Analysis
-
max time kernel
129s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 11:24
Static task
static1
Behavioral task
behavioral1
Sample
be7c85f76a5fc4976a8fa4254e72ed24_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
be7c85f76a5fc4976a8fa4254e72ed24_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
be7c85f76a5fc4976a8fa4254e72ed24_JaffaCakes118.html
-
Size
9KB
-
MD5
be7c85f76a5fc4976a8fa4254e72ed24
-
SHA1
c8bd73d7e405190ae43623a669c5ac1fde47300e
-
SHA256
0d37a7272b37836cfa34690d9e65a52193be1cc95884dbe12729a4a4228f76f9
-
SHA512
0f4dbf726cfbc2f148c453d33ded1c4d3f7c8f7d4434faac194ee1f37cb4136ef816840d3a37b0227f4edd2d397a4e62918b5da1af66516a16d6c14392da55ee
-
SSDEEP
192:2Dg12FR4/Euq7EKQ213mAsvTdqQzcG54w3vkiUM5/CD:2Dg1MwEucQkJQxag9w
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430660518" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{622BF141-620B-11EF-9CB4-D238DC34531D} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2324 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2324 iexplore.exe 2324 iexplore.exe 1364 IEXPLORE.EXE 1364 IEXPLORE.EXE 1364 IEXPLORE.EXE 1364 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2324 wrote to memory of 1364 2324 iexplore.exe 31 PID 2324 wrote to memory of 1364 2324 iexplore.exe 31 PID 2324 wrote to memory of 1364 2324 iexplore.exe 31 PID 2324 wrote to memory of 1364 2324 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\be7c85f76a5fc4976a8fa4254e72ed24_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e49a40a4d873da6be75303f10b050ad6
SHA1bafe2b9eef739295af28a9cbe78fe7f03211e098
SHA25657424e656ba1bd40226db6d8f9c5fd386cff107b28becb9caad926b06276246e
SHA512adf1da91756ff6cab8bff1854de74b0dd2482b6cba66f631a3fe0f795b9205e4e99ccae4aedcbab9ab2b32e70db97f1575e6f955b626d98b8e99ad5ab80e4036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e13c6b1da88a4b894e9c3f08765b8dd
SHA17638fc61a681c9b7678d03be9d771b11a1ec43ab
SHA2566b7a880a2618827ab58b6d89d6b20678ab1a59fbf0fa3caa32f100ee6398dc95
SHA512ab45c12815f7fd2f5e255f9f1df1e82a9a94e10315babe1ebe6a83e0e4c4ce8afc906fe822f16a17829f8556cd8e7a4fb03a951b70df8a41760a49c77b71cc1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaf8d03990dabd5e2916c62a858a4be6
SHA1fccc0c349cbe833b22b102595715f2c5bb347953
SHA256db69bac3fc695e735e9c53fbdec151c468293a0275a12a11fdde17f4c4225008
SHA5125854b5031c467b436bc3f5fe66a77a19e9bebb6dcb7f952df1592c9b4bb0cae1dda2973fc3af9babe0e2431d92891460b651ee439260118875fade97cd306675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c66a716a7afddeaa6f72cc6370c5056
SHA112fad3dabbf31251542cb599afd46facf82a74e5
SHA256b494884b6928b228341f98297b0a90c740e9bb55ccc527dbc404de63308cb2e8
SHA512ce22a2c5750cebd3edab12c3435ef71311fa4514acea2e8b2e1b6842f46c921bee65179b1f8732812d39c82b96367e0cb98e4c25f26c5db2a346c56c922befdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ede2a1e008cbac597057c1c4497c4234
SHA11b7eb1ac69f776b0648e75f3955041e1b8595f7c
SHA256b3a5ae488a8df44510bbd5559fb20480a4a400a11ef3e236f6711b9bb3941a7b
SHA5128ea24a0537f4ed39ea2801fd85b8e51bc5c424f3c5ca7a6af64166ecea69d4e4e711c91caee1cbbf1d3623dbc572970c91e1a0e4575910e794fad6cd85de52e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58315a5ac23f08ab0324a71cdd9943cc5
SHA1e79bd21a2f2d12a840b3f95a2058f3c8b8b9616c
SHA256003af352537a074da6378b87440f23ffb2fe17f24f750d9c11d0f93cf08be8ee
SHA5122fbb10fc4dbb0df1ce7e0fe7feb1c8d25d4ceeaf88e23189fa0cf44f22fabea90f5d17edca8877c6c0ddeea454afa432d7657605e053f492cd291ea4756613a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578b84f1c8993bb9a93a01d3e98e20938
SHA1a45e6c1bea53daff6c0db6f78ad0bc1ea0b1b85a
SHA2565bf9b029a3e9832eb43862738b0f715383d7ee4dd2e9978b3f460b97dd6ef8c3
SHA512ef82f3caf061b75b3673a27d9072b4fd200bc3cd667803d1057f1caf2d89d9f5b139abe94db9017120da24915068fb9b90daa01eb739dea93fc6146475f69502
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d840c76e11f88638a2379766d099e4b6
SHA145248a715b498cfdf1b8b6bb721e32dc79c8476e
SHA256dd24c5b9a90afc1684d962dea4bb715d07d8b60b92be1b6b41e99566c71e3982
SHA51240423026a906a0fcf5c24d1401ef1a9073a78fb29e7e6efe5de523fd717f9c5bc7e37b879a58f1380282528d8bd4267fe965e2e0bafa884a8e77041d584cc418
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a964c217405e5b7dd72acfaba836722a
SHA1159cb1eb56fc1445dd82151e901d05aa15e86817
SHA25694103866790c11586a3e966a077fa98e9624211d1765918f045cff86f9844193
SHA512537b293d9157764389ba4b9769ce8123c7dd9a9477b0550aae441a8479643186bd7fcd69dcdef77bb99ce7109cec85feb0846a8cd819085b66b206e592322414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b09bf33a80efb04076519b81790261a9
SHA145e6e938f3d0e0c6e018fbd4d33fea8e35a032c8
SHA2565847fa563440e4fdc78d77a7f8b677b3885e21b8b89454801af7d7a21e942326
SHA51289dfe7b850dd4a446b0c3c6a6be8205c8f53488b3808e73f8f0c1dc756c98465bf4a72b24f4db4248954bbc28b61db700e55871233c6fc086f3616be09d8ac77
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b