Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09-08-2024 21:11
Static task
static1
Behavioral task
behavioral1
Sample
83920aa230746e458d23b7bd9b68cbb1_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
83920aa230746e458d23b7bd9b68cbb1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
83920aa230746e458d23b7bd9b68cbb1_JaffaCakes118.html
-
Size
84KB
-
MD5
83920aa230746e458d23b7bd9b68cbb1
-
SHA1
b8360ebb9f42c9ffd859ac90189b618dcab52389
-
SHA256
dae688a05ff545a2d63f98b5ed4889c4510c366b8bd07c25e8a0ccf2b90d8dfa
-
SHA512
0a18b8bd56961ddfced043ee5236762c1860d1c44b23f1cd74caccd9bd9031e2f9eae5b5fc85e2c806c25ec62e19cb009f4a284269fdda6afcb2cf01882f83ea
-
SSDEEP
768:EzcGhC+l0UtSipHqF2gcRwJMJ6U2EyhzOMsXnHyGE4l:/+WYKF2gcRwJMJOhzOMsC4l
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1029e4bba0eada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf71000000000200000000001066000000010000200000004f4b12552650902ce9584a8a73b4af0db9df19a50d3111efad8cce7c611b8dad000000000e80000000020000200000009c47f114762d4846637467afa54a4cd1b7cd40eb9b28541d94531f2bfb384eee200000001f50b85cfa6ec2aa8bf7bfdf83823e502327a8908a89ce55d16437e0905386ea400000007e92d4ae5f750d086fc73287cf06d1cf7569e3099b515407f7e211e4bb5d87d47248ba738953e72aa818e34ee2bc3c10879898c1a5fcff6125f0792047920997 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429399742" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E7543721-5693-11EF-8ED3-72D3501DAA0F} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 iexplore.exe 2180 iexplore.exe 1152 IEXPLORE.EXE 1152 IEXPLORE.EXE 1152 IEXPLORE.EXE 1152 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 1152 2180 iexplore.exe 31 PID 2180 wrote to memory of 1152 2180 iexplore.exe 31 PID 2180 wrote to memory of 1152 2180 iexplore.exe 31 PID 2180 wrote to memory of 1152 2180 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\83920aa230746e458d23b7bd9b68cbb1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fac7ccbbcff45931826b0f91261eb5b
SHA1ad5c94b3eac106316a5c9ab9555f5a7a3b71743e
SHA25614b05015e4701e3ac0c844db1fae78ef25cbe304435e9b305caeb38484fd84f7
SHA512a46c1e901da657553050e2b050d1d5776b28a182687c05ab757d0846201af7d021131d93d4f083aebac3d9e59aef32e2fb6a08871817092e031da378a37e4df6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559f86841f9dd1d7b9c8a6f6588798fbd
SHA18950b098c1123a9532d3c68fef697a54b83a0664
SHA256419b00c8d23bf6f2013385de3be2a024e6944af33de246f2e3d93519a0037df1
SHA51213f0629a9072b0f82e1f8b0e357a9a27ffe67a1790ef93dc61d780746324311334393a96380b9366a3b50a437a11afbcedc5d466a38b9777673d9c0c4ab57c24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a95bd38191d276016496678a1b8ec105
SHA1f72d8dac42ba5e950d23e6c6746aedc9f092dcd0
SHA2562c966265d51a6541fcc9d0ce3fedb8f7e54b66539126edb2395943eeb17d5ea7
SHA5122f96b8ed1950d2a0fb938199c717eadc68dd2e5f8128e9819fbb2de1965a8644455ab6c27b6eaec433c18adbcc36384debda8abd0b25b3ecaff7465538916cd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa5145cbe2101f0044319f0cb43386d1
SHA10000c590507ec76627562d4e68c171ef078b46cf
SHA2561e1cadcbddbb9c63122bf9288de02f02a3544bab9e05dfae26e25dafd33af968
SHA5127bc370d7ef4fc237cf71636cb9ef5bf6851f72de79e5e332b7215c03bfa3cccabd25a32f1077ac472c4949bc9707ca39085f61a0e721a2de6c5f49c3079ac08d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e48de3feed9154f7b1eb17a4db74506b
SHA1801cea32b3995e5a9f87718d1f386e9ceac4728b
SHA25609395f8cc8ddc08ab36f7d7c4add809d516d9983a628225c14259c692e1bbc76
SHA51217ae16a3ae3ec348a19c36703ecbaac1160ff279b6243197884e666d04b622b1005290d74572d5cc50974a92aa626efb3d19366cf6c73406d547fe0de5d3aa27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a595185d2bc7c8178013ab2d5c5c556
SHA1e2d7eac78bd80ffd8f64c9a12fd73960ff04c24d
SHA25623fdc080f3982b2016e4a8004fd43d60836503bd65fe9b699c012bc4cf5f8928
SHA51255c347872672e830edbf44ec83036b3b81b64230cd0703ccc703614f67cbd455d7b4fc8a19f6b08b9a52d942f8a00415b487d74b1dc3e11b8f7e93d01e1f4499
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b