Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 01:56
Static task
static1
Behavioral task
behavioral1
Sample
b5e836042989da1bddb0bac99ff68fce_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b5e836042989da1bddb0bac99ff68fce_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b5e836042989da1bddb0bac99ff68fce_JaffaCakes118.html
-
Size
28KB
-
MD5
b5e836042989da1bddb0bac99ff68fce
-
SHA1
a8bee61190be2f645d4bd5686be6840d2dcae5d2
-
SHA256
895d4583e3d97847d26b0b2a9387eacbb3bb35819d71de2b81ae2d50e4ccc9b7
-
SHA512
bca06f5721c89c7cfc7eb13346a7ba145b3fe3f99d7d9ed2ab246f02f09167e4f5ccb88ec9e0cc809695c99eb1ab3d4fdeaf54c8de7da84900c2665b4d6a7d19
-
SSDEEP
192:uWjd7b5nA70nQjxn5Q/+nQieVNnF+InQOkEntu4nQTbntnQtXCzAIaE2WcwqHA+E:cQ/DxU4dm/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C398FE21-6029-11EF-A5CE-F62146527E3B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430453663" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2852 2980 iexplore.exe 30 PID 2980 wrote to memory of 2852 2980 iexplore.exe 30 PID 2980 wrote to memory of 2852 2980 iexplore.exe 30 PID 2980 wrote to memory of 2852 2980 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b5e836042989da1bddb0bac99ff68fce_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c2a810bb73e4837fd94b1c141cac5eb
SHA1c3af4d6fa3524373307ba9cc855c9529eb7241bd
SHA256d86ad38af83c0208bdc7954c4e63f458c7d5fb0f4e88373d10457aa075479661
SHA512ee5888e1619afdce70f2d57bd1452832a66e84c856ca8d1a5dbc8853b5877fc233c408d1a3ba8bc0d647eb2879bfcb9f6822257655332b6ab5fdc72d586987a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5106f1acd800ccb275cdc401c3a1369ee
SHA1ee091a4f66b70b0490bdec187f833792cd958d34
SHA25631d02946ed739cd10ac70869922ee5e723d4193b25797bec619a3b60f1926fe3
SHA512efc79443cac1ac28eac87912cd9b79d4dc8865767590a7c080ec8ebd8be2d4470e130c1f356fc24214f895ba7d8ef0b1e844037713dd605858cf85b1dabd9645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fadeb4889c32785e45935444bf10abd
SHA16a9b7ba02baaef9af4b18d368676178c800adf8e
SHA256b31132aea651726df75deea2262ddec5e106e39dbf5a2ef2b20ab3fed5ffbbe5
SHA5126c00b4f087bad4a8099202d7417ac04a379bee597270e0b81636852499c40d2f2df2242f521a3cc15816893533a209c3112fb3dba4cb27bca63c6d2e841315a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c866a1774d5d538180c498fcca6f7a51
SHA1082c3be8c9b0cc7ab10e9df78a7a3fb56697a69d
SHA256150e00f57b4b03ab4fd14d0daa60c6c4945b6229ffc8bb376a7b4a3f43ee766c
SHA51241b6d5209227c6a9f45e88dd0c2fd872e2c282896ffec8c813578707535193e71ee72cc4430cff3289e551dbea7c8d86bbd28594f9f2c0841700fb59db7e6ed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef0b8eef422f9f35d05e373583792b03
SHA125a934b517ca4880dfb4814a9e036cc0988b8c25
SHA2565313e92361e2b4eb29f34cc7600eb331e0ed086b7a6ddfc1b53d3e5f6ac06804
SHA512124120e805803cde57218fe79af7e18e7a5aba2b23aacff7d7c5c1401d7dad6d37a3f5e42b5017b4a1689c951f35c0e2ffa80fe37952fde64fdfc04fb061a5e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3c9396bad73b632de13fa75e2eb2da4
SHA1519f341bec9b3cc22e674bf877ea3d5b57f053c1
SHA256094bffefbefd66a648db3804ec1765087823d8b1b73d8b6bea09c039e3e4def9
SHA512961de0f46708d1efd9e1e1e6ae5cb939d013893d3364a8c3984bab6ca12d8beb0202da0edc088f5e65d35d92c63fa5c9e8917b639d58020c78e483d5a0203414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3dbaeb7c20a150c2402b935da7530ea
SHA1dd4729b165f1f53f5ae662617bc6202ea2ee1f2e
SHA256130542845c05a19a174de48ab44a1f8020132db8826126044ec15a270eff668b
SHA5127bb16783cae48a803ae15ddd8ffeb488ee20c6b8a0b1ee02b4dda7b2972803df1a1198d5c1792808f0faf5a60f0efc8bbb9315a98b53ef665b940fa8b7455424
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d973d07f2b8cd921df055f8e858132c6
SHA19745ecc5a4381c1721cc4a68f205ab0d450e3d60
SHA256e8fa297a88c4d3e6388eebe710d28da6268e6da334d46be07004a5b9b2df82ef
SHA5120ea6e4c6f3dc3182e3d3ae0a5a0777baa4c4d08ab46622f70070af02b3eee05380748870cda44616e2f700b7b49acbf327db556d72a7b709d5e046ea3e851ef6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c30b4d13b1f45ecf5f9753177c06c90c
SHA147dbd39d508f257919bc04fdf69e4beba497b528
SHA2564fbb9a71dde24854e571ba0523388406c47286a2dd3c55ef0571bfd8c941490b
SHA5126104ecd27823ccbabaca8b3e509c8831cd64790eccabdf1898b0ebe6977c75521b7d40c9fcb34d97b955b2ffc9f3c63dd87a6fe5b9f47cfb1b3c892bcc61165e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b