Analysis
-
max time kernel
144s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 03:00
Static task
static1
Behavioral task
behavioral1
Sample
c226a6682bb9bfb17125028d04e3219d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c226a6682bb9bfb17125028d04e3219d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c226a6682bb9bfb17125028d04e3219d_JaffaCakes118.html
-
Size
57KB
-
MD5
c226a6682bb9bfb17125028d04e3219d
-
SHA1
e2a4ac9717f0af02a61e1cfdcd77bd6ea92cdea1
-
SHA256
5ae957228eeb72e2798265e5e20212c328dbe7b9499aa39de70e3cc6912f46b9
-
SHA512
3771abc37697f4e3fa113fc2fbdb9f8d0c3aa95b890449b98dfb47de1a0664186fc29826b6479efcf83091777162c08a57ac6bf18d2c494529e69ca117a406a7
-
SSDEEP
1536:gQZBCCOdp0IxCCBcFfNfWfDfQfifPfbf0f1fzfCfofkfyfkfAfef+fafdf5fLfLT:gk2b0Ix8Vu7Yq3zMN7KQ8qMIm2iFxzzT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000093759b4c1a194eae9e55b291b3f1f2e574f815e25c5b2382884c49bb2b48756d000000000e80000000020000200000001561ae6978d8f8e07ce563427b70e01d2237c5c6f5c03b69cf7b9ff21f3420bd200000000172bba38d3026c703ce946e128d0f87380e73e0dfce6da92e631b0cc0fb6ccd400000005cd492a26c3bf448023aaf270add26d061996605122a4294f845c957bb68baa546fd6296348ef483bd38eaed78b961dd23832916ff5be08aee644fd1383b280d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430803091" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90a8612864f7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4D38FE21-6357-11EF-9629-7667FF076EE4} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 1692 IEXPLORE.EXE 1692 IEXPLORE.EXE 1692 IEXPLORE.EXE 1692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1692 2220 iexplore.exe 30 PID 2220 wrote to memory of 1692 2220 iexplore.exe 30 PID 2220 wrote to memory of 1692 2220 iexplore.exe 30 PID 2220 wrote to memory of 1692 2220 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c226a6682bb9bfb17125028d04e3219d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5a806b1df619e391be38f7006af7a6827
SHA1dd36dd2ebbc94a393e2ea10099db2733840594da
SHA2567f50e564782ce1942074c357966953efc07404aec14fee83451a1d82ccc2da2e
SHA512c32be33d034132ded77c00a5e24e6e4f78322f2d53bb705b1e373314c3dcfca0aba0c9d0ce24e3c50c37844ed790f5fbb994278181bf9ac25faeeea581db4e6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e905af3e5067b4bfa8f55e8ea836b65
SHA1c5174b4ccc1d58246d8c129c80b6ba8b7482e8f1
SHA256288702a8f001a2ae49f00d74c20730e6d6f4caf284c21ae8604345dc05b6b7e8
SHA512cbdcbc4939e6312507a998d512179d3fbd0df7044e66457c83bee9b6bf64d64d93073e7142813a6c61ab69ab78afe95255f39c390688adc2baa31ae5ad4d215d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0530d57d2723d2d6e5eebc2a09c3f8d
SHA1ac3042ebe5535fd6470debaed4fa98251aa4c1cf
SHA2566e433c2a3a2d3013ca04d1f3a7f21ee388522fae88a73d79e68e9739113a5f8f
SHA51257c21741b041d2a7b7380b159cdae3e44e224de1061f5f5438610f7641ece0cb9868ec31ca312c656e9b20d682781ed4c241840c6913d7f34da7ed16e20ea6af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f414a84290cb173c743d324e96e367fb
SHA1e3985a791d70f21f073e91ce0b150c544cf0e8fa
SHA25631acf4ab3957cef7a184a354f58ba2e7ffa1918ffce26f0d7b6825f876556f06
SHA51220801363cef0a6b7407fb6764065d7f97ff0dea193a571f5fceac75f8b7379a9908a07ff8284d53a0e656b5dd4c8846110ea5f146cc9d76d6b02dd9b8bdc7305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbf1b01e6ccb046c6a1b12a37f2b8413
SHA1eff0cd7451783927dbe66e1cb3723b5841122768
SHA2565a86c7eb37f7d1c2fd3b6f6f56f8c1e2599c23080ae2b21e00c39474dd99c6ef
SHA512842b0b9adac342f87738f7e25e3504fe426f55188f37b58c856a76cd3584d6719b0e163951a35b5a6f47cfd6bb633a0bc7ebea14f98a567eb77b1c0cb360ea64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536135eba5ed2646693630f105403c218
SHA1564eb43c80b1ac64ce3e6932398bdf1b2b98edce
SHA2564a74a98858c85608bc877f862b1f24c92437563324461664b3311be9bd8bb080
SHA512156b9ee31da3efb619b20e3fb8b28edd60ae3cb1ac065aa4efc28bc6805695ee58256b175dedfabe1c4b0ccdb22b754fd44172c0ce92ad9e9a833738569d60d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511c1f7cc8f824a1c56733e7609fe8806
SHA1e05121c0ce203f74bd8220d7af418103d9411b9b
SHA25681ea96f76902a206b63d285a24ba6f52b271843b1b355a3c3649ade5d0cb0ca3
SHA512e4b9f325629106093a03d7dbc6db616db3d866dcbd0a78b9117682fadc03c2656542e0b8474d2bcfb98202b23422e8fa2db255ed6374b251aaaf40bbfb20dafe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527f8d9e1c4979f26ae9b1873cf2dd890
SHA16f171030639ec52dd0739e99b3662b74c542802c
SHA25662c15db3e5cb3d786dc79ab8cf07de2b0ceb4d6cf9c45c64f53f1ae3629bcead
SHA5124668b0d38c75d7692f8cee47d2d963791d5094f3aaef1427c0f0bab7b9352175cb0acaa3779a42ed8749ee032735401b3f1005567d69b03acba29878b3437b5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5616db3647c946bcb0f1b63c8d41a33b6
SHA1c8c3fab6696ebfe8dd9dd2ee3bdb27e6b4b30908
SHA25639b5a5ee184a0c194e373cf0ba2055d57aec53e4cce4866f81bcaa1e5f8a558b
SHA5122bf77adf6657a1655aeb8cc00d4feface46988d00c541f779d74791512947a74755dd93403fec460ad90d2b0db950403d7e5a205c60797be4134c97b13fb06ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcda96cf73a3a1f27ec7c7f2a068e392
SHA17f2f7724c18d4ff3e44eee95375ae3d980f160bf
SHA256d43b776aeefa4934140dd9c8dad39648c9ac2967d8f6aa13ece7c89685171677
SHA51265b72ed15e8bed0f8a2519dbcf49174d882eebc8f3538e4501c3d0911edcd4eb0773c223ad0c9d892490ae4dd44a0d419851c0d6b12793c3bb3bece93191d36a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c96e374e9a55250393f458fbc259d0a6
SHA15d01e0381bd2dd9c771eb1452e5347d36e0e225c
SHA256f9547a1ef8bff057b9c0d6893ccfbd0447d99e1a6cc836ce8aa3d4cffce13eea
SHA512fc0b65292974747e0924f7733b183996ba6b1a76c7dfdf59271d75cdd821900004846c4f9f2523c4320a3c26d3b49052cedbcf2085ca9521cf208ab09a774618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c686a612110fdfd73ae452f45c91a530
SHA1b42bd050f5c75723bff6e132c2581ddfb1a3ec26
SHA25682bee27006f5a645a1646b6bbfa6f1eacce082786e749c60451dc0268d001648
SHA512c2eaf21ff6da2fac66a0d78a43e254df672e509bb56606b1c1c088427601157702240a04abd13779fabdca9c7bc44efe32beb5c9d7b3ea5f87aeed771914b781
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5e27a246c35d30bb0bd4ac57935b0914c
SHA1cedfd943a052b931e5602104e4ef8366df6666c8
SHA256b5a018ed1e8d703983a2c39292ba208e74fb27095615d66e11e63257e5975ab8
SHA512c6ec27b7f8f1ab6eac8d2027a9035f7ea9d72b86a73bef46dd7c2b20c8412a15e9e7a6bf6bbd30d0eed80e2b5cbad8e5d7d021016819cb42a57fe6c826bea3ff
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b