Analysis
-
max time kernel
130s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 11:31
Static task
static1
Behavioral task
behavioral1
Sample
be7fe2d0c836c97d74b7c12704277929_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
be7fe2d0c836c97d74b7c12704277929_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
be7fe2d0c836c97d74b7c12704277929_JaffaCakes118.html
-
Size
23KB
-
MD5
be7fe2d0c836c97d74b7c12704277929
-
SHA1
2f9a566781145badb32a5f2f5c711d9cf14cf4dd
-
SHA256
cbd56bf06d582b32a2b34ca3a79ca0704126117c8100f8f6b0cb428e81b67170
-
SHA512
79b67c22cac4cff5c614528de4c41ccbd3688ca5fd634a70235b2774276345eab0b4200e6fad83ff3f509312c03302e612b9d29c7f368f20b7f6804254368abb
-
SSDEEP
192:uWDAb5nKGnQjxn5Q/GWnQieoNn2EFnQOkEntggbnQTbnxnQeCnQt6wMBIqnYnQ7w:3Q/GpEawqJis
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6D32AD31-620C-11EF-B6C3-72D3501DAA0F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430660966" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3048 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3048 iexplore.exe 3048 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2352 3048 iexplore.exe 31 PID 3048 wrote to memory of 2352 3048 iexplore.exe 31 PID 3048 wrote to memory of 2352 3048 iexplore.exe 31 PID 3048 wrote to memory of 2352 3048 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\be7fe2d0c836c97d74b7c12704277929_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3048 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5207cccb4f270da8a93b06ead08504c0e
SHA1fe648d5f7d47acf69766b9cfd43095f572c6ab15
SHA256f5348f2f3e4c00807916031b2bf104cc43792c79e251b558bb9fb363457b9081
SHA5120d5fd16fdbd91190f7d2b89b19e2c99bf0d5c7ce76f35493d4e2a44a2a0e49bcacb1aed75377283e701f0dc8100a499ece61fccc139c6e707814f9b9a39451ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bed71eab3abac855e7e3b7eb1d96c5a
SHA16e41c232e6fb63d135032ebfb729443e690fda9b
SHA256325fbf042204eee4489a140e0689e86f5cda8cd323972fae4ea2f125f17cbca1
SHA51275b09214e456230971735d89c8105ee2eb7cf75ddc5f3bb0adddf09e8c0348ab984f9fbd4986a133f8cb57ff9a44e5868fec7f590de398884f1edfddcbcbfda1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb22d34cfde672605c4289e03cf28b37
SHA119505edbf35ff33bbca527b3ffb8d4c055f17426
SHA256c7a1286ac6cb59dc7a81819cd5f7357eb658f95802b003e477cf541303b6160a
SHA512d402195cff33a1ceed17f33a59cc2f3b7186c097e6eac3808e972bc00261b23a50207bf4d89583a5c8b340a29cd171f69d1873ccd7761ec8d0844bc761a438a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53426ab737a59b63b70e8a75c5d7a0f40
SHA1d9605e17152cdc089f8f60ce0bc5c3323831708b
SHA25618c198f26a63c4bc6d57bc6b4dbd8a535f93caf8290aad2a3810bceffc9fbaf4
SHA512b4d8fa0bb607b5c797e6f5e331d4260f3e90e64e1b3a84611bd469fe5b82e3bc1978657da11d8120ab4d30d0d2bf220d971d2335f7db3978c4e07231b172b15d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507077a8a95970ac6552c448ee404b428
SHA14fdd16a4d9bab241ed89eb0da1bc11907341b3aa
SHA256b05cc39d3db521a72cd436e7f0ce306043f914d04dbefa7c3489a00f76913ff2
SHA51213e4f5db7bc64d6ffcbec8276bee5a6bf59317727a8fa3a1425c989aceb91c8750b37ef1aa1f3127f635b5c180d1796c172f13c08cfbc02dad7a1977cc527765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b8f442d59e0abf2d55a1291c61d494e
SHA1556bed4828688979460ee80867939bd6911dc534
SHA2567ca4b9aec0bb334cb4af3da75f90221b93b10c967ce4233921a8488041a52cf7
SHA51283e1e3dd67650dfc36ce710e0b7a4abe31be49ced967edd811da36e90c1b5f5ddc0dfe440a1929ba371550d3527a20ddc4320a54478eb2683f52d2adb1f007b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58388a75aa36ac90536676107309d8b5d
SHA15e4b7115da9803da24b3d8a4f6251ef8f6b690b5
SHA2563b1cfc97d0001905c03117542745d3d4fea922b5ae319fd4a6ec78a8c6b6bc58
SHA5129e24dbfb814416791b509f7e741510b9a53ef5d51b38aae79dd988d926201f867d5a810a930a397209c261d4a712345ce0c5073f73de0fb0890c0f47e7c00f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b426c11b94214555fde4035c88fbe14c
SHA100891a6929bd7df9b9be8d451b8f1b03bea29561
SHA25639370f3c299d7c9b61ac03f77c96d51d78b53563237641e6c0ca055a5e418623
SHA512abf4a685d9d60ef72b8dd9cae065fbe1267597032070c331d691dd6cacd16adf13251d1602a2537673c9d72168178733bd8d0879d0989999fe0fdd175e1bd7ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a766b2edbcadf37a6490286cee0d8033
SHA18bbf71b66d38094e26a5455d29e9633523052b0b
SHA256971e5fda1d8ee2c9e763b4ec37e1d23b7fa67dbe9375e0c6d8133bf5a68e2c90
SHA512cc1551ca3feb593fb4150fed0982723d804710c9acc50ff914b3ac69b3e4a42ae6acd66a4a17bda2e8c297343137449b3aae45f1164afa107d86eef9e17738b2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b