Analysis
-
max time kernel
132s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 02:28
Static task
static1
Behavioral task
behavioral1
Sample
76b7e080bf997cad179c366564f8af4d_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
76b7e080bf997cad179c366564f8af4d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
76b7e080bf997cad179c366564f8af4d_JaffaCakes118.html
-
Size
30KB
-
MD5
76b7e080bf997cad179c366564f8af4d
-
SHA1
9cb060be09075a1de477e38368284aec1ddba1d7
-
SHA256
3ddf8cfea1d8b91eba09bc479c122f34beb3036dfb83b7c30f7b3df2cd3ba19c
-
SHA512
0b4f07e3a9f4d4edb4a1b70bf05d5fafa4659a4eaeda6c6c2eb3493dbf556e1d72294e3ed7091783035ec2b39210b165d3852fc6c501d1677053c5780073bad7
-
SSDEEP
192:uWXXb5nLYJXnQjxn5Q/DnQieSNnwnQOkEnt1VnQTbnlnQeXC9AR9EBkcwqHAzpfe:jQ//AHopfZI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428478973" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1409CFE1-4E34-11EF-8A2B-F235D470040A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3028 iexplore.exe 3028 iexplore.exe 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE 2456 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2456 3028 iexplore.exe 30 PID 3028 wrote to memory of 2456 3028 iexplore.exe 30 PID 3028 wrote to memory of 2456 3028 iexplore.exe 30 PID 3028 wrote to memory of 2456 3028 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\76b7e080bf997cad179c366564f8af4d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c37ed0ff5714b0c23fc24ac237b7ab2
SHA1478eaec222fbc2fa5c217141813146c9e1e5eb66
SHA256235091bba97a6fe786e6ccdc82870b9e91e01cc325f0111400d89b340b3c80b2
SHA5123553d9e39cf7e81e7fe0ff5f2592840683bf7a741c1afba83553ae0c879c4bde6871eb7c4141efa24dc590981c7d3c8be117b1dc79e1f6ab93f023244ffc63ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3367b7a221316ed41e63d97ea17f49d
SHA18fdce6b1dfc84ac5123cbceff2e9a7a81d1d59d2
SHA2566285a11b5feefe841be7120511e7228c958493afcbd46f6df21b48eb7d984907
SHA5128de8953cd94e477fc3dfdce28ac72d2f60a7573d4b0f472d1032d6dccb18aa3342a6e4455b757481fb974f1fd98b0875bd7caaed8b2e7142566beb622d39b346
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584de86227fc12592c9b27d7b32bad66f
SHA13a210e8c0db9900d95f8d427b973a690b5a0ddb9
SHA25640daa5e98129817b4fe1e6ad2d7546ff982180ad03bcece0d5a87fea51efc354
SHA5122ba0a8343fce15a73f04f0c845fa89c8261489882a060719ff273a8f7006a3e41a0a539c638c2e1c371747be64b76ebcb01e536eae5909d5e84d12605772d6b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b79745549bf867deff3cc367cae65f64
SHA11bff3eb6c615495593a97cedec7f971ced481b2e
SHA256b5120c6d10f261ed4999e11d1168ebbedfecab8d6573146c2e107194e67bdd96
SHA512b710e984e3233adbde175c928f73e2850c711b47d65437d0e8d6259ae63ea94af1dd113952aa645d589192c4f52f79d672f92110c873eb4675c4eb98b92d621b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5479150ae58755906d05038d91abc8c39
SHA1e29fd92db0875b9a92d8f3ed056e2dd28ef9e3b6
SHA2561ab91121335d8fbffa95d8b5efa85f1f809b8ff677f35650d16901c3d750eea0
SHA5129342bcfd82daaf2a7b6b7aede28be9a1470273588fd3e7010246e1f57693898aae2a5559ceec3dee9a6d3ea69f9a8ed95e2fbe70988afa07b4ce6c85c9896e3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b88508391371fd3be14d1209ecaada0
SHA1e65d7f21d604367c17de71d8e7894a7b2efa9a32
SHA256ecd74165d1dd5d1b4d0abb9139cc0f5067250822d03b58994541fc4cca33118f
SHA51202261f215caa822d916dd212e4f601f16819b11785151f3eaefc7419826d9430f8bd207e7e66aff765f5031f153b731f4501b443cfedcdc34a354e897c4ae793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a42b8cd0d446a60d8f689dcdaac9d553
SHA13090083555dcb43b858df419d96fd5ef13e5e3c8
SHA25675295dd846557456aff2567b388177263822b814cf6b58050fa8d5f920651bc7
SHA5121df0adc62c67d438e04fc3595dcdd85af791e5f04ba0ad2f32c6504bb94fd3d4bdc2e97bea4637640b887a2813b9e1d14dd26cdbe303c43d853ca6d40fd91700
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2547336b0d5375cb875e6109888dcbb
SHA1ca2dbcc09576d359c164a9cb8a5fee44c2a44a07
SHA256004693b03ef1a9ae424403a98ca1488adcd88d3cd3b1a3c4c16c59ebf0325416
SHA5122061fb0f319865b89e3e7548fc958594e18e12834d7c2b34d605008c1484a311d9071349ea206316f48da52f023cbc06a9472b4e6164a629f84856c1e0308c9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5789b6efa7cbfc4a27ab82371f1358cb2
SHA11046204a8723674b819e8260af942059dfb9c647
SHA25606e5ca0e6f54560b42ae700276c1deb4d0e9107aa71a065b0bc27782252aa096
SHA5121e61f2cae05f208c35d768dde58fe28f3589bb6922f42420cddee9b7c1b1806ae85d8fb606f919e55a767ef14f98e00323bc5a9eb837ebfe3623bbc3997c4b63
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b