Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 07:58
Static task
static1
Behavioral task
behavioral1
Sample
b6e75490feff68574cf5139cfde1652f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b6e75490feff68574cf5139cfde1652f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b6e75490feff68574cf5139cfde1652f_JaffaCakes118.html
-
Size
6KB
-
MD5
b6e75490feff68574cf5139cfde1652f
-
SHA1
c8726d0b1e617fffad7de268719aa6d1532cd7b6
-
SHA256
c1cbc49a41e6827da07dcb3175a3c75fdd049f997e2c71071e4483f36e035116
-
SHA512
24adbfd07c749db3a7da7d8ca2a320750fa80d04ba2cf56550804276f01207c0590cdc825fc68d61393857275cff12944a22100412a86ec440cf73154d58e35b
-
SSDEEP
96:uzVs+ux7NrwXLLY1k9o84d12ef7CSTUBv/6/NcEZ7ru7f:csz7NroAYS/S4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4E8BE741-605C-11EF-91EE-7699BFC84B14} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430475371" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000f7ffe67091729cc8f6fccd2da61864dc5f1351d776cf25cc342867a34467dc5a000000000e80000000020000200000006a7fdf4c0d9619a4a1876151632bc148ddf0b411e407ab8def4d9c785dc0ae542000000049467ddeccc9ab88caafe70ab648cfe79eccbc9436c88fa0c05c1bceb41e844a4000000099246efb43a5fc7f4e9b60a7dce13758326c5ad252f57bb081ce46730922545b5913625359f2157bad3cd4103d8552e78a5d7ac65b8cedb98498fa47b94dcaf8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f06a9b3d69f4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 756 iexplore.exe 756 iexplore.exe 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE 1944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 756 wrote to memory of 1944 756 iexplore.exe 30 PID 756 wrote to memory of 1944 756 iexplore.exe 30 PID 756 wrote to memory of 1944 756 iexplore.exe 30 PID 756 wrote to memory of 1944 756 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b6e75490feff68574cf5139cfde1652f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:756 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543d97645ee196e894c2d89c4633c577b
SHA1b4bd43413bddc8444f5d3961ac392499d369fab6
SHA256c668bd1b16b10ea4d21311bb789e73dab809a901c30a872f89da004ce4fbd8dd
SHA512a100e4df2029426216acb4468882e89ed046b47a7ee5bfae81a4df1641f31d9ab52c125462399de393857cda33b368804f1d893c8f0ff099ac824811b3769c51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eaa69288842f0f96dc9e777294e8bff
SHA1994523b54763f6205e0638c83cd046d290558694
SHA256b0eb3749991ed8acb8cd9f0e7948bb21a6dc0be4a7124b9fb0909dc2c64b3969
SHA51223e9812b8aabbd95953c27deb5bef0775a6e978410f8a337c63f1ce881ceb511e07f7a5451c00e9141d0c2d9ead57bf32ba060234ce81286c184c6dac74f19a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529c8353e611a2d4843993ab246c459cb
SHA158d841407d97521b2f8f7112ae9e4263e368cb8b
SHA25628f846d432854d4d70a40d0f5a10bf0b3c901bdaf569a3dd029102829363e980
SHA5121b4a9406e610ec548f7c9d8f81a8d5ecae55ab7aba53d07c2b77cc0b60a84d31be86a2fd401e3377c30c6f715420ff3a21838551b7d8d18a59ad5b2d7d864572
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ec404fe42139d9df51218ded325ee2c
SHA1c09d9351ce8b451cf3b61893f334f0f9bc470b05
SHA256b7de4dcf1811569e7aa14baafee26d322010282c308ab084d1cb7f7ca492eeea
SHA512e36d4815ce07681f3abb59581bff8164832d634b9fa9a80b20bd4e007012e381eae7131e8bd4272bd79783141ba66f2d7743649ccd36c812921d187acfe4eda2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5391047f34ffaac1a6e2b3853ccc3089c
SHA1e13677cd264eb0942157b217d16c15540236ddbd
SHA256baf51f2b5c42fd503d597251e1383cbdd8842922e707556b247d79100a98c518
SHA512945698ab40a7cc723ac2b1e04f138c33c1686d8a862d334439b4853b39fe0978b43db1d90ace64962702aa71a75992e528b675c73ec10e7b2fd2e1441f814047
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8c58c252a2de259e46a93729767a5de
SHA16bd4810578262541e7ce1e6c111805ddd0afc9a1
SHA2560d9cf566e0f51b53f4eb0c22248d2c56a42d8c21eaa6d040e3f8c01d8cb32837
SHA512f7282d4f6b7e878e0e390e7a757b086430cda29f54361ba559a8a1dfed3e8143170bae12d564771cd55c0e1ad786d1bbe97a93a586bd95b7622aade1bc101c1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b8980572bbd23e517c1128bdc8dde1c
SHA1058336faf43e1af904dfe1b1fab79d3bc630ddcb
SHA2562e36b38cc98e7a6a26cccb9ae4c340d55da66182f44c7d6e3aaecfc4b9e0946e
SHA512b65ac3b0ab88436f5d82a00531719ad82a1670d8bd94929946d5e44b39d6d57bbb6359586636b4fa82686aed6bd051188fdfdc2da6bdcccf59d14447a45e5df5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53852901ff39dd45bb22d02c29e751984
SHA1f00f2f23b52ed46091caeba67f338ea1bf52c5f6
SHA256bad907a754101e9ebad2d7240df6ca56c730a022b160ce73609df5533b556b3a
SHA512305e0030e23da06d8b98153adb9172b4bab895ed2e3a7a432bf8d9c5f5cfe4c8ac8b35e55d27bdbc6226fa961261374303b4c3c946074e3686e64587a3fae38f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9a31d67ae62267ab572414454dc512d
SHA1971e873e73929c2fef8354050cbe8f866ceab7e8
SHA25698f3417abca94463da154c5ce97399d8de23c0d63b417bfaf20f1c297fda0e07
SHA5125e9acf65d18c2123dc1f073533f5ce0d3c09db865008e670ebba0825544124fe5af1b7a795d8a596b15cf274d4fa5f0d5f20761f5c481defcdcfedeefc851423
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589f7c55cb7ba30f7c672459a5cb19cd8
SHA1fa85fe701c1a6f28ceb3424012859a9b19af9222
SHA256f3a3bc79e3cad3da9e555c1e1b2bc9eb83515e111b303bc31422244d1f93c2f9
SHA512dbe7b47c65e1edb40cead0702f3612c5c15867fec3f6eb68fa0d02ab995cf67328b572f76f50dba385dbf1ea64a6ba6e424cb3f9b9454a62c8758fdea0453f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548d5fc4e59d93e66d317139093afcc62
SHA19d503c3cad68c775750ec88c6749b081504399aa
SHA256b1ef6a97afdd261fde91cf1107d86947d542efd9ef8f948e0e01d8316cdde8bf
SHA512af95d866f2ce3dfefc56fd1d444cbedfc7b90c1a49a8c3149bb5d911cd376d597c3d378da2018d93641cd0128914fd2427cf85a7198d20380edc99d191a51ea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5773c3ced6d3b928b5eb0eadf3ed750a5
SHA1212b23325f95ba8e14513f2bd70dfc0c37832817
SHA256f55b4150fd518b036a2ea745cddbf5647594434421530cc4ba1291a7263d2724
SHA5121ccd272a9be8db5c024d35e15d1a09cadcc3f6ea65524f3e25b8b403cb2418cf216175512de73c1f66d45547dd66bea0221ced31e394af73293d4f9b3d91e1c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575a9ec21f3de817d51cc383553d868d9
SHA1342c9563b975eedb394504a7af376764318d84a9
SHA256cc6b6780b278179228f5b7bbd95994e0eaa12163795e865725f0a2a440ff2b5e
SHA512cb8afe88f365cb7a6b5f9889f42135bf4679f5dc39f0ff1aae03e308c4e8e8f48a2fe5e5af6578dc41e8d56ee5c07f6d4d3bd001a7a898beb4a6c93252977a95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7095365ea002da985f8c6fa537db8d0
SHA1e990d2a72bdd13bc9e6681deee3362a8cb818a84
SHA2560633bb8698011a19cf7d988dab5aeb40d99bf66918584d219b54012e4543c5d4
SHA512b2b4db8536ce1d79e68c5f7939341bbb9116723a8cc53fd8832c85ee8738ee51bce2bb0d6e8a249ae6076875b14bbd751f9e8e2bc49be8a346325cf9e8df7a21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d31e0fd10fd2d8d5a6ae76a1a9797b51
SHA16b6944dd363a353652514d118333aee431f89979
SHA256929a04be6eb0282aa99fe1d2df948232037c9f4adc196a6185de5ad3ef152caf
SHA5127b9902baadebccfdb030786af443927653b1b09ec38eef56505e2f7a020489b7dbbf3d78f66d063987e757e2b0905e161d821d20491efe85d2468ccd07a34260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58acd2fd830c54a8ff28eabe0d938b4d3
SHA16082b992dac67c86e2a5654e8a0c6f11a0c37a3a
SHA256224705df1fb4a24340c9e8e79ed93e4129391fb51050d6876078092e0e15c882
SHA5120123912af5d58e45b9dd163947e82ad34754853e8904e30f4acd05b9d59bd7e035b70eae61d07caf7a7b329a5f01729f15f4868247671b096c1bd28b24c8c0c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5197ef396345fbe883025675805584438
SHA1b132115f4f28f92c3a42db0e1b4657cbe322acb1
SHA256715a0c9031675295a49d3b453aefde1029386f0389f59393f726c67f458b9ee9
SHA51287fd406d27f4a33937f22d46125b0fdba482c55b376c66494a12f8357be308456aeb11a6769f56686cc6948479d449397944a12a78e793d692ac50a64a39c2eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abe6c504ac8f35596bc731109d714669
SHA1f477280393415519f43896aa27d165e49a6fd2f8
SHA25625ac9e01a6054fda0d75c7dc1aefd1da7134cdd196de5f4063830c5979e44469
SHA512631ecb95f0e11f22ecd6d8d032703e6b4b2d44a68485e63291edd661b79d0b07be7a28553c610455d6508521a366be08f2bedab01354936d3c558e821eefd48b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8aafb78d9e3799d63c62d470fa090fe
SHA117c09b0a6fb99f076268e4caba923f46cd486f38
SHA256ff2240ff515540baaefa3c492c4a20b0455526417092c187769581c22b77de83
SHA5121f86ccd95b538009697af65082bcabb68839ed621a56cc1c86ceb3c576294bd7c392692f154e19bda0d487b7cf47afb2381e6ef8bd1740e008ca6c25e970db98
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b