Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 19:12
Static task
static1
Behavioral task
behavioral1
Sample
f6ae57e805e3fadf48770250a6599219_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6ae57e805e3fadf48770250a6599219_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f6ae57e805e3fadf48770250a6599219_JaffaCakes118.html
-
Size
6KB
-
MD5
f6ae57e805e3fadf48770250a6599219
-
SHA1
f77593810c05b7d3bdeb89bff2c37340d9b1a820
-
SHA256
c964b920412ba5077afb3fb98ceefbdeddb84ca68c297000940d54b7f4643c97
-
SHA512
6d5f60a2b7d3886951b72a35c114c04ecec91ca1ddfe47dfb743845f7a0e78d83a24640055c08bf63d34244c92640798ae9f56949588d2c63d7e110c0ff33c8d
-
SSDEEP
192:WQksPD8FQ2c0cUdrVeGq9ce6h+QvY7359vB:lTPDZZUdUGq6lh+QvY7bB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000a980cfd3b27a55697927e31f0463b80cdc86783053bfdfb01ef89b6d084470eb000000000e8000000002000020000000205a21c7df81d00f61da15db97d38c0faabd7f5d58e53d259aeea342d6c790f720000000c4fde3b213b51091f9eaa1707258c6f84bf1434f776be2e7fcb9844ad77b35934000000036e21fa41e57b197829f1a8949515186b4ac57df5df1521aca8203bad7b984ac3cd3e044a32894c0666c6e44bc171dd1b72ffaced7e6f37955ba2ecaa60fbe6b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2375AF11-7B72-11EF-AAF2-E67A421F41DB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80a89af97e0fdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433453429" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1352 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1352 iexplore.exe 1352 iexplore.exe 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE 1716 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1352 wrote to memory of 1716 1352 iexplore.exe 30 PID 1352 wrote to memory of 1716 1352 iexplore.exe 30 PID 1352 wrote to memory of 1716 1352 iexplore.exe 30 PID 1352 wrote to memory of 1716 1352 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f6ae57e805e3fadf48770250a6599219_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1352 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d37160730b28b81c5212b943e74b95e6
SHA1f8febcd111a82c574c55888df27f731eed1e3333
SHA256b296a2e2819639a7e2a6c1e53808ef466f7f01b20a834cac5bb8b9c07f54d621
SHA5127365591e9b6def08dc375af3ad18ef496e698fad5aeb2a9772d5831d83c41447da78f73d23e8e3addd689c56838bbab5f30e0d7159a4cbe7e25d16bb8d6fe4f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf2772f7461ceae9f437f8e44ea1048d
SHA17943ffc7ada5d4b0cfd9bee7a23b193310a56bb0
SHA25618f5d7f9a12680d9feae226355c0bf6fadb4d896bec88163b775f36284d52ae6
SHA512c6bbb58d63ee980e10a91218d5feec767692e7574b100abdfd8ff5d44d5fb7e9e43bd8cfb10e4dede96707b8047b6883863596c479254bcc504a8a2e75da7d5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1b0957719e9e6fe50b0a2e405c43a1e
SHA131e139cd4352e8d057272a29e4944b398221b92e
SHA256ddc0cf4cd432c82165ba198f009829588a9f5fd8fdb8724670e30d8386ba4f3d
SHA512c86dd85827a8d33239282b8305382a272763c95ec81079c39ed9fdaad1cfcb30c479e4d77f8b6898cf08b51e4ec9a94da2b5eba5fb633aa42b34ac5c1b517cb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573e39c9354569840c2fc7b10a26f286f
SHA147609ff777055d58088ad7ac94de524d7053c795
SHA256af6ce3fa417fc24a4d6c85073d724f122b0248f92f5f4c9d8c4fa5d6e89a039b
SHA512da11f0ff66402d71f082c190e9f1bc6e2ab55457e33f9a3e5a701a257dc3db3ade4d423d9ff0dff531da3d195ac0e610e1e219b86b9c703530e4b8bd47b33024
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c29ccbe4bb006ef6707a4252e77f09e9
SHA1e5c4a35c20518153746ec2741e3131a9cc361794
SHA25603c3018bfaf47eabacef06a4dbe975acbe64ea36f7305c4a79d255e4dc624079
SHA512b093b5e3f1bbb080d4ee93055c7d1b7bea7f0039da89756d88fb55714db178c9979158ddb42766085168b8824ffa223ab43ec77c33e8f714bbe6444294b7e81b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3b91c16ab3f6aa2bd89481e6957e868
SHA15114fc87197b430825a545bfe2c57c2f6df2643e
SHA2568a99f15547f162522dba2f34012715c4ea35c27c11e2806747bfbd824bfb5006
SHA51233465fa576b43a78ce2c434daa9e2de6fc49da81cd136bb5c6281f82268186585d3fc07fa7b2a1546ab8963450359283addbc5fabde49430c0bd8b51d2547fc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cce3a4d7b1530bd510e2140548f59c1
SHA1b3c7ef233ca59babbf34b070edbdcafa4d40c4e6
SHA256b04c3693dcbbc0cf06d383c61461cfef9f422a4af16dd1a83037c6aa62aaec0e
SHA51221c7f88981e86a596fd9ab6b404a5111e50652b3f5de0eff4aa688ed48d88757c4bd7295bba62128a06b4410f98fed023821ba55cdbff9c9bd7d604bce7f22c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ae6ee417aad5fd7a6f06b9252b9352b
SHA149c8595e3c98e0bc0ca2b1b460844abda1b4de0d
SHA25639665a2660b0567319de85036c745705ce1d51a4a5b20071f5b13627aa352a29
SHA512b0e2037c42799e30ac3e58591c91d4f499f932f7b65338bd8e36441684d3d19c240d142edde08ca2bc1810799365ffe1361555b250bf85b9ecad6356a8861431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cddcb30b50a42a0d260a4ac52cb0c18
SHA100fbde923d13bb5416c9956ac9956e027f59f489
SHA256bd3fe7bbd1189faa9aad70c43e14d6a6642b20d48ec7d72affee47a3c48e5b1c
SHA512f56cabc478ca7bd0b42fd8d37483a1bafb19aeb451b35c464f0eaa61600cb4595b26c09f5910902839b2a9e729540ebfc606c80cfe3327d772a7b9db4a1b82d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59634097d2646e116b55381b5897185c4
SHA11211a87b3f2410f525f9769ea432932cf60c9956
SHA2568e5574db13e50623d39a18549fbde21f15dbb1aac10ea943bfd14c0b51fbe0df
SHA512664c770af29251f7ac2a6ce5bf0ff032d5434e36e19b12423195c9470ea6e72d7b2dcebcb942899109ce4b4b26db98cdabc375655614280a05f681a87ae43a0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5398df3c5f3af7aa30403a271349af47d
SHA165ecfa410ea436bc8a24c1434deaa3d3e704ca42
SHA256ade7a1acc28110ff183cc9e2638c141747595ed8bdf0866c21e08eca14fab4b1
SHA512bf50f9d4e506fe3769b70295f1709188d4a0cd18735583a00c522c68f6470285ebeea49c0444f9707f708b7353389890f9befe00d40ce9e63db9d3ae4363d149
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd2fd67279f0892139a9ae2ca0235f3c
SHA11b40806537267a76790dab3add782e0a78f61b74
SHA25658aad6b042071e4b5259d14bd3535abe2c9dbcebf5635f5e0effaa2f4033ed69
SHA512c97258076e516f6efff7c39c7c90b897b371b6b2fb5cc75852b3ddb12ef9c23c09c3dffda71ad5638afc485d1b7735eedd2c9a415cef32a9af20c702abaeb3c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5392afd227dae92825b6ee6d932581574
SHA1d33c57206d60ed4f351e6f95728335b0be1dc9f1
SHA25627141c122b08ca0ec432f42b63d50fb33c8939dd94a1388d8833c82da658689c
SHA512d7f681718f92eee01412f9c71c9ef66bfff128ba1f270b9aa345f0c9c253ccebb27b3507388e9aa4dd9c3ccaacceb188e08adcb00dc685f186c73c4058966de4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a2789f2823da91c5c269f346f7e1739
SHA175cd9080d6d0c859382c583d66d2550dbc066432
SHA256750cfc7b9c8b277f242cbbdb75b2de34693402327a852d0fcc09b5539b7cd4dd
SHA512258b58ca24fda1222bf1c6c56443dc793bc45ece629f1d5c9d2bdc9b70de7767e363fd5c3872d7f6f74ad368ccbc8e3b6fbf294abcd8834b74f1d95f462b48a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580c120e2d1e0f612f5b954ab3a0199dd
SHA17e9190aa3f14778e0f6565f95ed70ef6ed892fe2
SHA256cca38230bab8ba8e4b9ebf3f406588ccb63dc9580452358e32aa539c755aeb94
SHA512351968958b5a63404fe842dd30a3fb194a2f7d583cf97a7be21cf61e4ed61b8f0b185c9d91670b7a780f77c613676caa26f6c3d2bee85fe31cd71b3a4793482d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a075dd59abcdf053b0a873a574f4e093
SHA13eeff841958eb4b3cd6feec1fefa2eb9a78faf67
SHA256f78c0a7d8d23b05165ff514ee9facef61fd407e0a4909019439ce5c47c87e316
SHA5127746f9c5da5e93f9a2c66cbc7c22cd464a8251ffdb12f4b3aa1aab12878092ef10887c70e7c2d8b23c4d8705c6db1ff5e64bf37cb912a5d17512017d42510c45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5187dcccaa8bf318e3716bd08e76ce893
SHA1944eb22b634d9140f2b03ea4c43fd7e03dec62de
SHA256ddbd8b3dac2de3e9f24a59c45ed7257a9acda5bb35636fa2a30d463840875a5e
SHA51224534b243158c2c3175f9b4d31efcc6c852dac93c35daa4299c41e8e1fa64c14cf40d259c8b9855e10739dadaa8a731b717ab3cf23671fca21fb2583af2b053d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566b1a78a66e41811c098fe8b79f46042
SHA115b1835a0b645263ef1edaf82580a964ff09ff01
SHA256b4d100106af4bb6157be00bffca9e230e3170533ee4aa2ddd66be06c12c55778
SHA512e380c06b1decf2adbc7f7848e56337d544438871bbcb2c1e6f9f456db45604319649e2b3ceefbec908703092f612fd332b1dd9c15be659496aef45424cc3fd23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db318bdf371537888e5ba6d78effcbab
SHA1a5b09cc83f5e32018356333853d0ff138df5cdc0
SHA2568e7ca42e6f8291b3b98c865d3e6181df630565b91ce231c7cc247fde1594cde1
SHA51292b27611e97e9f43c1dc1fa6c0dcc9f984344e67a44c84d22eba7aef49ec6b8f53f259975092a2baa61f54cbf3a108d06e6ddab514aa9ca631a1f04354716892
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b