Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 15:02
Static task
static1
Behavioral task
behavioral1
Sample
bed8a732a9f40a3e8f1184b1ac44f45f_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bed8a732a9f40a3e8f1184b1ac44f45f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bed8a732a9f40a3e8f1184b1ac44f45f_JaffaCakes118.html
-
Size
27KB
-
MD5
bed8a732a9f40a3e8f1184b1ac44f45f
-
SHA1
8e5a94f772e9b3e478d874888eb1f7d404d85db4
-
SHA256
91d3dbfc2d080ee52da0ce87245a11c3bec4adfdd91e550f1a99ffa47af34651
-
SHA512
ef5dcc402be78cab2c786b8ac7a9b16e660febcf2a02e6d706bc144660b6a617ecbcc5b0d46d4e30d8907b982ee60760680101c226b874d5de493a75d73951ed
-
SSDEEP
192:uw70b5npynQjxn5Q/gnQie7NninQOkEntIinQTbn1nQ9eLPm60/VvQl7MBbqnYnC:oQ/0uxsVuSZyX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430673627" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E7BDF5B1-6229-11EF-B75B-4298DBAE743E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1316 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1316 iexplore.exe 1316 iexplore.exe 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1316 wrote to memory of 2152 1316 iexplore.exe 30 PID 1316 wrote to memory of 2152 1316 iexplore.exe 30 PID 1316 wrote to memory of 2152 1316 iexplore.exe 30 PID 1316 wrote to memory of 2152 1316 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bed8a732a9f40a3e8f1184b1ac44f45f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1316 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5961f66c06a41591b6bc0a7f7072b93e0
SHA1d09eb2cc1dfde1279c70c66784f6395da38fe3a5
SHA25681780a93d2b7f7a4b6884ff48992a088f0f704cd7ac84e70f5c43383fcc2fbc1
SHA5129c8ba0774db859f980b247c2625b168d88dbaee74bb38b494b3133adde918beac5844f815cdbde9d2b80671b8cd23d3fa2bfc044c93569e0536700ff7f8dcef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5c07868928306667c4dd5c6eb918d83
SHA15bd841c0d97d0f972406e11a13b9dbe027c50aba
SHA256e5c13ee282536b8cef70a04665f3235fdf0bc004a8a4d53251c2f2889894bb3b
SHA512018b0475f5b947737fed006689e00b0b234790c99fa1c51d5cf61c4591562930586f44ff86d93e0a4d1146a189ed37d4b4a440dabcc1b99409712a2e0adcfd73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5975a204ebfddd5ea8b98548d6db5a822
SHA115753d8689084d996b80d789e94c6a3d713c4eca
SHA256877e67bc0f821ea291399d05f3dc39ae2e55cd8c85f9aa8b53edd20567d09074
SHA5120da175e6290dd1955012333edd2e718c4660c56c8569720d68e35224767c0939e36776d297ee9fe703ff922f90d089fab35202a9b7f05513e9a7381911a85133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53aac42e42abb52ca73088b300cc38dca
SHA1ef448a858367f9b1b748d1745d9d05208821c5a8
SHA256142caf57695e7d4c6958e015fc6fddfa97c84f1ac4fd126203f41e00093a2480
SHA512a493e2986643b0a30dda4af48fcff95608d77a4c7052fcd971deaa02ce8db44e5e00d2e38ff4e14f398678c2a2f4a16dda7c12967c45bcb7f65eaca368ded7ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eb34d0f3d627816919bd1adbb02e2e3
SHA1c519619d76ff6f802d3e3c7bbcec2608b3599ac0
SHA256dc6328266cf7764787a425e4025f24d5935fd6893ab8b4e914b713733da568d1
SHA512a794903d42abc8e6f5040fd231678a4f6f79cb90b62f8be0afaac73bea1018bc71ed242d2aa03c5d00c5391eb0718a3e36dafd19d87c4bc1ff3c88b8838970e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f24b42674a32a3dbcb91177551d967d5
SHA1c42bd8efccb49f92ede043ba80840be315a38693
SHA2562207ad11cd457a6c148a45d4b3e54de193bef4d86fd8a7f4c62b497b331d3e3b
SHA512252b9e758223eebbe8d5979cf6659c2e8dbfe1942a6e968954711563ca49dfe5ef7012b7ff30636fd078aef5d35d37fc1c3cd9f4e892e874a9c14ac452f64da8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b6211d6631d37d15fbf6da13db7c0f7
SHA1614f55e811fb9933f9a572d824901513aeddb72e
SHA2564d595b430d5c1a9962c49fea1c5ef8fcf1440369628d5d061eee45fca08006f9
SHA51231bab5bcb6f3f8eeaa07020e987a8aebe8da334d41914be39c7277b46a10a18913cee3541800ecc4cd071612d9d4a0b6f963dadb7f494af8c7475881d419d7e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a7cf86461a50245c50ab723c0c8a623
SHA198b4b878eb13a8c79ac4ccbbc81eab15eb105edb
SHA256152764d7158592a4ba963962fadca1631e78c86c3bef64c07253ab343718c2b2
SHA51285111bcbda79a7dcf333f8dfe39e50e51b61555cf9c7355a575bbc9980dc84d433525ba97a679231f4a3c40deda65b079f058ad8ff993223f4d4ecbb5375b9dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52650aa1c73739dff30796f21d0b6b69b
SHA12e1a889b803784722bb1946f2614eb2663a7172f
SHA256f587e81783006bdd27d90e31d36d7eaa4de93183951601c65cf2356b13226933
SHA512ab3f882a7f4afd1ce7240afcd145abc73a6147b4d52fff116e7b7c84eddba42f01e80f7f1d4d4d9cb18fab9923e18343d1d73e682c333d320ad32a2de7a5de43
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b