Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 20:45
Static task
static1
Behavioral task
behavioral1
Sample
712b1901ffd71c1957e7c534519c05f3_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
712b1901ffd71c1957e7c534519c05f3_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
712b1901ffd71c1957e7c534519c05f3_JaffaCakes118.html
-
Size
23KB
-
MD5
712b1901ffd71c1957e7c534519c05f3
-
SHA1
431fef8f397028256b90a3fa4458890a14e6a60b
-
SHA256
48541628a881484de49d9d7cb088b85bb98987c2e4e10f88c2d65a38e0b109c2
-
SHA512
3384062f4ca9d38e15a3b959ef56342a8690b5debcbaff4145e9aa80a6420be66c6e2b3b8ef012aeeb8762122fcf139ea62fe896f197e0d5b84fe79ffef28208
-
SSDEEP
384:Sy0iuZ9uqllpBqebmwRjRlnbW9BvcIb36V5vqyvYh2vMSa:Sy0isLllpYebRLbwnb36V5i7HSa
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428102207" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DA015091-4AC6-11EF-8EE0-F67F0CB12BFA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2716 iexplore.exe 2716 iexplore.exe 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2716 wrote to memory of 1612 2716 iexplore.exe 30 PID 2716 wrote to memory of 1612 2716 iexplore.exe 30 PID 2716 wrote to memory of 1612 2716 iexplore.exe 30 PID 2716 wrote to memory of 1612 2716 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\712b1901ffd71c1957e7c534519c05f3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2716 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59578f69a3fcfbc16f7bc42a1edadcedf
SHA199e2e17ae89f7eabd6a8d83c13aa14aca198efd9
SHA25674accee02667baa0b79b5cafaf63273976db432cae0c9f76bc50f7dd073b8b82
SHA51265ab69fc1f97da2168eb8d8687afba173e5ae04b092caf27491ab3523dcfedef5d7d7ebe22ed277a9f209d23eb2f17aa41ad02f872ddcd0e34d42ddbdb9e032e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584c8765bd766f8907311e09b99cd0dc6
SHA1dc6f5eba6bddb3e7f59b498baae4cf3ee5981e66
SHA256b90feaff73e745405b77342bad7b5d2782ebb3c552ed535ae24cd193651bc1bd
SHA5123c8974a229030b6219ed337c019a0ae0832546ef9792311861fb52e487bc26013a02138c7e4e2c6dd9408b28af557c1f6c646537b846e15a0280913c365cf325
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8687baabc392e3132e6ce3314d0b486
SHA1474f94d14fd0ff77df13f538c4e5160a51b71931
SHA2566d2cbfd16edf7068cc143aaa427e82f59f9140c27879d50424bb165fbf04860a
SHA51223411aaf992ab830a839d22c15f0956287875b9143982c67fc00c669a00f784c622550d0709900e35d1013402c2367eac40eaf0bf06c5093782950e3bd0684fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1ab7c493532c30f2073717c1abdd18c
SHA1791f85dab90d1b863c4b17c3be333b27fd715ca3
SHA25612138f1eb3337d9e9bf23c2e33bd41acf701a93cfe16661cb22e08c00744e853
SHA51228efd0664eacfb4cf105f4736ba2e0c208c11e9cb0b036eee24d5cc64d940e0a850dda01596a22964b6e32b5117eade69152dceacf28a26745a72c7e9a504373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55eac7589285eb0377bc4a1e1922d2c95
SHA16cf1d44b1a1d9d0c604e5b48e48569f2e9b7a16a
SHA256b7b2938a9265aba263837ea74fc4e10f94e1bccb24085d08ed8733b88af805a5
SHA5123c72d52e5692f76a68e150e42dc7fa216c9ef017f9b82485e9784adf2c24edec9daea8f1e2487a5faaec017488829ae917eb436b88d96eeaf637cd28f818d27f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3c3191728d01b8df8a118853f6a521b
SHA16f54d5e39e9499ccfc0713d04529d5da0a709a58
SHA25674129d35f9c48846f7dbad9f78295cf2eb35de1e69b50b87ab58bcf3bf1b2210
SHA5122665aed1c6ff07480cba9752ed89ac5393173fc15fe9dc980cefb845645143a37744b13779283e2c957c7f277bc29ecea787b15aa3db87993257cfa630704e6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb5f81766a887f323cfd456cb577120f
SHA12608cda20d486d6cd25b76c71f85cccdcc229b9b
SHA2566c22b0df101883e22ecc54ecd265934d655354d647377d3217db03a960623596
SHA5123992606152f7eddb99b6903b703141ad85489aa02978350d89ba23c17aacd43c2e97e80f2b2198dbc8c4dd84cc8be9031b2ea1097634b98d6019b329833c4937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5126546ae6b0e11bdcfe137c47cb22dc1
SHA1a7577eb203d46924b6b812ef7935ca5ed5b4b9ea
SHA25632b9ae66449e15e50e3660cc6e41978def27915efd64099b24ad2a215e2080f4
SHA5129038113343201237846783555da86347852480709f0e6db3fe512aa83bd1b13f312477bce31d27d6f79018728a4be43c12ea58fa63ec9ee972be56041fcf1d07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b935910393e092c31f106f33f9df7514
SHA1df8ddc178c10f3a46bea4fb8fe9a447555ca586e
SHA25645efc49a3bdbd984447bb64ff493f2bf630be1fb5062a017a069d8285be19574
SHA5127323f4e41b73e184259701454091efacd0d18fea84c85c122866d5494dd51f6824a03018b7fcae918e666ee19ffb0ae39a83794a5235969fae8fd8592cb0da91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e896258ca509734c99fd828eaf7a272
SHA16ce3f3454f80c9c9c6bdfd765e60f747de3254fd
SHA2569f14bad1d0325fdd0826d30ffdb2af7317775e377933f3cf58af0676a7ae0d9a
SHA512ac8335801e4d5554abd620093895a85ae14af22148f4f61f0200ecf35a3e3ed93cfc8951bab13425dbe81de4f04916a9b0beed786178fe490ddc4fa939c2e019
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecdc5b999009dd7536a107aa6ef06bb4
SHA1be60443963ce2c989575cbedb5ec27fe70ce7992
SHA256d9b0bc23775766966449926a4b469a64cec69dd131b67b623ed7c41f36ace1cf
SHA512414e25a4c1a63ef17ecb47d72df9acca8d929af13f7c378f34bede6e0c1e3b3967b98d97cf837194af7c5eff251728314e217b42174145ed24e1a15d6b40f902
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9927592be74cbb452968ca40d1c2b46
SHA1a59e5d1972e3066850f68001d867036c3b252b75
SHA256cd317199dfb3792ad361881dacc0afdae349476b5dc1207feef91845edb985fd
SHA5120684dc676dd55f49c8a9f3ac2f0b5d463916c0ae98f47a4e2f15f9620c6d25b84c821930506d90f4fad31234d1cc3606b977a5dd618d796eb7c33858beb000ff
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b