Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 13:02
Static task
static1
Behavioral task
behavioral1
Sample
8a74b980360bd12c28bc34afed17f7d4_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8a74b980360bd12c28bc34afed17f7d4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8a74b980360bd12c28bc34afed17f7d4_JaffaCakes118.html
-
Size
19KB
-
MD5
8a74b980360bd12c28bc34afed17f7d4
-
SHA1
f701f5dd83fa66d380584e359aa80c1a334b6e91
-
SHA256
35c3bdee651774658b905a3aea9984e9c8ab10a0574a19d3754f7eff8bff7865
-
SHA512
360657649ac74971b14ee2264ae4c6cbd7044b35f9099fec0562ec4de5d9971b17ae2589f047f45edfe37e0d1b328cc6e3c840db109966f3fefb9faed4adc0d6
-
SSDEEP
384:zijZKhgES2BVBD8cOQ3RerD+UTemLxXucfIk99heVOzVc9H3+:zij6S2BgcB3Y+pmQOIk9SVgqH3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000202bb9878516231dd08141263483617d56d2d303a0d6055865553d11b9e57875000000000e80000000020000200000003b38bb1dfbe0c01b41c9f4bacec47c9ed03889dedee2e59a5e89e4bd60190a89200000007e950ff47c31d00807ae89561e0c5e5471712d001e87d0788cb91ef853c8b30340000000df8adea4d76506b6ea416ad280df25772ab4b639828f595c1a151e788cb857d52e8fea5c515253d8e6336af1f1f8fe3cd0023ce706a182c9fb0f98da9e2dab3c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c03ae98befebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429543539" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B5A17EE1-57E2-11EF-BF89-E649859EC46C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2376 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2376 iexplore.exe 2376 iexplore.exe 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2528 2376 iexplore.exe 30 PID 2376 wrote to memory of 2528 2376 iexplore.exe 30 PID 2376 wrote to memory of 2528 2376 iexplore.exe 30 PID 2376 wrote to memory of 2528 2376 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8a74b980360bd12c28bc34afed17f7d4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2376 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ec4466227bcc1d4107c8ac076033556e
SHA16172543a7f62d30bd9c5e37c8a1cdd99796c83ca
SHA25613eae2ac80282f54d484ab5320e9dde39987fdf310f94aaa762ae88b40c23e12
SHA51200990ecb1781d4e30e409e136313b4977989fce570c4797bdbaa27feced506d7b3d5e8744dc641f24155b8f3bc6deb84c7f9b6e125826eb3e4cff2cd38ff86d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5166be004b0a7ba33046ef4631d65a8ba
SHA105e785950d14989496a9e4cc3e94b1e3b2d91891
SHA256cdc02f1f8aef6dc0aaf6344dceaa05ec5a79c00945c3e3cc57190beb94c2759d
SHA5124ba07415266689dcf3de28b405a7f171ffdfb8fcb2155abd3bc54bbb336d8f894c9b458ed87060e07b2eca5a4b56028c9b806b03a6e18ec9ad3be1177c86abb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c1e2bcc511de7d89b1810a47a9f3de2d
SHA1f07e4f03aad0b6861ed82e98b8e033610ba64a9b
SHA2566bdca56f2ac389fb7a5400285a4ab4ca3b7fe10ecaa843347d5f71fe4b733c25
SHA51208ab72d8229e671be4da376a1053692f8e2e401f4749c62e8f9c06cecaa21b76507de4e959139c6886b4a965b29c4470bb1533812dc3ec6cffe93cd8422993d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a021b134e2a8ad1f2bab7e4a7e0dff94
SHA1d9273394a9a4ab20a9dc81d77cc4083cc2e86c28
SHA256e095658232dfc49a8fa60b979a4d910c0676bb4bde131568ee07108e232a6eb4
SHA51203a03cb0ae37ddde3098d87eda652b8fde61ade42b435f51b550369260a2822f007eb48c5e660765b97ff884b0426963e6899bc333e3e8619f7352f6e6986050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD519821e7ae6e22605202588e1f7fb2248
SHA1455fc2c4e82ca088653dd53697ad53556e4d0c84
SHA2563a8e602f52fec21a17f336ab2ef7416d7eb1dd37692c2b9f5b0ef340ff73242c
SHA5129749e05d49c850623ae38006f81df514199f33c08da6f5be7e99d79a67f45a71def4577eb72a553815a793967f2a0ce202c642e2bfb74c89172be7a83b25f5d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59a0b5898e3e2ac0ca146c92b5a7d2149
SHA13eaf0cd4ffe1b2880a43ff49b9f40cce04367d19
SHA256301aa66144bff32fb2a455d5c4606585ff6e4249f6538edc2013884441c5d2ef
SHA512d7b9012adc0db02e383dcda3f7adbad26c876bdf914863c5ace90c29bdeeb2e195f4ef88de8ef7b8b0af405d57404ed70f3f4cff2f4df27b464a36a1bc31e079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d6b817f9548064135233e8357891e220
SHA1279f38e0e6f05bf4842bab0704f5e59cadb17bf8
SHA256115b2b5ee1083c562afe98e6baae2f5b1350dd4a6f049bf10d20106c9e170f04
SHA5121248d4ab28f25da13c9adbadbdc11c7d8961f65526dbc933f6f763084f348f4f1664559fb586f13ee00a19514cca590ad1b39f76761ec5bb78a22bd15bfa0baa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59f6756205cc4fdd51bd9fc5e1dbb01f2
SHA19187e7f1d0f818aabbfd521965697513e5acb4ef
SHA2568c611c0fa35cd186758dfea4779f01c9a5193fc3a7e0c0ccd193ddb8aa3462f8
SHA5123b8bb8d5519d09dfd0110d0a980898925d86b67a1a56d5afbfa63ec19af84104746ecd14a957646b3209931817791e66451d344d1efab2fa2d9701fbe5fbe7f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD511422d317577fcf3a48b4737feac3c00
SHA12a20fdefab60884dee66d80620bb729a58747098
SHA25629c13bbbca77274ec883984d0b6d80bbb7f8eb326eaa25994ed4e468565bc0fa
SHA512752e808c0729d52cc05fc726741bd260973da8971e65f8073ef4baeceacd6971878740b002a3dfa2385250e4a98f484e00eb0876bdb9797ebbcce31faad793c2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b