Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 02:46
Static task
static1
Behavioral task
behavioral1
Sample
ad98b9ecfd881f32499d1f9363e5b5b7_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ad98b9ecfd881f32499d1f9363e5b5b7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ad98b9ecfd881f32499d1f9363e5b5b7_JaffaCakes118.html
-
Size
19KB
-
MD5
ad98b9ecfd881f32499d1f9363e5b5b7
-
SHA1
06132794928d452dc2f37fd2792f022f5c2fedb0
-
SHA256
61e1397dbb74c204ca23be6f2a6b6f96e917c0804cac9ea8c463eadd44511d90
-
SHA512
1f59751eeb282441426bb3bdb19113a93ac58f55081b452640b281bbe27a64164e358d6ba6008634b58ab49faf667c5df4da4abef217f072e9d64038d0ff337c
-
SSDEEP
192:uwcSC9ysb5n129x6G6tAEWHO+EWWnQjxn5Q/ranQief1NnIZwinQOkEntx8C9nQ0:pQ/FqlqG
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{729E37B1-5E9E-11EF-B856-666B6675A85F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430283876" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1200 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1200 iexplore.exe 1200 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1200 wrote to memory of 3012 1200 iexplore.exe 29 PID 1200 wrote to memory of 3012 1200 iexplore.exe 29 PID 1200 wrote to memory of 3012 1200 iexplore.exe 29 PID 1200 wrote to memory of 3012 1200 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ad98b9ecfd881f32499d1f9363e5b5b7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1200 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aeb438debe750ce78132147070b1b0f
SHA18f23ebe24194975e8a9350845a02b3964023e9c4
SHA256f8a0fc05b95f1b84b9f6f8f58ac5ece8cc285cf015f73dbdcaf1b39762b5a9fc
SHA5128816a13232985ca16052c8c88eda237ae430bd906a1fb3dc50462ce3d84ad909b4b34ca8ed16f6e8425a8c20683968005f28702e624c41a54747789ed22375e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd761e3e670631da6297013304e008a4
SHA1cbd60afb7a78dda883dd7d703b658412bf1d66e0
SHA2564026c1987902730122782db67f98049fee7d2a3c7a1c8912480e93959402de0b
SHA5121a05147cc2f9819d69aaaa51384f8e9108219f1439e24bd16099dcc375eda799a76e00cb2da4f351496899f0a57c1a2f430046d317ce79af7a2b1a3e67f40f98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583f0d095d951ed8cf2c30f5d15d3d0ad
SHA17d6d84ae9a06de83a9eda9b67c5674f9de89a18e
SHA2567274628fd1c75d9291b11189d3bea267164eb8dd08947f7139a543391253fb30
SHA5120af30f0dea1c8bdd1bcb62287bd983ad488827bd83f333ab7ef394b2734f398896b893022d5aee209bb5a6c03c642b4780cc1e6f2d4a6757868d05aee48386be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff08ce980f7f7fb8642ebd1078c7e674
SHA1b487c8a40df5abf3046c7062b072d5a3f9406588
SHA2568272040d5854324241278af2a0fa79cded7681673af85120a4e554cca3c19d9e
SHA5120330ce4a20761d1d880988e5eb4e6659cc6bded49b075076b9a4fcd4890348d8d4cbc38bb581cea7aa7363e92aa086d008cc6d1938e0177bc80aa7973b28da06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56abd275dc14c8ddb63722d0332de2682
SHA19d9fa4efe09cd54573a5b3bf80a332402fa4b4e1
SHA2560c1c1809792b4dbe048b650d27a55e98aa2aa12e9bc8a0ae92a7bf0415e3ba55
SHA51257af0ae6d9d8801dce1e9dc712812dbc6b5376d39907458b58d35ccef7f88970064be04354f16b8d89ffd18a4155cdc3f732ae2ccd644ee1579792f9fadf2eb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50188a03d3b9dfe9278170f186219ff1a
SHA19829b3bd6d924325a430c4c3d6526dcafebf6b88
SHA256b885097195f1f2000bf11c500f690ad88cd39f0a3df21a76d3172ed2c45ee57b
SHA5128f843586db4981f893921e2b5898c71d73dbc1e469106f47e8b647658752444798980743baa249ef9603977c79ff4977aba387492309ce71d009f44933c4c80f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57972201b3dde43d90535bd64c90b6f07
SHA128132d5bd15e3c27ac0a26800ee74b4b66377466
SHA25626f15b8123ede4ba67057187c4f731a4f1ba25e310a834ed0e8698a47c75c5e2
SHA512d8302f88e61b97c19f94ca5946647f9b5464d843356079a33c919c2f5443b8cfaf132933115ea45dd5584f61e073db2cc67e4280f84cf562fdec2d1863c00dfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5906c9a6b441cd39efe2e337f30c63ada
SHA1280700414aae1e5fa000ddc4e2435900520d8f39
SHA2569b2155b0730e94d923a312b5112467ede4050b41f2115b8202ab210c180c846c
SHA512dc90a65afaff6536e5ff22d371ea65bfb706148d199eacfc5ce90235b0daab253d573ee4f0fb26775ba9e5ea834e1bf51d5f50d0d325ceb9a179616f4db14e57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556a76701a28be47f883dc5b8a366b1aa
SHA1599b2b3f8d08baaec2ddcfae098c232f2fcbba47
SHA2566bba77d98a64569a9237a55e2dd0e5fcbc9f50bdbda325b1bea5d6acc3d091c1
SHA5129bde46ca35f050f4413f32fd7cf703b8dcfea54022865fa2c665184f5b2e45161606882053ace0ab6043648179f6941d5880ea3454e0374999d47cd126ea46b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b8348885d487016f63a8e72a14efa6d
SHA12bf7fe6f15082459f9c007a19455ed65a1d714a1
SHA256a30bc2a0e85914ac3afb9d688fd9ac2dcb50fa79b9039e7c66a812f884dd83f5
SHA512856f76787ecf61bdb5412170de358e9bfbeec9fbf0993b6aaa0fb205138704b5391f2bc907bd1d888f8b9df119561c0e609dbe93600e68278abd947d68295569
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b