Analysis
-
max time kernel
118s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 13:25
Static task
static1
Behavioral task
behavioral1
Sample
863966b4e257da536546af68be67c5ee_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
863966b4e257da536546af68be67c5ee_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
863966b4e257da536546af68be67c5ee_JaffaCakes118.html
-
Size
10KB
-
MD5
863966b4e257da536546af68be67c5ee
-
SHA1
3db978438b433c60c9bf370a264ea1b9bcd91ceb
-
SHA256
1b0e439e526ae4b2d52804011d4bccf66905816770639d12828260deffb8b449
-
SHA512
10193a27c6512e302b557a279633ac310f5e464fab125dd489f657cab6ddfc74e4fdce1a29d280af504bb5dd6fa19c1406a4e51244ebb3d56684f2067a782582
-
SSDEEP
192:csz7VtAYS/BqBJ0IaRX9/cZ1JxV0PHb76f:cKtAY8BqScoHS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 601d7cd928ebda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429458200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{00A152C1-571C-11EF-A248-D2C9064578DD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000318ac86da24a76e839e029dbbb979ca28dae90de572e417a75ba489dabf88055000000000e800000000200002000000016e6fdeb37a54d455ba14c2724007d32f58395f071ee67effd6ad7e9aa97b9da20000000d26b3e8968e8d414d8d9c4433ffab489dd9380749479dd28ff868068b5636d05400000009b8e3ece0b4bec724c24378d6c7803e164bb060d50b58edbb546d2c8a56ad5e1f977f76d44605a91cedc85949c83b131fdbbaf6e4d2d4cac0b6d21dafb52699f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb780000000002000000000010660000000100002000000033ff8a84bf445b28de7951eb87b8358c98b6489502eda4fb5f75e615c67284d5000000000e8000000002000020000000c31138e5d766a2ab94eb2d78828f1924a6f7091bd1c3895e48beedb340b37509900000006e822236e704acd7e130e1ef1eb5a98e39ed518601d16bb92f0820d23f45b9804070920b80f5e79fc0e40b37385be51bb5d734e7220e919bb0d4f99dd8bdba3849e88945c1ff6fa58649553c4eeebd5042d8eba2886c239faf09a2cba5854959a3db11d988683ad96be17246a21356451e80b8da68751b040ac436dbe48338275d948205cf2bf7acf0f8520effa7ac344000000088289e95720cee3dedede6a168d247c49ccb0bf579549b47718d2dbe4f0db1ef261ce316205c35720392acba0e7c8a4d7e21dead9fabfcef19e4c7d7f821bccd iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2488 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2488 iexplore.exe 2488 iexplore.exe 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE 2096 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2096 2488 iexplore.exe 31 PID 2488 wrote to memory of 2096 2488 iexplore.exe 31 PID 2488 wrote to memory of 2096 2488 iexplore.exe 31 PID 2488 wrote to memory of 2096 2488 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\863966b4e257da536546af68be67c5ee_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52deebc0e41144e28b876f1e130dd9301
SHA1299a3a00b0a790c069bbb3579b458e7e68ee05ce
SHA256ad91b5e8f03505227a189754690721adf5b75d408c42d8bd70ad7ffb972ec7c6
SHA512b40e90743c2078f8ac5cf1cadfdbc4f5092b5daa7687b699c8fe4a1c7946ac5150ed7370177eac5767723e22817d41f60b317a4fd361bdf326c73730bd930776
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bce82b4a2b9ffae6b11bba28be3e774
SHA1535dce19fa28e73c8f94ad7d42b94260ba32cf20
SHA2560339e007fd020347d0bc49db575f68c908666ca4122aa8728a6ea4bb3722c361
SHA512139f30c395ff07530bf5f4cad41f323f4a6145d184f73c479c87bf2f580fc22e427e2efc07b7c6f827d988d80cbf5955abbaa4727c557ea2a2d6863fd25a0b7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e58f483e0fda7b18931ad824beff43f
SHA119c514423a14a61cb2e8bdb373574ff3a4e7417f
SHA256552a349d8e6ddf8cf8fcdfcf3156e15908fa8f6cb70fcae82c1fe893fe1dc354
SHA51257f3d748429b3ecb9d407004d2a855b9b17b3d309dda0acbeef563b3e5b918f7984c4cdba671f8314d51a0ee9514b2885dd4b070aaa0861825017c17c4261a7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550777db33a2fb5d42f93e5d213c10ffc
SHA197ad52cae04cfc07a94ff623b41b80262b6db547
SHA2564999944d3c3708776903f0e1a2854ab8d77e4c44f98e3df433c63d8b051f0e94
SHA512d9dd6a6e2ceb997659d0ef389b437dfeeaf9b220e1d330d786ff5617631c60c4eb9cdf710ddfec835bc0d72190a0217991969865bf503a5473803bb66cae3916
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7cd7d7807415b03e5f0c3b35e05588c
SHA1dd0f1b8aebace6b9c700294e713c626068a1e9d4
SHA25601102589163a674fb1d0bee8b9e9d09b564028de1c7bd4d903720575600e79eb
SHA512338eb66d7d7d88e5ff19ae7e8d5a08e7fb66317174a9f84a2f98d799ef44240a8cee3292359730413a7a91f6a6aa26889bf2479089d433f2757555664d4f4d29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51764db1ef5e7974eeaa94ba71955af76
SHA102267aa0c028fb9f469cbeb3a45c71177c7626a6
SHA256606623727c8aeefd90b310eb0533892f826b5010b84df4936dc78127aaa798d7
SHA51292237cd434f4b7ee3f0b24e9e33243b4e9582326fd60f466074e7ca9de2ae5f74599c5fa3f6d446b09ac3126ccb1fe22da6c15917ddef5f9a5ccc4590936e6c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564ae8cc429c025bd1579163c4db0adce
SHA1907eb61731f05ef9ce69f6464d2d0b1f102dab24
SHA256d5fc0f0fc09ef3998fc8ca61a869e17979e9e14158369c246601e4bd9db7e1b9
SHA5128a5a639bdc2e0089c9b728840bcd8881b97ef4be8e57381d69ecea3cc4b8f8f24d1cf3cc92b93c339a2861df9fbaf131c942795e771b8567f076bf2b7764631c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f51fdc81a3cf395ddc1bbef7c48b8db
SHA1749c8c2fa187eea38dc75c84354e355556397fdb
SHA25631eccb077e432c3d36477c073922d2b670f8f409d4c094915731780ea9294d5a
SHA512a8b9051050c13f1224368905e4a179911772d0e1fafa8a00dc0e9fd4b9ab00454ce8ce731cfa136a8939c50c68b81d185640f2f7c617a63ac01c4382dfd103eb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b