Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11-08-2024 01:34
Static task
static1
Behavioral task
behavioral1
Sample
887afee2520e01bfdab5fa83e61beef1_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
887afee2520e01bfdab5fa83e61beef1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
887afee2520e01bfdab5fa83e61beef1_JaffaCakes118.html
-
Size
10KB
-
MD5
887afee2520e01bfdab5fa83e61beef1
-
SHA1
be3d2ad6cf5864f27edb3c85a2c310859337767a
-
SHA256
c9da97cdd2fa44afcaa12957e417e09124bb91f65c30cf58a2b88c414a2e8c02
-
SHA512
ab76ee460f266a7d81014c05f5866c41d69973e2a8f2ca34bc71f15c912290438c6dd92d0d3d598272c1e9f7f390487696eadb65078eaea85355e648be73edc8
-
SSDEEP
192:2VblIsr03cbco8k/w1wvqLkZcoBckcPncivcocOc1ci01e6uBuLbdU8d:sblIcuqZ/gu1BLmnbv/NWN0e6guLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DB4032B1-5781-11EF-A0A2-EA452A02DA21} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429501939" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1432 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1432 iexplore.exe 1432 iexplore.exe 1444 IEXPLORE.EXE 1444 IEXPLORE.EXE 1444 IEXPLORE.EXE 1444 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1432 wrote to memory of 1444 1432 iexplore.exe 30 PID 1432 wrote to memory of 1444 1432 iexplore.exe 30 PID 1432 wrote to memory of 1444 1432 iexplore.exe 30 PID 1432 wrote to memory of 1444 1432 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\887afee2520e01bfdab5fa83e61beef1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1432 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f8b366047b09d1fcecadef76437db7d
SHA15f6d308cd15d98f3c91d6cc87a3782bdbe8f0b59
SHA2566d247a822469354b4bd8fd3ad6ad9f228776a74b8901e4ae973f86bf88bd3200
SHA5128eb0e44af4da9b57e64dfd7c470995299ed7f562716a933707479f5b3f2262dc537eb35f01b3c9d0185f7175d3542a378a7903e0331f4b2f2a630f5677db0ba0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5775386ae109f09df7eddc066d4353b03
SHA1977fe637f21592fa5b57640f8ee6e0351b8da384
SHA2568aca63a62481f1efbfb9f87053588824017a7b6c668ad6efc3e1635c9fa64ccf
SHA512994e98de2cd028ffbd5f374e01c3214a98d0c6b6661e5f277ebdac910646ed3d63dd9d7ab3a9e95473785c0a3b72ad5fe6ba2ce5f3c0df9a576a98dbb5983ee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523df7bea5c8c5e51fb69c68ec9a23718
SHA1735372e87e85da9408c81bbd7e2603a5cb1c22bc
SHA2562ba37374ce80b7904af09877e39365f93637186cf734e3f83b2e2cf100c36560
SHA512aa6b534c47743b62b8bda50780a15176793e9c400d425854784265e2ea3dbb8eb5e231f6165066dcf1df396c2de236e66d1bf1753c6cffd57be246cbffd9fdde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5395f0f337624ce5a10b9bca2f0805528
SHA183415ec83691fd096ce91f8238376ab5bc899c62
SHA2569e0e363932ad7fb618250ae9e04f8df676806884354e0d8af76029c7f4f4bb3c
SHA512593d0a6f7e652e9370c4e3d42c95e1051344b5229c5fc5ed156db137e10054d2842550ad0bd03de5b62f4bdfe589a4af08a72338ab79c9106b6cd75ebb368cc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abc2db96046ae68984c9c8c61676fb1b
SHA178006e14a1fdeb19e42083ec44c77a65f6cd36d4
SHA256b6b93c997506ccd908db0875b6789d8af6fc89f1848db8ccabf9bf3054f3349d
SHA51281f08b114f96377e106460f59cf6babd0d237928c3f21ed636c260015df51f2f175d4760059298e7b9efde08290af1d50123ab1f44450f0d78e82e4d5711a0e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f4e7b35cec300cae5d8911d51a8a181
SHA178590c21cc6079abfc7d5edc4266c551736491fd
SHA2568e71b79e0f415f7bc01bf5881a4720ff2927517ef4c9ccef0561fb87220083ba
SHA5123667aa9e3ab8c93b5059909d78a94b63e342075324d89c52fa3cc25d666431d62f94e0bdf96210b3f07fe3c23c11700ff4a7f23974ec5bf34dae37f46e3e25d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540dd1b77d5437dda77448439537de321
SHA1196e501533e37b8bc98be21c93c6909cf6230739
SHA25657015c6c240f24804c9cdc1439fda8fc23a7c83583398aecb5b01b12dd68e8c2
SHA5121602b49746c6895ef92754d35c08f889ecfb1aedcc7b03b3de89afe9d471e04eecfa4546af43933b5f712617f4645ed3663cb01320ab286666d4866f8cc6c88a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56327757284e553f4312598e3639c0f33
SHA12e605303c7b46a6cbcdfd3008c37574b4786c471
SHA256b433315329570a457ec2b4f92ca1198594028838a2b274c33eea53f301733891
SHA512ecd2be1ba804c3688525e9bd2a57999acf3669316b9d62493849c9fc4af99c3c593f5d844973c84797528f8a5ce1895cbf77ad4a105000082f9d3272589c38bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7c06b0b4c26cfe1afb50406a1c7b93d
SHA1661ef91913f673dbaa3e0273bdcf8d3780b3ecb8
SHA2564188f61e350dcfedc9dbfa7ed75dc8168e8fc07c70554f6cbbe4b1927ef02907
SHA51277823c42bf9dccf3edfa3d523e3dc4bf7bfc0fb3abeb4585a00ffaf7fafbdd79760046031aff7661f2bead297e47c588a2808095eb92416a02afba55715c0fdd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b