Analysis
-
max time kernel
124s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 20:20
Static task
static1
Behavioral task
behavioral1
Sample
a3febb8307f19db6256aa91cc7e2f3cf_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a3febb8307f19db6256aa91cc7e2f3cf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a3febb8307f19db6256aa91cc7e2f3cf_JaffaCakes118.html
-
Size
53KB
-
MD5
a3febb8307f19db6256aa91cc7e2f3cf
-
SHA1
88c25482ad406ecd0dc601a315556e0a65b1a3f8
-
SHA256
c9a3b2fe35f588d4cec0a3a2e3957b8206a57dc90a4e1f16abdf3456f91f324f
-
SHA512
3c99564512779631c9e21c6f1261bd76ff1bd6370f1eaecf5f98852ece32c0c93ce8e788195f15760383c874213731b2522bcad82a7bef667bb29ad5f9c6a6cb
-
SSDEEP
1536:CkgUiIakTqGivi+PyUcrunlYy63Nj+q5VyvR0w2AzTICbbQof/t9M/dNwIUTDmDj:CkgUiIakTqGivi+PyUcrunlYy63Nj+qN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430087918" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{15F8B401-5CD6-11EF-93AA-46D787DB8171} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5026e2ece2f0da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000717aefdf6be9266ca302fa0ca14066660845aa92a8855db6f9a0e05a30a0d61b000000000e8000000002000020000000e8bf6114ba6fccd8dc2e0a673c6a4c13e3007052c3fb4d67dca4137eaa70d73220000000aaa1bf8a1efb66f6fbd14b67e253627c2e0fb27df0a02d189913813277b5ded3400000000f17968e84649799527bb3c47518eb4eb5f5a4867bdd43f01316030396c8a8db95b927c00d849acc66a1f85a6fdd700b5fdabdd82680d76061564f078422c17d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2064 2980 iexplore.exe 30 PID 2980 wrote to memory of 2064 2980 iexplore.exe 30 PID 2980 wrote to memory of 2064 2980 iexplore.exe 30 PID 2980 wrote to memory of 2064 2980 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a3febb8307f19db6256aa91cc7e2f3cf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df4059f17053e31a62b134c8c2376d7c
SHA11373191637a47be712b6f23711f925377725e64c
SHA256897d0096cb81613a86f73d8a42188a69725da4f6c9aa658d3eeaba2e0b4cdbc8
SHA5122337e87ef423e8cab328ef6ba7307332fc509700f018bf2b1e849165b6f5bbc59ec94090573a70e516903c8938f9ac892eeef3f2b46664fa0840f02da8ac320f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2463f8896e5dbd8b05122b4d683569b
SHA149b9f23a5b45f8065f438d3ad1adc6a8794d2533
SHA256130160e751f405b9bb7efee21e9e85a8386a2972da5217465a4e70e9ead8e574
SHA5122082d7b10d1bc89016ef3f21938e493de004cdd29ae8a9ac81005ef3bfce38332240450a0f0a2bd98d8304579c9179ad734e42ddc687ad1dbbe0d071e4146793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6cd6dc54c4bf904fff487fb726559c0
SHA10d038425449f66bda500f15e2040bdc620a3ecca
SHA2566f32dd964f5e6e95b99d43baa1acb62a6163961a2467cdf41770867e6f4b4ad5
SHA51254359c294ffa0b6a74b1c6cea983e6f85c687263b8d605c612c23e648f75b3a77395e2903cbb2f984813d0661eda79261e4ba58ba5702e0f216a7aa64bd4d0c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e72d515f888dfc79f959ac991e5b007a
SHA1fc59db56777df2c0376ca26002534f9d87d78c75
SHA25698bc20b61255da7c7c54d21c9c34f3552454ecf81fc071eaf2e6ab30ec4bc87a
SHA512bbb7f1d8a7333dec12ddc7cde9c245fcab934bb669dab0a09c8e435e284a8daa8989535d9a8abc72dbebb868c7d4132b0a738fb1a8cd22ca0615dea57e8c0de9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d793dfea8027625530c753e7327216c
SHA138bccb15f6d90ef2d6c01b021be494d3e3a96492
SHA2566874d38ae68dbff581a97a7693623e88cfdb5cb81546b64ba5d4676451a75a43
SHA512a3985832e984b155d418a968300e2e1aeb41a786a3065a34e4c81dc0294ffd1af3d22c0fd1f32144e3c627d50d12f6d09153bfcb2ff79084b8b619f97c373fc8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YUF3ZB4A\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b