Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 21:58
Static task
static1
Behavioral task
behavioral1
Sample
bd4fb9a91bc21f10cbdfee66b6bb893e_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bd4fb9a91bc21f10cbdfee66b6bb893e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bd4fb9a91bc21f10cbdfee66b6bb893e_JaffaCakes118.html
-
Size
23KB
-
MD5
bd4fb9a91bc21f10cbdfee66b6bb893e
-
SHA1
a6188435d8a009dd5de0e306c111bd00f8e2b419
-
SHA256
606068a3c8db0a62d3f268044c123ff5518498b4ec27603680af3e2b7de58dfe
-
SHA512
3ff2831b570ea7cdfcec528a942f69aaac65f8ce9c4e2492e233e66a5b6874e4ba034131c97dbcd87f37f352d72852c4087d0dec6369a4299bf653ac558dc2c5
-
SSDEEP
384:sEgZHOBBCimggUC4b70y8dQ/ZJ2GP5/eOLrllEQFQ/NwY5KBXRg:e
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430612173" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D2537F41-619A-11EF-ADD5-E21FB89EE600} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2852 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2852 iexplore.exe 2852 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2808 2852 iexplore.exe 30 PID 2852 wrote to memory of 2808 2852 iexplore.exe 30 PID 2852 wrote to memory of 2808 2852 iexplore.exe 30 PID 2852 wrote to memory of 2808 2852 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bd4fb9a91bc21f10cbdfee66b6bb893e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2852 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e72f730de4201f29ac544b5771af77da
SHA1ec0ede79d386524f0e3af90501a448bcd5ac67ff
SHA256986bd3b9bd791f04587404f43fa1e4fc0eb177f8f962861524fb17529e0fd0a4
SHA512b4f836720ab7116ebc1f05a4483139e6d1c0566f1ebc3cce815a7fdcc2481581d81eda55ef0e5c40a201ecd25d10b8fb95bb7de230eaff885e494198bf7ec076
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf11358b95d5000413ea7cbf835f8663
SHA1b6a12ad73a5c96b6f33d9d9e2a4089ab089f9495
SHA256b4b73544194c94b0fa085389b2e4efd4f90281025c93e2ec54a941b653c25b85
SHA512702d1c2ea1f7dc52c4ed9fbeff527c453733f57acdd3acd1fa44004dcc5e8bdb2dfacfeb8b52b7f4b12aad22d313b710fc6fbc730531f30c7c4989b9fa42bfd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52014d8def6774e6fa49be8a917ca2e75
SHA169758ecdbf001e1dc2e190a417bef88611d6ad43
SHA256464341dad0486f5cbd2832aaeec3ea9ab5ba22d5a5c6238b37e4680021ce29a4
SHA512696fb3282911970aee4b87053664cec64913ee0c19a2510a97820879b833f041f7367e168a911da690d676343cd0de8a2d223524c3b558fafe669e128e639355
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6df000877be2b49cc9a3d6c24e32845
SHA1ea1cc7950d978636e164a3d8a4f4876f4e45289e
SHA256be194fe10c5d041faf33bdf3b21c52a6a989e9e20a4b13121a34e72281486425
SHA51298f5c505f04ed290af6911b1aac50fc2aea44afff6df3365b8678bd258f504fe92bee7560e53731cd3e65ab1070d4a834ea77c87e39f52f801da565bdbda05bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5336cc1104852ba7a556f45c2efaf2e4d
SHA119896fa35df3172cb3dcf8496c5d430116e6fce8
SHA25624dba3349949f4fd562752aadc422fdd7c5641a293299abbb92c55174c46a1cf
SHA512f19a20511b8659c6f57901cb8eececf486f79f6dbafda7043a6d810765835fe60923120b9552e92042e554c364c01ef446ad54c76dd499639d0ed6982b3966db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba35b5756812b309de8558c618db5687
SHA1c58881a610c18e6a0afecc4fa4e51db734275fc3
SHA2560b9f28e3ebefdacc7669dd5da03ee0221b499ee2195432e92cfe00d9a43c2fcc
SHA5126f6dededdfe1d1e7b04498a12453e99be70c7bbabeeb1363ff48ad1bc62499132be026d1dccf5ae5dfe81125ab484a5bc3f989dce0dca2261cea82803f845abd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd1ec3a0a833acd4415652a90d216143
SHA18c48c55ecc644ef231aaa5f049667b38eca20e3c
SHA25627fff2456596e80526a366506f4d08f5864998f4ce5e4deead77b4c892c57cbb
SHA5124d387b4f63f4adeaed114672755b0091e6857b5ced4cc4dbc7fcb52393d5c1d46faf7b4d791a0dadc34fd92d0ca377780d37a12a109d38403a022e8a847d1094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51db0795f2391af404ff665a30cc59b74
SHA128b014723fa740f8887a49994bbb3282956b2e91
SHA25643fdb2b777cae4d3b362700a287b3085f5e0afd0f35c7898b2dfc3a1c598f7b2
SHA5128866980c67c45a2e2b697e709895d363b630f252a74c7572e5594f0b22b322a5f49444ce7ffd7dbd6efc94bb98b64fb1344dbcb8b2de77e204bf077fa2f48dd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b2a7ec29778931d26ac66c6e442c4aa
SHA15ae8f1ab6c3ab8b478ac83cb8a21e882eace8791
SHA256849944fa2ddc3a7b48204d18f7665f6654aefa5c3df500421755f680964238f7
SHA512a5639a0dc93babf64eb146a69caa1dae095494ceebb03955e06a7a069d39028b33efa1c38f963b393c4741bbf03404ef09f93b46ad5a505d70ddeec63904f4db
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b