Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 00:16
Static task
static1
Behavioral task
behavioral1
Sample
a4a7df1200789ee8b3cbc5a12524f2c4_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a4a7df1200789ee8b3cbc5a12524f2c4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a4a7df1200789ee8b3cbc5a12524f2c4_JaffaCakes118.html
-
Size
162KB
-
MD5
a4a7df1200789ee8b3cbc5a12524f2c4
-
SHA1
e67be062d8bd08d9185bf69a6a78beeb95325a4f
-
SHA256
a492ae2687c901e903a7f7edc586b5b1fd7e6de53f624154d479983e42f4310d
-
SHA512
3a7ed42212c91d6ad18a0497bf37ae6aea19fffc1a1b879c78cbdec23ed3b0af218ffbebbd8cb00202a2644c66b3e8d3467949d9117d6f9b801d79e4f99a3c46
-
SSDEEP
3072:rF0o53qGudbnckaYJN4McZf+rf9OFYaiqat6FNajUSXOFEgAUHUopiLFHXPMhPHP:N53qGus5JJZYAYf8
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 20 sites.google.com 22 sites.google.com 23 sites.google.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{16F05F41-5CF7-11EF-90E9-F64010A3169C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d075defa03f1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430102045" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000c58870d25f9ecd41b67ac52c7002ae9452f5e88460364a57353f8a3daee8eba8000000000e80000000020000200000003de2da165690c08eac08062a6a88a656fe50c94928761818eeac428e901fe52b200000000b5ebdbfbd7d03530566d84e35b22cff87cad000e720bb5f776424adfe24f19540000000f27a412ff5c2b422533394a0c0f3f090b43e50f4467e087c974c3268acc7c9208ec661efa31a0cc250df0aac70d2691124f0287ef8c6c2c6da6239f9147664f4 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1408 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1984 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1984 iexplore.exe 1984 iexplore.exe 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1984 wrote to memory of 1408 1984 iexplore.exe 31 PID 1984 wrote to memory of 1408 1984 iexplore.exe 31 PID 1984 wrote to memory of 1408 1984 iexplore.exe 31 PID 1984 wrote to memory of 1408 1984 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a4a7df1200789ee8b3cbc5a12524f2c4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1984 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5ef2490129cc4a928f6233644670385d4
SHA16a0533b169676216fce910fc79e5598ebb22ccb0
SHA2566453e3eaa6a76e4f276004eb568660fe0a2c3a5c5e3722b5c0f5e73de2b6a894
SHA512fd7992e128f985ecae3d3212b4a27d763d5bbe878cbc94c6dea4d887f8912dfa00f9e820e76b31e23ec181299eaff9ff613645328de3a0b1d6482395ba7508f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502f461972590fab1f7c24fe890a32d2c
SHA123ca8df87520cf8a1f68010bf44e76ec3e002efb
SHA25625aef3ac8f1f96f683a892ecf64c2068c67557dd175b78b0553b39f974cf8b40
SHA512513448c5da934db5bf343bea5b04896dcc27acff1e5337d55f827c181411f6c8122b78f34f918cea4dc607a51a617df557a97b45f3f203dde4cacd86a6d17b69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52112287857ea0aaa76302fe72850dc9b
SHA10be0357616c08a7f6f3a8e9e61c4a069af1f689a
SHA2563f12c93436952125da8330a3214a529459b29f6458960787ea04412f71f02bb9
SHA512ced9f71438cce59cfdc48bdadbbda7a23a5f40178e2980b388f066f4c7641d0dfe27cb193b3c2459b112ea35b291576da6630e02ebcdacbf4fbb94a75de63ad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aecf5eab191247c58989366d01226482
SHA166fe3ec75fed4bcbe969ce21c681dc631d5a1e3e
SHA256dd98065a68cd93a9e9376795c3d19f2bf96cdb2e8dcd4e92c4bd274704969c6a
SHA51275c2a3934223fd4372fad1353ba8f886a03221091d6e9a107c412373d9fe9c4dbcfdd4ac01b54ba2640584616672379243cc6108fe741c6291d40d5ce0809084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1b9c80d529da4d4945882868591c2cc
SHA1b4c57a5d3bd709ffaf47698c7bec9205f9743c8c
SHA2565c674a564440e43d2972a151dca7705c05658a817ad459f89d735049f8475339
SHA5125f735d3ccb132a6fdff102ba5f8dd22b492e9c7391130bab182a90135dbc38d806f288b0351dacd4f32a0d482bc3a629dea380ef32412047ee8c3538d5a9b4a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544e94bf65d6e19bba939b812868666e9
SHA1ea024d29c0a4c32f476ad07c74ba804fabfae37f
SHA25697e8d5b09c9d6fe01d7ae33e9f06a973988712b089d6c528f22aa98f27bb7beb
SHA51230f031d9898be08e7973849a6c22c8400df87c8e8a6019af195df5363157082e2b5df3f20b0b309d75f1a6092ea03d584874e83d63bc21155a4f40ddc5a32e60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5138c153147c0634984cea78b9e171ce8
SHA17241c5c37b097948d406b321982efb963818b87f
SHA25653e98cecedbc2b1cb9df2ce6d46dee1b8be37925036d31e737c3685a3a0ab5ce
SHA512a0541d62a345ba919b0acfdb6a50f4fe0e80db456c9cf60b56b48f4b5d22f16a84d72092201d146ee099849db83ca81ac00414ae32170aa1360853c0ba22d9ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52234c8f2368a5a2e13db850cf3f0ef67
SHA1822b5c5673d88c389dcbc4a1b167007f63f515a9
SHA256df025f81d2be763471dc966439e04d9b9c6f56deed83ddf74cc9a65f50b1abd8
SHA5128076148a66ab14b61200becf2c20f4063597141483c5b7ec78001e0bbf329cf68fb7c380914efb468b262e93a9d79cc9bc3a260a16d5a834302ec077f9a61f98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509c3d9925c94c7650df7c17fac77a405
SHA178e4746a0825c64ec4ee7acab3765cabe9862795
SHA2568ff248a4763941cd4ee994035f92ef7875103424614625301c194abc94e8f570
SHA512a79866213cd6aa05b75ef1b3d7470d5544e459abb4106ff2d294f51dbbb1327bf6a3a9deb89ae155f3ca5cdc14aa02e6eb8fc271ba9973c0c95c90746ceaf29c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a9346152e414433d831e57d53c363ec
SHA1499b095c81ee157a2923396e36f59256e51a0c04
SHA256e2753d2c6218d05cc37d2c8e4d6bef241c4fefe7280e7bd84b9e7ca0db6ff48d
SHA512aee1e10ff0a37e44c05b8cac23cb5dec97c11d5bda0e9e6343031176d83dc3c3ff4809db6fc3611ea0d78922b268515f1bc7ae7a5354fe353c60bacfc3d112b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d2a5a3dc731cdae00013976b337bdee0
SHA1140feb570b77fcc6529802beda739f456ba5374c
SHA2568ea53575ba4f749b82801c39eb72880dcf294e7b88b4db3404e9fd6cec6ce117
SHA5120fca7918a799604324f937027f4d8b009105e66037dcdc6b9333b303e48e623317917fbd871725d7e76eabe8c038b5c66ef8c3afe9ff424b78f261eb25252d02
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b