Analysis
-
max time kernel
122s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 01:12
Static task
static1
Behavioral task
behavioral1
Sample
8cbb5873d96df55589b2a99caa744a08_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8cbb5873d96df55589b2a99caa744a08_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8cbb5873d96df55589b2a99caa744a08_JaffaCakes118.html
-
Size
10KB
-
MD5
8cbb5873d96df55589b2a99caa744a08
-
SHA1
ee0bf2b7597f9747e816110b77a13c6003140914
-
SHA256
2e3864f7139455498a8d4ff7f9ac5b45e4e5b3dbe02c3d95d0c4e6384e2be3b8
-
SHA512
5c41f8f79634dee4158a296b60699179626d4dc0eaa1fd1b6b300d9359336a22c5318676245e542f844b1a89cf8664a7e004f8aef1755596464d747d95805309
-
SSDEEP
192:2VYlIsr03Ja8k/w1whqJk1GBelnsvGsf401y5uBuLbdU8d:sYlIcuJC/g6GBelnsvGsf40y5guLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429587048" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{04CA2931-5848-11EF-8BC1-6AE4CEDF004B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2352 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2352 iexplore.exe 2352 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2712 2352 iexplore.exe 30 PID 2352 wrote to memory of 2712 2352 iexplore.exe 30 PID 2352 wrote to memory of 2712 2352 iexplore.exe 30 PID 2352 wrote to memory of 2712 2352 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8cbb5873d96df55589b2a99caa744a08_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bbae77131062040151f7d9eb63a5844
SHA14ed5344e0a2d1acc0f1ddf364b655d27b152a010
SHA256971e8479965d4cd20a6ef1cda443b15c096332655a79d4cd9197d5814bcb61f2
SHA51272089654d4b25fba271a83ceb385c5299927eab6b59c4aa9bea5f5a7f8320acf9fb71b6a5fcc5c08b291582731e5a22044d5620da08787a8ae433f0cc611d72f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0c4838c0fc27340ba94b5a6292ffef8
SHA1bbb164da72e72c2e038aa5dc7d39c4882cfd93a1
SHA25601040d6460a8a6648f22b32869680b613a048178ee2449b70800c1107e395b5f
SHA512c59d7a33f28db7d57f131c8a5d069c1d98539eef08ddd4a45e357cd13c9fd240f3a6ad5a743f8ad0e62263ea330774595124f074b4729b927d6530f2c951ca27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594763fd516162ef6bb13a414f5201d52
SHA1e8eb2b21d65a28eff33ad6d03db28169d44c2881
SHA256a0ba939ce7a0f0c5cd87440c70b3210c0d0777397c2cf0302f9e201eaf66b207
SHA5124abc7fc5151942586c1962375902af541c75dccbe9ffbac5b6d007879d1f6b159a835f94430ac813669ef680483fbd79052a8a2975dabbf9b347fba41716a2c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a501e4530c0751239b49d0e586483e5
SHA1832cc98f3e294d6c3421d34c90de8fb8b8c04142
SHA2568e26e15d9266c2297fff947f7ee61d8fa9249db1b4d3fa1a503e92cd9828d451
SHA51225cb870232677f0d93216879db46eb49cbab001c25c4e181760835c87b20b92e2165697d735ee36fc551b4ab33c066e7efaa3526c388ecc035e87b671cd137a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c73b888da9632aeda9aacb501d438cef
SHA1cecddb8716258548ba1b7a2de5690b89b851b124
SHA256022d41f678a35ef9cf5580742708c97583554951282f7c683432f8dd0676bdee
SHA512129b8ab2f9f9d00b18893c97aeaf9c81398ecf8557dde271adbf5c4432fb95ac22743784cb6a304f01dffdcd2e44361d8745502ad54abe23d918622336925c2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d4dc235c0340508e6ed1e91dd5b67d1
SHA180abc5b584a4d6727882303486eedc47e8e80cdd
SHA256deab8fc252b7288c06639919c34c58bf200018ef280753b3be57189f07e71d03
SHA5128e5cca149a82c134b230352ccf3a1729d19209bae3748eb5966639144b1fc435e64efcca4a3ff2aa9ec2883048ac361c63ef81f3a29d38e0059f576bd82d9471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dbc9fb3f0025392cfa41fa39c2706b3
SHA1626b0f33b862525df556e64bc69f14ea7012bd9e
SHA256683bba13874b2a81e903be6acc3f3fbbad0dfd5ec5185b99b95de5e5e11480af
SHA512e78e39255dd6a50bad228b9dc1bc8fc01a406a04ef1e26ff6f1a26e0abedf9daaccfd4c48ae5400bfbcee5bc4ab03a79b0b79223170348d03de054f2bd974025
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3a66ea9a48e547d582c9fc2a48dc728
SHA1eb3eeb233146ecb0686f4e45130b34e35d2b7fcd
SHA2567ad41ecf528343ec3d22aa505109e347e00a1e348520e6e09463ec0c6e70f83b
SHA512702d240a7d9d85baff7c14407010a4fb9d4705d0ac162395791a00f591cec6ebd50c04ded82f3b22e1aa1f3e74cd96cab5bf50400b7f8502eee41344c531789f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea22f1ad10ea75ed0bed05db333e465e
SHA1fe6eab5be22564cd2d1729a9e27f06d0a4419640
SHA256e81e95399912270d525e0a2e3febc77d0c6a03f1fe670f5a48550d4120140442
SHA512e274a0ed7588e64ba149b2b8afb33981dda1223e2edac68e3681ee57fc464c83af9ba3cf3727745a4b8e2a680a96fd42a407dbc780bb2855426301f3f66f3f84
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b