Analysis
-
max time kernel
132s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11-08-2024 00:26
Static task
static1
Behavioral task
behavioral1
Sample
88477840a9ba1cc9a4719422f946f7c9_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
88477840a9ba1cc9a4719422f946f7c9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
88477840a9ba1cc9a4719422f946f7c9_JaffaCakes118.html
-
Size
41KB
-
MD5
88477840a9ba1cc9a4719422f946f7c9
-
SHA1
618c7909de164242a146a6c658fc8f853ee1d9a2
-
SHA256
5f9ac99eb02b7f70d72fae04b6f4e72e85ae5e85ed7c437dc9d473ea87990e87
-
SHA512
c850bc8472a40bccf781b343ca841bfb2ac432577311db37deff5098d39ab71003ebcba373ad94c72e2d8c827a51d833a6821f56a14a3794e668f4a235dc1ee3
-
SSDEEP
192:uWv37b5n/05nQjxn5Q/TnQieiNnsxnQOkEnthBnQTbnBnQ4XCzAjEoZQhNqoJyf1:PQ/aAIYQL4lg/m84qk60VkvepV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4BE76291-5778-11EF-BC1B-C6FE053A976A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429497833" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2156 iexplore.exe 2156 iexplore.exe 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE 2004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2004 2156 iexplore.exe 30 PID 2156 wrote to memory of 2004 2156 iexplore.exe 30 PID 2156 wrote to memory of 2004 2156 iexplore.exe 30 PID 2156 wrote to memory of 2004 2156 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\88477840a9ba1cc9a4719422f946f7c9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2156 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5657388c0de2d0d9f58ebf81ac05bbe34
SHA1bfb65fef305592afe49523ce44512d3366cce2de
SHA2562d8b7681817ef3d1f9af9c3e21c82362535510520d9a5ffd753ede74eafadc52
SHA5125a0eed1b3216bd453db35c85c903be25b627f575bff2c84493cdda216daf638f7af68043d2924859fe446f8e1571950354c9c5e84db62cf2cf41c283579fe840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ee061d37a3811241dcfbbefd3f9d1ca
SHA13806389621a79b2458292a52bb27b6e9405a22b1
SHA256727d1e8c800babc45fd9ab4b6e74ab43ea2f652b9343b8c1e5989bf55710ef33
SHA512dfa57e05c63508be168031452280f2c4a305c13d729b339c11211465a64b27ef9ca40e54025fb4d8d371a81ced25031a582b1a96246e77cace32ae566a3c0e9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548c23b3061b398f016319cd7659d6897
SHA19562026770805fc1e55a5c15f3ae3d09dcf59884
SHA2563437fed1ac403f94457ccdd445439595f5b9755221ec8672d09cce6949d2a195
SHA51258edb8e0bc136586e9c4aeee8d245e5bb4290272b8ea1efd178dc106165214bbaecbc9af1a3403e576c7b2d9804d4f8bc6776d986a8e55ebf370c50419405948
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53865573e0c6d5044905bbcc272a89be6
SHA1c64fe6b0dddc9234dfcd7bb55ed9d4028d7e9409
SHA256342f65e45856ec68d5db09570d0ab5466e497090c5690f9a00eb1f3117052809
SHA5128ec011661c5e7150d10932d0b7e77890fb6820f3ebde81c0433e4a6f140d5d907c11135a83327235dfc3816fda3fc44b97c276a1f248cab1fd15e97b1dd4b6b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eceed867f5aceb5234f66507c83f9ce6
SHA102ca52b86097f374ca094153e5143bf655e919dd
SHA256f38f2c9a4ec30c66fd86351fb89ead98d7294b1a3ff9349dceb626e5ba467e87
SHA5123024a67460764be3e3c2385277b549bc048acb7698ebc81df62cd9a851b8f05d70063bd908fc4492aa8187ad87af5104950918c9bd1771bc8e96fc6bc336e56f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f60b51adcf15bf5234c666cd80200f2
SHA1586c4f9ae415f17d4c33650976fd06288c607516
SHA2564ee3cc1f2fc3d51503c22064ea5ea0c8104708926abd0b825c79628ac3f6cf87
SHA5126b7bf991a5c969644d974e4bc9b75e3609e448f6d013f1c055fed5b19745921339c9ca0ebec4acfc904f12c3d9014ef629d188d8e260111eeaf1e8cc887cb3b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bea6f2b55a0807751347e15dd66ba5ab
SHA1bda9400d00a382d6fcca6908561c66ad40041d22
SHA256406906b76f66d01510ae959419921fcf15c72ad81aca153f2cf482dee7194c59
SHA5122139775315ec96c63a244e518f6ebf52be81b42f369d44e966361307a4a9ae46887c070159f16b06c82fdb951061ecaf0e546756d9f27fc1c2b6eb1648b860f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ca3eb14147f9abc5395ae16128b04d7
SHA1a16c46eaf1937a840b64368ae047fbee72d64e82
SHA256ab83599f71f6045b1fa6b1100d5af75da707bac29c037306a16b0bdc38bbf436
SHA51244440e36aaf772000d5353daac1a4145f20b25ac070f49993f6fff328dea00dcbe6663b625636dd0f28fc329cdcb7ec544e35a17ffa9dc4b06074265b36578d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5245082405e3e493abd7b02fbbcc4cbba
SHA123820137e478cab96b78e55e83a6ebea05843144
SHA256bddb14c25bbdea981d9ddc4ecf55e570a2694c708e4f84885d370efca9be48a9
SHA512208e91c7f88b2322db39018cd6a4b7a4bb8c44ab4860c344407eb200810b2203cfcff2fba725fdbdae67d6fd4ae976e8fb4b15ba9d168f343d806d5069b58128
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b