Analysis
-
max time kernel
131s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 05:34
Static task
static1
Behavioral task
behavioral1
Sample
bdfc0265b382bd33cb5c535c1980dcef_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bdfc0265b382bd33cb5c535c1980dcef_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bdfc0265b382bd33cb5c535c1980dcef_JaffaCakes118.html
-
Size
34KB
-
MD5
bdfc0265b382bd33cb5c535c1980dcef
-
SHA1
223f2583eb0e96840c8c1d58ea3c87285412c829
-
SHA256
d48bd404f3a63f99450573c5b6648651bfdc80ec50bf69b83b45c009db4ece89
-
SHA512
ddfa16297d5633c9440cc29ac3dd784dd9ac61e22ad04e3d34f643039374fb462674b350d4df1b7e7bb21647518274343b33befbfbce8c62e788767d8f0a204f
-
SSDEEP
192:uW32b5nLYJrnQjxn5Q/TnQieSNn2ZInQOkEntV1nQTbnFnQdlXCeRAqK5Ake+kfv:sQ/YmlRpzLMr5p3+HzhEFqIQ7OQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430639564" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9808E7E1-61DA-11EF-A205-6AA0EDE5A32F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1724 iexplore.exe 1724 iexplore.exe 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1028 1724 iexplore.exe 30 PID 1724 wrote to memory of 1028 1724 iexplore.exe 30 PID 1724 wrote to memory of 1028 1724 iexplore.exe 30 PID 1724 wrote to memory of 1028 1724 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bdfc0265b382bd33cb5c535c1980dcef_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535d6aef1c371b639e536354b2b92b931
SHA171c10eae404ca775cd3b59f1db17d1fc933d5400
SHA2561828d725858256c4c5a8d8b63ee2b80597094d500d1f9ab0d831cc48720c4fd8
SHA51267940c1bb0dbe1fed3d503ce46a4d31e88f4df821310b955ad2c3529ac96e70dbcaa60f356997068070fc04da474f13ca204a747ad760b5b4e3f3e4d0fbb2b01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58320b2c78f240766d65954bc561101a4
SHA1a072e6e2015347e44e1f16ea1c0b8b230e3d1442
SHA25632a6fdf7d149e4c894005aea1119ac45372dab44abb4fa7473a75a3b02a71545
SHA51299c227c68f386e9a0c996b0e4605a0d6ae601f7acbebccf089de5f05fbab131a0b1b978792fbc71b4ac31dd66920a75d91f047deaf660041c316668d1411533d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a32633eac9a7a446f27baeed0771ff2
SHA1f749bb202866077a5a8edc77ea695b3556e38d45
SHA2565f886959fd87d07b6dba05f99b8a10f0800a45452912dd1c00c35973bb3ccfa0
SHA5121da9c8d1969f9d6f0b46fb6c16cc88d21a302947c2441930fe0165c754fa7dea3cd5ea98c76c2cd90c4d844b1c35dd7ad8dc6f7ff18a4225d078338b92eb4023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2fc2597d79ff1f5fce51a7022185889
SHA106ea5fb970d867ad9e3b71017e22cdbd5c6439e5
SHA2569947dd01537bc604550f190e2b3966fedc5dda59f7008f0f9f16d410d0872abc
SHA51235087cdbae329206ae4e67dced2c88a262ee6ce0ac3242b15555e1b1fd57bdd4b5083a99ad42ac152bf781be1276ef624c6ad65e927e6ea4116e820ceaca5055
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5514bd39a1fa4a0ae7de84328863d6e0d
SHA18d80576037fe4223dfd49602853b30b24a88fd1d
SHA2564a21fc3bffda087a1ce75c29ad5c6fc9a83bfe92b489bcf8918df614376ac9e7
SHA512dc33df7c9a46f044636d2269e93693852fe17372dffe63a53dbde20a593f667ff444dd522a94e93837d8586ac8950a73567b529242ca09178cf9dc58a948b81e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c007386eeb753233c370b148ba94d8fa
SHA189f5a9a2b0898de50f483d7107ebc3307187437d
SHA256e568f5c08d909aa10117d72c27b84be5c0b1316409bf8115c0885d930682e0a0
SHA5129cb0152ff8ee613fa3d0de2163ce091e9866b0ea182882324929b56b51cf7887031dbce6f226e68308d0d77b4b6e790e7d134b26dcd9731a75f98656d63e06ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e26bf28511219e53838cd1c5e7b8f577
SHA10a99ed932b936aedda05d2719449b74b95c1b062
SHA2562e15d1642ecbf6931f9944b05a9c70bc276884f2e1cfe1f8fd6776fc172ffbf2
SHA5123d4f21f69ec256066ba50d6dc29ea0286b11debf204f3a2dab1b8cabf5add76703aa0511fe6e736089d969afc45978262cca1c2c3ee4180aa8e94866c8c27d53
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b