Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 07:48
Static task
static1
Behavioral task
behavioral1
Sample
776bc2283f8fca810d83ef33091a034f_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
776bc2283f8fca810d83ef33091a034f_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
776bc2283f8fca810d83ef33091a034f_JaffaCakes118.html
-
Size
31KB
-
MD5
776bc2283f8fca810d83ef33091a034f
-
SHA1
acea35881eb97a1653fc36a05fda05ce2356675f
-
SHA256
7b876b1aaaa23ace941dcc70a1baab25a1444dcfd3050db7904551e16d4366d9
-
SHA512
bc22e9f70759f4ecc1d4ba50a932bca0b3e14d015be2e279e6bc9f3131b3d74c99bbe1d8820fcedb87091f5ec36dfaedc14e8eb4f2a0b8d137b2b55f31973a48
-
SSDEEP
384:SI2f2blMRVl/4QREKMMvQVOL0WCVaJNF6g/XFkkZi:SX2blAVlhRJMH0vJWgPFkT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F80E12F1-4E43-11EF-98A3-428A07572FD0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428485797" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE 2184 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2184 2236 iexplore.exe 30 PID 2236 wrote to memory of 2184 2236 iexplore.exe 30 PID 2236 wrote to memory of 2184 2236 iexplore.exe 30 PID 2236 wrote to memory of 2184 2236 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\776bc2283f8fca810d83ef33091a034f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53782bd430a0459198d0e84dfc2450ce4
SHA13f348e40ff2b0434eb677d3dd195f2cd4bf5a136
SHA25671c5f4c0ff6cc64e2392df49251a909a25e449734f61608080005313fe8bc19b
SHA512f75d26999030fbf96061c1d40276b187f0c29a68bb31c3b117b27a606f2146a337e5e39d5ed2da3f86e8795fef68ad0ca3f5c13032dea92b0fae85036b3518e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db8b1884df87ba281b21a7d7420e6bb4
SHA130e49f225fffe380aaec0bebc36993f2093f9d07
SHA256c2227e1dacb6679e933cd41f3c5d4c1dfe6e1febef69a613b8de9a88d29bc823
SHA512cbb20eb3e57826bb406d6c8d7d8206bcf80d4ef7a1fd3aeaba3f5a769af2d263251e183080b2c30b53ec29bcf471a5b619be0183225e90db7896398031a6d412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3f4e944b272ab63f4e3af4ccb8047a7
SHA1ffaf75088da9ec8e3c59b269e64c834ca85ad7e2
SHA256fce05a7657cc1130f4f8c41fb0cbccc9f9c5acaff5d62bffea33262b7059f296
SHA512714eac70b03908d11698da1298eaaba22a097f5f803b570bb6597bccbf8e5d61a53094dae38156408ed99df448649463421ba4f7a5140fdea07c14c7e80c6803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd5b856933121cb5573209c65344978d
SHA1105acbd8d2cda96ce9942088ed536249c614b651
SHA25669dc6cb8861ee46b95bc8a4d5781947d283a5120369b9333ca5f1bd9e15f8a0b
SHA512b01b19c0c5e82dc48e043e80bdbb71a82079bbb4dd99c8e8fe6a8536a12b4e868af00d7407a14cdeead58b4de33b01e3f68cd5924baa81a25f4250115afb84db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a836cbd05797c872d732124e310518f
SHA160e5d1aefdabe83d31e53a529a65eb43841d057f
SHA2561d8294cec12d98eb95164e70a5f11b51f2aa8b93e6b9801a94ef40fb1555d651
SHA51296ccda5abc6c8a8f31a76d81b06b5bfe79b14b6dd147e705c421bb005f8795a5b042f5949d6ec9e2e69c3159a442f35c7310add1125caf0fcee52038576e8962
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4ef1b1e7db3fb2c3863628604bb38b7
SHA1fbac71aac77e389f5b988a32e93331a4731dea62
SHA256fed0f1868ede2e5d3178f160eae69eb3b49c553ebd2654a91a47f1052ca4c44b
SHA5128e3164937b300244a5ebd5b6e725b7ed600513eabd77adf8854fb2e46c5327fd7eac65e0b703c3d2ffd735fc9bdb4ab8c79504cb149952434cd722c2eb1893dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3040b48e29e34ab4f2dd5c7158a7611
SHA1191b6701894143ccee1e85111bab9b7177664a61
SHA2560e56c44c66cb25afff0d457c5b5c285ea74e94ce8f9cc0376d19e8bdae6d8348
SHA512254411caf11f33338a6307b185daae590db36a97f3dd2a311ce69081cb4f365fb21cf0a37377b6a0b1355086537dabe860ecaa547d07d19fefc05a11e5fbac3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eb598b928d18341aa11f3fb68c5d5e4
SHA19554a236db12fe9f51956c527ad049cb8b5571c9
SHA256b2eb64c3ca6b9098cfc7a3b5fd8c8a8a0bef7bdb73254b96750d8c1f03bffd42
SHA5122a4ab3ed8ed2f7d55add1b870354ed04c79a6f1af73f57f5fc451e93f4091e7dd68a57950fe354032704b872420958280c7c47af4366917668b085a66f2e55f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e79dcbadc28d112dcefde0d40a34c52
SHA10f91d34ccf4bb022e43f7805e3bdce2acb9c02bd
SHA256a17a6f6705fd55ea2841bc7f5dfd38d4e9c40e96e2ab9600ae7ca5088006c379
SHA5123656ed0ad02a9bd43af94a083196bfec210b99ba68be6b6df0aff6c48881e6dcd5141c523079b991a4edc11eda603987f1575178f93afa15203759da10dd7a2f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b