Analysis
-
max time kernel
132s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 05:49
Static task
static1
Behavioral task
behavioral1
Sample
834279d238d1cf34249f894c0b25cacf_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
834279d238d1cf34249f894c0b25cacf_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
834279d238d1cf34249f894c0b25cacf_JaffaCakes118.html
-
Size
258KB
-
MD5
834279d238d1cf34249f894c0b25cacf
-
SHA1
ff896b40f66024237daa591419d1119f24f69fa9
-
SHA256
fc2fc9b7bf811dcd5fdd6100b2b53935ed24b7b4fe73d0255832507f03320558
-
SHA512
bf34056e1a7fdb78a04905aa0e10f10011e4a99d54544d279f37a029844319284a6738c83d3dffd3203f32dd0fd3f6aa2415df63f9744f8fe010dac8d6521736
-
SSDEEP
3072:hWeOQDAcorhB9CyHxX7Be7iAvtLPbAwuBNKifXTJ/:TOSwz9VxLY7iAVLTBQJl/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428739640" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FE3FE3F1-5092-11EF-9BD3-424588269AE0} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2352 2420 iexplore.exe 30 PID 2420 wrote to memory of 2352 2420 iexplore.exe 30 PID 2420 wrote to memory of 2352 2420 iexplore.exe 30 PID 2420 wrote to memory of 2352 2420 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\834279d238d1cf34249f894c0b25cacf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c74462d070e272937c3da4f0e253f82e
SHA1d21c2dbb2269b0c95b175a54a9f120a27bd25c29
SHA256d2c8bdcea12085d738390e10c2b716b42bbc8fd2169747ce82e743460d428a80
SHA512e60be1512ba4c8164800b0a4a3d1f6921dca04917ee5032cae56e9b9d080fc4af1e2a62226ff5a91ad2b5e84d7ea04e5920a909e82581705e12f699ed9455a6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b67eb6f7221b143b00d4093a780fb48
SHA1db2682295d56a239dba359f284eccbd196268b96
SHA256f3b2aba77f935a800f50b2bd38dac99d5a6ca73b8310295c091a15b82fba4662
SHA512d00796731c59cd927bb7cdc5d978969efb63d9a0574b50a9a11aa30eacb7ba25715a2261de4be3077a47e90cf7acae0ea1152db484b7d3fbb0a02c1592236276
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f80ffcb769b3d5d4ebacd12a14398576
SHA1da3a5ee77004fd54db37b526fc34d660c55c3ef8
SHA256b9b86894ed2fb8ca9f2b272d5c5ea2a588cc290bc6ea22d52550031132f74b2a
SHA5122ebddfaa3d654cd24b168896a0a3822a6fa20a1d60ccc3c5e23e124b53b7db8c39e7cf386e236f64c27925beda2ce83b0ad13222a46734960ce062a47caad110
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6140ff53e5855217659459499762a73
SHA1357d5cb551f902082f9f485ec160b67e6e6cdc69
SHA25616518470aaa9af3d3fa46b36b4f83917e80a44eedba33fb5c84d2e3dbd3c2101
SHA5126be41f01b7ebe2b103ad87f771c472d9a101890163c28891481f4c209781507275a620b26311747f505354e6b30163e26a971aa5b4f40a8bc6118c4e8bfc5bf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b39dc580d330b2e5b43f398fbd02efd
SHA112073f3b52449709dda676aca20f3e480cc53f83
SHA256b52cf8a19546b5761b5ec29f53b8324d512c16c695a7066b4d754195bb273829
SHA5126e608f1b23f20cd19a181e22bc24f621f43d7acb37fff1dce28b89212c5fd7300a010d0ced195dcecabec23cfb06d053d54e3f1d489492056317f60b2118fb3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7c34397770ad9854b118eda2de9a9b2
SHA1c8d5601fab51eddae8831991a1728eb1040cdded
SHA2569dca1dde2c83313db90d504a85fbf8d4b2467f605a6d2e09ac89a7343c76eb28
SHA512ff099a0d18345051c702d624cbe27c057f665ba53d7aa3f4309ba2a96d33f173a3fba6674f1e302fbeee5e9604af899fea2116fe7414ffb38acc841fb0a1f4af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571a7308cf9cd7da229a911b64b9dba6d
SHA18513611d84050a49ab779b750bc1f3d2452136fa
SHA2566efbcd82109f617b5f1697e1a4fe1a3528d55c8359f0900826dea077fec92af0
SHA512cbd82d9008f4a7f2d025d22a1b12e5f6a6f375285949234e0136783149cdc0e6167dd4b0a11befd693732c856fbb6f36120f00c375bc3d9a742ce09d1b22a773
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561bce5222b7bbe3142101691d990955c
SHA13f20fb308879720b5bef8a7a99a7d4aca7f2308c
SHA256b735907eff514a1309a47b80c656af9f5cc7c6201c35f1d01d9fb243905b7f62
SHA512e185d7e641ff63c4c6837f232e8d9970f3ad84ea271742694881a60eb07f7168245d648c9f502ba98f9f44641ddbc000d9b639f31ef7885a70cee83cbf6d0db0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5008b3ae3297d2d6f26200bba8e386620
SHA11c0bdb0d9fe594b9462f8000b5855d88b3285105
SHA25627d8f81bbd757951b3c54a1472e07c9a276426efad846e810759b39d1354650b
SHA5124dba2075bb5835dc954b7d0e534fe2f07c90bba08d064c8e61c44ea88cf6f7cafc7f0d873150fecdff02645807d9b84d8f68cd753bde020945e533841bb484e8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b