Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 17:13
Static task
static1
Behavioral task
behavioral1
Sample
86f0a340040e1fe7c823b777b7f5823a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
86f0a340040e1fe7c823b777b7f5823a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
86f0a340040e1fe7c823b777b7f5823a_JaffaCakes118.html
-
Size
330KB
-
MD5
86f0a340040e1fe7c823b777b7f5823a
-
SHA1
a4a548dee8eba2bc603cc294671e4811c74c8c78
-
SHA256
454cac2cd87cfef50ab2bf028901b93918169245d9874514396da2e4e11ff819
-
SHA512
6883f98fcb52392f841adfa0cfc48967f3aee9e017e76cc09fc8940f07823f7d77a2cb3adb7609e5df5c0de04bbaabde3ea779a50cf456337a36033c7e203a0f
-
SSDEEP
6144:JZXHcfBrjZBGxkfNV88hANsQqkcNj+LcaNBfC417oToLmi01PziAT2NHW+uPZx5+:G2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DC518641-573B-11EF-9E0F-4E18907FF899} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10eab5b248ebda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000002be7a4ea78ecfbf318ff9f085f9057fca4781cd9d9faef879f3a30a5d5c662a3000000000e80000000020000200000002be27ca776415dda7ad77623a3596f92d5dd6b4a21960618ba204bf585b4a495900000005d32a2d03e09bb11e9c620e5ff12655a982f6c1d9948c75411930e501c27d33cc58a3b648b2e9d283d5bf87cf6cceb8c2d1c607865133ba755505c306b6651610346396ce8045ee5f55e7ceb0cbafcb4386bb5332598bbcd2ab891d89015804709032354e117559f0637853fe12fbc712a1f193ecb2e66f7c70b78e98b08e3d2ed6730205ed9f670f802164dad9abd424000000038b0b822aaa1e3e8c8e94b44ed209abfd0b6ad3ab57ea7d49fe9dfea4c59a7355c29f42f4648462198db65cec6bc3aac4cccf402ae3621d5d8b93b08c8b58385 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000612f0053b5e072b4d9c405c09bc9272c3b1ec82f217dfa78abb047092ba8abbc000000000e80000000020000200000000b98d547e6a8b8179f12655fcf619c2a1a743f20f1e214971898a10d2801c35720000000a10c66a376a12cca1a305361e8c1f331cce501d49f289ab5c189759d5b0f1e6e400000009cc3853f690af122f3c92ee535fd24e104594ca72caccacdee281d22246282532c45b0896b2cc993e6516d588c06adcd345b68daf34ef0fad26056a5b6583e65 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429471888" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1864 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1864 iexplore.exe 1864 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1864 wrote to memory of 2348 1864 iexplore.exe 30 PID 1864 wrote to memory of 2348 1864 iexplore.exe 30 PID 1864 wrote to memory of 2348 1864 iexplore.exe 30 PID 1864 wrote to memory of 2348 1864 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\86f0a340040e1fe7c823b777b7f5823a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1864 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575dfe0ed9bbcb9375258e3f1011b27dd
SHA1cfc46462e0ca413d93ae26864e3949ec45eff73b
SHA25673c4fd9e249a451505c5c3ce92b1832a4953d162b3784ed0121f60a85989831a
SHA512c81eb95add7723cc1396ba7f60524bd24acb75caa6c6f530e311b84ac928c0cbd71c8ab5ced79c92f7b962176cac81cfb3bea6cfc88f62fef76ac103c33d1a10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e98c169a958584cca1ffc54c7e22355
SHA167fcbcfe49010e556ff5ac95e6482bd474af2a5a
SHA2569d4079d17f8f572d30422fda17932a1e738d60345ec85ec6e501b4c2fdd098aa
SHA51217b4666799ab72f055767a25046f29ff3b56a581904023d9c52a6f57b43e0417c491135d07fb7e95c7b87c57aac28e86217350d998cf8f01df67a704ac4bc5e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de4a5fe14b5a9301b6256dbd14395906
SHA1d1acba13e1a65f2ab7bd58b12d0350243bb04368
SHA2561e0e292850c45209bb594833edf3648ce06c49529ee9ddac1c4940fc2ec0b11d
SHA512919af22a73c7f12e4efb1de020531061481d434e35fe71b240246e9e8887c493ecfd1e7d27f08a3fd3f2e2dfeb7c982aba7132babd54925204a6d87b9fae21c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e23ff156790064bf9b419e0bb69560b
SHA1401c907d9a90da220ab03e3392c660ceb1d7f34a
SHA256edf55d87885dd0e853782f52d7a49b4fe8b0582d4ebd416e9f15153befec2bd7
SHA5126265fd86dfce3be7b15a3894c067eb7256627a90e0cb1481a4e229533943cb0504889315bbb23107780f3d487f17d95711557a34f16596fcb4b8054c3599a4ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3081131430c28fe8974c3904102218f
SHA15adc738dea78cda99ec17befd25e81a0bb8cc251
SHA256337697c47a5b235728c0d746c5846e697b820b961efc45c43cdb5b58149b2d18
SHA5127e2929138493f01f6a8f84e6ef908ccfe234364d121017c562bff6f56f0e7b215ad3db0474dddeb2d2bf6c32c480f250d70b9aa09d744e82ee2c7544b9f3f1ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50809f17043b96ff4dfa3053caa5afe74
SHA12aa17189eac327e24d8e82b674a0cbaf4e3c518d
SHA2565cb104c9a6ab2ceeace5252ab9515ca38d1b0b358fddbd3d5455426ff724b343
SHA512c1f016f2d9a4e6c04ad1776cf62273b37db9dbe812b72b72f02cab869a5a9c087e9ec99c402eaf0e017be49f1fde39de349f8f2e013a42f4b82eff93009e336d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52591903ffc6e764ae43a13047712a73d
SHA17abc06d0aa04eec48649e3574beaedddb3a1d34b
SHA256f2f77aaa147509931092c1de8e55363d9acffd3e3b687293b570fcfc5732ffd5
SHA51269bac873036b3352807383adb762f49d29e2fbccd1e063b5dca02781cc1a27ec7796c3ced42582cd76838b5af01887edd2ae8a3fb857580a73775bbe0b99b7ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51291de2ddc6d82a72cb0105f197894f5
SHA19dab7b92a7d78d23fdd856d1bf95fee3e2bf8fc8
SHA2560710709a47752ad28671b63b88ad07e6675e4f1b9253bd70b5e823ef85d2b043
SHA512ad16b3ca6dbad74bd62c534dd54d62fdd26b3e94b88fe0d2083ba5f7c1f6177c8ad8049d3630fb374ea6f0ee7d98a99bdfba69ad35f82c5763ef5925cc4c4b97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0de459c17c27ad18ab133640cba6ab1
SHA12dc208ec1115173753cdda4a31c561022277543a
SHA2568c5a7c93cb74b3e1047cb7232be88f6698231936d704ffe1558c8fa9f3949e52
SHA51240c3164890275fff3e5b5ec1d703c4b16c35aa2a3997260cea7ac6e6a054423fb428f2deb92312c92944739e92a996063e1adbe9f4a96fb4dbc76d6291fcf8e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b53b1c8aaeaf1f556af5ca0cf0ccaaaa
SHA1f3c8dc215dc0249c313dd71580be81e77b41ad55
SHA2561c63e3bea2033b61a39bed842ea0e4df0deb13f4c6cf48114631d6cbe103405a
SHA512fa7bea29d52ea86cf0a13afc6b703c612a8f22e6f8b7d248c114a655aca2e0058e978d79a3781ea23718d1498ea27a5406cd2609f57516d13677324a84e2c089
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b