wrote to memory of 2412 2680 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a746ad6c8bd23875640a791f401af8ea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2680 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5883eb82be3f96af246419dfdd416c60d
SHA15cdef781b7c63ccc71687d237f703160bc1679ff
SHA2564dcff8c2ccfb825add6d3ef65a4d21683d35e80a0873653305855b2a8dc9d70a
SHA51205f15708fdc6c5e1a010326d4bac497d7594a0d93e20f6332c16b883e82b2e6969fbb4cdd822a636d1a8035c08cb1dfa4e03b63963290e8c1da3dd566d3258f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503db2ddee4b7ed003abb88e874cc7554
SHA1926bf347664d40831bd4e6c495d213d8c4a882af
SHA256e7339234b0b43d6ae788841e99a14333bfabcf991993fe1abcb31dc03e1ff987
SHA5121507af2f92ec807f2878becd17d391be2900435bfb83016c0e0d496912110a8937daf06094fd7b047a301c2833fc832089a895523129cc1bcefc0efe4e427a46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502e4ca96a2bde0a4528fe6168e7fdc55
SHA14079769d692ecf10602c9d5d032fa03916a4fb51
SHA256f7ec53d20ea41d35dd6479173cad1f9d21516a87907b08ddc36759c8b89a221d
SHA5127bd0647c50c94d439976e1fcef17ecf8e8b3412ba3a7ad5a21721bd8069c0ba7c822a032deda06f4f68b076d06833a468e97b5e5601a2e7d2061228cb8e8b4b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4e52417e747961db6c3d7adc81af96d
SHA1fa5b2942f4317fb3a17ea941993e972a8b69b674
SHA2565cf8021429438e94e67e79aba070d281902bd235b0ccb9f5440b6c4b112775b3
SHA5127508e8bd634408c3ad4085a28c3c3c1166523419be1ceee35b8ab4da7516d1b88487461e77d842f73061e60b049276fad8f8a336cb5b472fae16b3bd257035d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513388f3cd2f4af0eeb8e762f5e6c1e47
SHA1813e97afe717db77dc6ff28b0f230a59cfde9af7
SHA25602a2b0cafa756ed735eb7deea8156f494d2108c1c72dc7dc1b56e0c7eb325db5
SHA512174629ae9d44c415dd943391ab052c0372550c79b19ce90017c76529265c7dd47d0a776bd9b539dbb4c222a24df6ff49269151ed6e2a7c84ce6090b131b1edb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ef389d409da1036177f170234f186c8
SHA16be45427f1eb22ff903ec08249b4e17a19d0dfae
SHA25677fa1649c24715b4b670474963629c3e4583b396e8950a19898b982c3e58d710
SHA5127267c3f1d9aebab0ec079e9122fbe035be0a156ddc4c12165488c56b177608f55a5db405a0b4bf415c150bb733db13fc04311ec3bb1389a5053e27b0d17b6522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c575696f211f086bfacc46d042fc00fe
SHA15cfdbff073044291be0ec3f26d021b013a2e722f
SHA256d5d4d03f02e3c556ef0cd190d98e1d559c2ed091481b8c7a625c23f9745e8448
SHA512ca0a0d5bf1f140ceec27cc592914df983cbbf8e51d412fcd701340ced9007fd31d1346d8cfe31a32658aa34c2072efc30ece43359208bad4f7b6847f0d4bde9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8c93f6f2b31888333fb2bb5cd796e8a
SHA12ad2e9b212e1736d9c41f6c2c325c60c02a2e1f6
SHA256f47231e5fbfcc470e1bf17919f75f1cfd74c6606ce7a983e637f460b2286fcd1
SHA5122c4fcaa1190dfa7b8fd1881a27610fdc7166731055444ae818ceaaa0838eab4869f411d72bd9be10af45221c467f52930735e295e04c7f6f169050ff9d637517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d55be0593e325b0007f07e1e1017bfe
SHA191dbda210ee84c4b215f6c3d95949d9a8d36b21d
SHA256216edf0befb8e18c78a9071013d0d829178f335165d7c9244ecd2573d003b05f
SHA512d1b79c8066788b56a7bb8af025b8dd578018c3a7044a0a5403030103906d55b118f9dbdc7bb13dd5bbc9fb61600ac089e7d7819f1111dc0072ba49feb64c250c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5623b5a645ee42b7421835cee60ac857e
SHA16d2cf29932a4342ae3ba4b963ecfb88531276d62
SHA2564ba451ed2cef236047f87698ce739b4fdb2d3a3371e72f05183812181a64a10b
SHA5121742398093891e45004bf057e4c906c9d228c2cc6d4fcf6790493c8f67957da40ec6575015167c268d3e0e1c2f6d0f051420dd29f1a8f2cae58220f72fa62b48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543cd4b467c8b2e467fd45978a07256bc
SHA1c466ebee0ddd9db581e80663398e54a069fff1c9
SHA256d5afe545954616643bc8fbe5a5c64fd1e913cb4faffa6955de68c854e79b92e0
SHA5124b73fed08902ec25ee1e9c2198c20ef51902e5ac7d131cbc3351b3ef8ab13bea9e49d538a28e99b252b9e592100ad6fdcec024eb1bb7f33b4bcc5e92e0566727
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d729f020220bd7e90dcdb0e5c90a7bdf
SHA109d002ff1a7b4a7f15efc2251beebc2037cfb890
SHA2566fdc3314406b3ace4364a6e1d55fe18935c11c1714e41d7d5bb267acf67d7225
SHA512b3cab5d4c233ee51ab671577342108bc76a066ba5d8964ba49db787142423b215bdaaf90e1caef54174dd745b411c6ebf552366d8d4e878f79c289372f22d83a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e96e94890cd9a6a416d0c6de4778d5d
SHA1dc02cd5142ca4d17bc2f2c1a438a0ba4407c48ee
SHA256eccb0e86a43db0de936d78b8c60f1cc8863adac07235c180e04ec94cfbf0664c
SHA5121921c0f900d9385a224677ebbd8c90271444f36fda27dd67bc5c753d8116742088ccfebbcbe1a214bdf528d2f769fe695dfa0994c2d8aeb691ab133a26b96f0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581c9c97b61c1be7004ab8a7b91674cc2
SHA1b0c56bcd3fa75713d4a112ec7b287804a62b62b9
SHA256600fa9112058abef20a9e780ba5a989f61bc11f90a0174a83550359720b33ee1
SHA512a8f8e221f18172a33be94804bc16d8f6a3132e8aa1f4652542f117064c7cc7de4dee89943b3819055757af28eeffc519a5d3f863b3b9d4538612a6c0cae95ee7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a766baf2c8e066878ddc16d434ade9b
SHA15fc4e4ab15d98795fc7f86de53626d822fb67c8a
SHA256d776e4725d0e026f39d181537fee3f90f74e06c03169629fb045e71d92828c83
SHA512c948bae707ffc5cdcc156316e124332950b725030868fb6de9b0e58a03953dacb73d5b5c9126571a00dfefe8bc0ca93be74a0b3bc5e5967cecf04a2ba3fbcf10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a57c3da0932c143cf305aafa2e9a9235
SHA1cf2853fb8db00189889d068baf3437e723c0a78d
SHA256bec0de3184d16dd8641dceceffcb587b84241f971d066ff6efda8dba6e72cc9f
SHA51277515cf022e0dcc8977ce3dc8b6271874f79cb364b899f6e6369510bc5a1c493b1f610e91fb692afbf0473d17c53dc948e6ecd5d020d8c3653f09ab4e8a11cad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fe47b691b73613cd16a3d66a3ced54b
SHA13a0a9952a6b7686ce359a21db2beebc7929f7881
SHA2561db6acd560e7bb2e866057b1e08b91b767e4ee26c3fa9085c14deaabf8d336ae
SHA51202be43c5f016acd197b535e7981d293210ac04486e46df1bba478d60216a13e9f7d62cdb21a86694e164abce3d910eb8e97911adc77d7cfb8896b1130bc5594b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b