Analysis
-
max time kernel
70s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 14:04
Static task
static1
Behavioral task
behavioral1
Sample
786c1a522bcefd64e741dfd212af45e1_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
786c1a522bcefd64e741dfd212af45e1_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
786c1a522bcefd64e741dfd212af45e1_JaffaCakes118.html
-
Size
2KB
-
MD5
786c1a522bcefd64e741dfd212af45e1
-
SHA1
c66d30ced3b333cec26b4565abbc04e23f293d83
-
SHA256
625fe51a18089786e135e002eefc7d951e7148337dee35053e4b321eeba6cc56
-
SHA512
7d9474a5048d983a4e59cdb243a30afd4027c97d3ce8ac2a4954d8bddc50c7c81e459ccca334a46be90ea4b54cf0ab5bdb56dc261b02398f16b467765e74ad75
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 000c533b6ae2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428496724" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{66A531D1-4E5D-11EF-A543-CAD9DE6C860B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000ed290976eb60076dc1b8d883d2778c5aa3a6cd366252772c5c1ddaeb779ff91c000000000e8000000002000020000000f46ff428497ed1e9640194d01c1f19dd614a3cc2b58713d7b8cf845fdb297ef990000000adec03be5716bc9e3e1abf8c6a5d3f928f204963e2eb92abbd0f16f5483911233cc3835d90a973987d99ea52c9ad7d2862a7121d325417dec8e21690517e56cc60c9074ef8669df13919d23aa8080ccf37b3d9a84986169ce4712b4f55a4784d06ac7e395b5e572b0e5529963c226fd0b63c398835614ae1d19a3fc93bc26538ba05c8a2fd549418eb996f33fd58c4bc4000000039b0d44a256142fc0e3989d6ad99c9dd863e73b0709a245893e880d24ae95111e928d9ac78437a97f993d4ebde133c53a3f46e70ea341fa39bd8f59393a096b3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c9200000000020000000000106600000001000020000000bbb1a5b7425492040b473ba2a2366e24816a109e404438a46ae4f4d05baf90e1000000000e800000000200002000000051cac7eb25614afab4a8ed86510df486a88d212c9b0b86038153ff0335f355fd20000000cd2ca6183bff928e526cee92f86f63c0dc2cd7ffe86c2a3f3a26e64b29cce3cd400000007cb3c9adb112aca8c5c4f588d2c7a9999022bd65d09f34c62e6d55cd08cb284bee20af5f3b07e8d16f8d44ca7f6cb9eba8bdae26bbc35f9a734ceec0172917f2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1748 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1748 iexplore.exe 1748 iexplore.exe 672 IEXPLORE.EXE 672 IEXPLORE.EXE 672 IEXPLORE.EXE 672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1748 wrote to memory of 672 1748 iexplore.exe 29 PID 1748 wrote to memory of 672 1748 iexplore.exe 29 PID 1748 wrote to memory of 672 1748 iexplore.exe 29 PID 1748 wrote to memory of 672 1748 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\786c1a522bcefd64e741dfd212af45e1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1748 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51182058c0498725e3a4e4c898adbcb68
SHA1ec64419b9460e348c7a246680ea224a2de3baf63
SHA2568fb6e14878660067a9e110d8b695cdbfe93c0b2e7ab663bebb7c07f0cf3d68eb
SHA5128dedd39b75424937a3825e800c1324e23cb5a6e4e83ab0d2e30fd8e901f18e5633352595831702769283523085fae8893cb5a8f54b4166278d5e609d0b461faa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ee8a7ce0fa87455dafd8bcfaa89e08c
SHA12113e612045ce191818127dd06d40b0ee1a3f782
SHA256073bdfca87f76feb0cb893c6f121f28464a9c746a09cdf97dcb58fbf7fcf418b
SHA512c514ae66d1de42657bc83dedd9935b275fc65bcba6cacf302d8d82ae5658155e110cd77094e4832575e0e00f923e44d8f46ebf338d658f0b5f6c9150dc4b33d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589fe3f0036b4b19c8353df1e7a2b763e
SHA1417ad076c86b8a699fbd5e146484e19e82a8cf02
SHA256012c8f3550fe8df31007ad4bc406a07b954da8799e2acdbca35e63230effa2b8
SHA5123d946abba64ebeb8160a39c4cdd31adc916667582f3c5c68c4f9b5f63478a4f7e6f79b4b51d608f7a5296f79525079d0743e88c944d6decd021c07c0b4f3df2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b72d6ababd0a89905b72e84b682c3dd0
SHA13130b0b42296a01abff3c027897d89e40f185f04
SHA25634b8224b60cf128f003b43aca208507ca028b1eb89400c67cd89fd8313d28d8d
SHA51206e30047889313dc8dc0d35a2b7e55e744924478a8f44902dcd67cc504094c1de1946fd21179c15cf88d3df683c75c9e878f12786d1550992ce542decfb5464d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b193958abe1cbd297dfdcc321336156c
SHA11d9d57b7ffe12c32cea37ac04d5896177c433293
SHA2563f8fb078859dd3b8b4401af5a9d818062bb82e39011c8fb1a5bddf4efcbaca7b
SHA512c160ce900d55351677bbcb0a306b4c4a767bef0532cba25a0e5f3b863056452174c3717fbe1a1875469da04bedbf27c20fbab843f63ae24508ffd57a054fb7b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596f5fb529a2b3729f653d09f146835fd
SHA1e740c61efa82a5e253082d4714bb21d5ced841bb
SHA256defc0c18fe9599555e0e21bc709b231935e9cbb04c0da312b8891d3f06e109cc
SHA5128d5beeed2ffb0e772e40cebe2c035c2387943e1e58d271277c6f01d6f074955a48599be951f5b43dc483be4dd257d79f4654f049e7a41c4c6518cf21a882675e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5650f4fb502b0f9ae9ca7bdd6136458a6
SHA1737227d48f02a4f8e540c1cd5bc9af27226f842f
SHA2562c26955e7b977b6b6b0f234e4dc958a432d4a745b0f4cb551eab3093db311f8b
SHA5125284316a0e2a5b4c9f1efadbb237ee472559be4369a26fcb7b8c02ef13a5ca0903236b4db842d02f0e48ef7ec151d261c19517e3cbbf254428074193885d27e2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b