Analysis
-
max time kernel
121s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 20:48
Static task
static1
Behavioral task
behavioral1
Sample
81c1d7233dbb64944db5cd00a093bba5_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
81c1d7233dbb64944db5cd00a093bba5_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
81c1d7233dbb64944db5cd00a093bba5_JaffaCakes118.html
-
Size
36KB
-
MD5
81c1d7233dbb64944db5cd00a093bba5
-
SHA1
bacf04af292ec06a07ab40e6e64e99d95ab1c8d0
-
SHA256
b7efbe38bc2bb5a37e703f3742bd93d23d3a4d045655dc31aa8a32c9d1f101c1
-
SHA512
c9a9d85dde962956e4d1dabf2977cf23940009b36b65ddf8d8b4d5d0815d0ebc0e7acbacdc8fe153fd3d1486dc435f5f268cfe9cd50b1f578617aa2a735e9a93
-
SSDEEP
768:xQ3rAVZ/xGn9DO0vXE75HxPlGZLZ9hkny0+wn9A:xQ3rAZ/xGn9DO0vXE75HxPlGJZ9hkn1M
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{74BADC71-5047-11EF-AD9E-EE33E2B06AA8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428707197" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2272 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2272 iexplore.exe 2272 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2804 2272 iexplore.exe 30 PID 2272 wrote to memory of 2804 2272 iexplore.exe 30 PID 2272 wrote to memory of 2804 2272 iexplore.exe 30 PID 2272 wrote to memory of 2804 2272 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\81c1d7233dbb64944db5cd00a093bba5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561b168420a14330c6e6112f6a644c6c4
SHA1cc88d9a5ce74a0647e044dcb55008c7485c073c0
SHA256bba293f4ce2a7bfd46292b52fcb94470f4e6156c09c0c63b5a926058f0b89347
SHA51274181000b373bc1c8e5321993376a0480805771db13c296d9db23f6c2f38640320fbbe16b2ea5b02d91ae17a9f2ae5cb7dc4315324b7f190c0a9d1920cd128e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5514b9b74c0ea5c2ac4891da47212fcac
SHA13df03c9e90ca9477a1cf0d6247bbf6546c80f8b4
SHA25678ee552770e21635a36d2f0dce63b1503c912aa28e95ddca4d0083e776f35025
SHA51222c4612e05980088e0b2c3d49c93e6ef3cc36c1eb05feef3b3ad4a94703801d28003e63c472bad2151cb08defb7f822a8bceee5c11576fa3c769b27f61731738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8852ac0def6827f530bfc2be96958a0
SHA1453cfb16d0ec1a73ab2404d1db343133d0b3c9ce
SHA2569200ceabf1932150315ff5dcd5d4335fdd15a7d8c6b263cdb428608270608649
SHA5129911be97dd90d5b2aefc37722f41f86832dd1b8900169dc2473f42102c484d0bd23edcf21d94c60fd4f2eedc60666bfc983e4efac6b1066747d76c55ac8311a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a03d3dc5ddd53069c805814e8eea19f
SHA175f3532b5bdb26abe5fa1acdcfdb6dad5490d13f
SHA256feefe80a718cca7437d2d98c8dd8320da9080d1c14e2baf65645d27c607f9ce9
SHA51236bfd6d1a905808bc3b63a23301667c6ba6a67d29314a43c3faba1921126a7e10f3040b90692e6ae905d10e270dbe05f6f1233060f684bc4eb5797e9666df7e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5256da4248b675d048838d978874dff65
SHA1c779fd291fe28a8505c45df86c8969a4f3cc008d
SHA2568b99840017b0bcbbc5f73d510c0cdf9e0e750e7bffc13622c99f7ec9bbe3d945
SHA512cd77771c4856166308c0719134f1df7e05ac51104075f7e64339b02f55b88375e253f6640f8888f293a0395eafb96505047c3de071595dec1c0e8dd9b069de0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f50999afbaeb1a8fcc083f3bd89a2fa
SHA12e8eb290f933142de7fac52d0714e88042a6066c
SHA256e73fd3739782dab968e917e72700b1c3551ea424c0700180763b8bbe3086a335
SHA512c7c4b41c6bcaf1283a2971cbd941b14d56b5251d82418c6c4eb4bfd380acbf95cbcf449e4c53330e6a0d6bfcdc00b335da8c45c32188123d808ce02bcecb4a25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aace5379a97af45077d177f6c8c9a346
SHA1ce259985c142164708ad41f553620d8917425700
SHA256273f74886d0de646cffe5c4cdbae99bd0f6a344cf6c80b7c747e7bcfd10e256f
SHA512ed463231bb8e10b310d063ae76798d56b9bc5d70d8539fd26416c078479eb4e8b6c0190fd979cda9129fd79cc0ab65372a55516c5db9aa00d40242da40e25e14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517871d51a848b3cd6be0218e1be87342
SHA1f3ab74598c0975bc3e43d1c98a3f06753a3c42e4
SHA256de1644ac22d89f3d6d9e64ade231733d3ccf5ff8a0f0ab35bd1d65df9ecd2d42
SHA512ed2dab73d05aa1072d2770ea158532708c53d3674027b63aaa33a317b4c95b046588c5fcbb435670b6c8e9feb1bacf4a3a07bae10fc3456239272ba91b44268c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5431782bd93d1d1df061de1019c776acd
SHA181a5ca283266a96d4ba22e37443e3cfe20da58e5
SHA256f167be0ee51fa2ea843cdd841405ee7eeb23fd7633867a5da8753cbda1ac2b39
SHA512423cbc16be76095f999e414f1a638fee0f65216e8f305ba3703646e4fd88be7b39c1c35a9eff626d301f449bd93c3659a36ebefad063588bba86f12a9ead9c48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c065665a468684001fd1f82ea6919b77
SHA11c433dc9cb4d6591ca176a2e184dc236cc8312bc
SHA256c2210246a0a2eee8271898d2c40c5ee327d7a384e90767dab6f275eaaef22e23
SHA512b5b8bbcf9283f0c834bbb73e8cd1522d414d4f10775b39cdb5934777d72966a3b401c618ccf0b2f9465b53eee0330af7d93f04959e8b445ebf3df65069b819e3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b