Analysis
-
max time kernel
77s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 00:13
Static task
static1
Behavioral task
behavioral1
Sample
b99dcf79b7490529fc89ae9181fdd9db_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b99dcf79b7490529fc89ae9181fdd9db_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b99dcf79b7490529fc89ae9181fdd9db_JaffaCakes118.html
-
Size
9KB
-
MD5
b99dcf79b7490529fc89ae9181fdd9db
-
SHA1
27e286a6d169ee1bd91583a0b2daaf560619b5ec
-
SHA256
d4b76474392333780e5e3f993dcdd81fca191f02047d6bcb5b4b0eb940c6b456
-
SHA512
813f1a6cfd4aa9ee74eeca233459fb7a8da31a11bf52c07469d3736c4178e768882c2f5a67b52a6942c8932677a91462043ed1e12ed52af37b8c0867400b2267
-
SSDEEP
96:uzVs+ux7p0LLY1k9o84d12ef7CSTUzGT/krYPp1abkvfzllVHcEZ7ru7f:csz7p0AYS/msBwboLlPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000ba546237772187b55a8bdfb227f551cf4c8b54dbbb37acf797587dcd29d3c62e000000000e8000000002000020000000196b0951ab76d312d2fb460a45e563abec2ac3900af57b04c549b6c05ff6fe4b20000000c812e49877b843e0f5ffc5a79a50d540f8e2dc5e3ffded53298957e7cd1395c9400000008759fd2e53a0b8a030e7113ade8a14cf8915768245e4e1929ce3b9aafa483c29ecc9ed113dda2913b7771a4dd80251930b263a741943121b23b86f095fd2e9c9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10468e6cf1f4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{94D7FE41-60E4-11EF-83A8-4E15D54E5731} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430533911" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2344 iexplore.exe 2344 iexplore.exe 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE 2844 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2844 2344 iexplore.exe 30 PID 2344 wrote to memory of 2844 2344 iexplore.exe 30 PID 2344 wrote to memory of 2844 2344 iexplore.exe 30 PID 2344 wrote to memory of 2844 2344 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b99dcf79b7490529fc89ae9181fdd9db_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577deab5d79c999bb5c7566498d11ee9c
SHA1d2c9dbd52a655193da01427101daef11330f1797
SHA25617ebc49734d052809fa9ca0605074935e96c25706dbf9bce4384e6d2ad87d35d
SHA51276149c59b4ae26e3c2ca06571c4ebd094a7488870c7948313b2bab2508de75c62e349c01e9ea12cdcb5798f1237fe63e741ffc809d9319ad26f8819c10a0e384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55454c263ec605a6b2ff8c5e5536b3d5f
SHA1a0817c02d1e649d2e5616636db1d007885038176
SHA2562f8cc404afbb17ae75140c4e4f675513db854468da8be931ad77d3daaea981ba
SHA512ab7bd5c783dfaba68ead4813fba214f4bd0b37bfee293efa937d7567ae316f4224f148deeda631e91ac56709364f72f9817145d17b21f3dc35668c575260cd41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527702dbe976e20e768ae7338e131b3bf
SHA12d573752d44632f8f3549bff3b5f895990c771e0
SHA256e6e3d84104b01e5047f3b528e4f0813a04ddade90afe7a29a220034324425274
SHA5126b8f3e4b4a3e109d785544a45359840d3864dfe94feec09125dab6e39e8e59728d6ef9f0da24aef9d03d6428891266b590dd7b7a3199fa94832b59e27c29d95c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517f39501dbc3eea1f2b45718fa53d58f
SHA1439fbc7460deb06b3e91ba37ed78a7071c455226
SHA25603258e99e9d8bcbf16673adc3f6a70eca9b0a84378e26fbfbe98f26120717321
SHA512512b00efebaea313727b3a9d1a074c8666bdb1e8733d346ad59f6566b1c5e80a3b1e81f7eb3ed7977a9b76777844faeb26bb29da6da99cfd18eb9b3175274da5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56986cbe3f2f064417d3af3fd0a563622
SHA1092592ad046be350c8cf51c3bd8ff805dd3c0302
SHA256a408e940ae5e83c691a1b9e12215222dd80b8b139bdc26c315f092df44890650
SHA51210232568ea01faaf96989f768eac7f91861e59ae1d3151cb191356bd35822de879e82e8287cdb65f691fcae2c913454c18520bdecfa452e4d222bddc3cd95b7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8b38ed9a740ed11b30ec5960a69c171
SHA1a730de974833f73dee7e956b3c44d55a4a975ab6
SHA256da2034af9eccf914c7f73bd1f57d24d7eeca80d7da4597701f70b3bb0697fdc5
SHA512aa5a70d3bf9d219427b6575dc62f92ec0f686fc95ef615a2297232b963dcd08924b31f225192e60cb92bb701a5c06310c0fcf7b1ab59f3668510ed8347d2cf70
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b