Analysis
-
max time kernel
132s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 17:59
Static task
static1
Behavioral task
behavioral1
Sample
bf28ed476b3f786c06f3b8de9f9e718f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bf28ed476b3f786c06f3b8de9f9e718f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bf28ed476b3f786c06f3b8de9f9e718f_JaffaCakes118.html
-
Size
28KB
-
MD5
bf28ed476b3f786c06f3b8de9f9e718f
-
SHA1
b01297c3c509b74c2313bf7f8873f68da64e4c2c
-
SHA256
8d74127fa52a9e99b7f6abe4a3a81e23c7340db2f4cc12fd20d9e7fe30f1f339
-
SHA512
119166f3d16f00ddafd3ddca5b6c8af11ec0805a4299aa2502201cf2b8ee3646cd8b7c61fdb7081e4dcf290a382f5d482d2e70fac6fca5c1925151eab2f0c5d5
-
SSDEEP
192:uWzbbb5nH8tnQjxn5Q/fnQieWNndnQOkEntZVnQTbnlnQYXCsAtaE/WcwqHAf6QK:XQ/CPg4pg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A1260611-6242-11EF-AF9A-46D787DB8171} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430684246" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1300 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1300 iexplore.exe 1300 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1300 wrote to memory of 2440 1300 iexplore.exe 30 PID 1300 wrote to memory of 2440 1300 iexplore.exe 30 PID 1300 wrote to memory of 2440 1300 iexplore.exe 30 PID 1300 wrote to memory of 2440 1300 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bf28ed476b3f786c06f3b8de9f9e718f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1300 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5059b93209d7cad9238bc3ce3e5e2378e
SHA145ed5981a4baf6a9b732fdeaa6bb2f3c75f55ba7
SHA256853854fe9f5b175d83c0bf9be9592e0864d98261e1be147dd70cd2f5e7d17ac9
SHA512ba8cd513b6dcbced3bec0cb36b2da6149f1bc53b01bb18e9e48e4b7abfde4215fb63e4a5c0418cac0f9f675b6458381730cdaac74ebf9a06111a60223c4f3eb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d479f046bf38f2abebc90d6f5cd9a17
SHA1db5c57e5c82346c32c7c1998649bdf8726df8e10
SHA2563e6a6be1d4db54f0ef90b54ff7cd71764ed8fc721d0e25e72cec9aeece82a56f
SHA512631788f343af9c76e66594bedb9edc0864aee9754cba21239a41c2afcf107e47a0dc6cf74eaadab2bfc284e27ade69ef53111629b9e23c42102a3762fd27fe2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57888870e205046bf652f64c1b4ddd582
SHA1bacf190384e7e6b94972938c2248b060ddba57b2
SHA256183107d0301bb4087d131542045f6c72af2a8640168db4d17ab951fa2736d3bd
SHA5126d52b5fe4255ac2a29c51fa1f6f847e2ca8818a26fbf70d7f3bb27754d5db8e5d09c85b041419a4ce516206e912ca4b2d9127a30c3c12c3f0a2e70f2df7f8e88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7c2990821c0c0158c3ea534b13d3462
SHA12be37f8a72c74bdf965970cb610887dc2ace90ee
SHA256fd38aa7c39952b1dea541f6204a2a639666cef9dece1e224ae186dc1f746fdb1
SHA51251bebbc160e4d0491270b736ef17a1b84bf40f98ca2d7735e9433a4a7bbd7bc7ba3907bb5fa9e1279af4df40f78739594012e173a341bcc3cd52863f78b30cab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517dae92b034951d381d19fb6ba711020
SHA120b24c2046378d545970de564e58b5afee198f46
SHA2565ff818c14f8821c2a3bdeca2b043fff555325874ef3a9c5c994c664a14b0c7d8
SHA512f4e60b503ed1969d7cc8bc545d57cce4132383608f38bf280c4637bc404891101880942b8a497c2a46befd0136fbb032427d6eedeca7c261bf78babd83a73fcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d70429371f8dfa273a0f6dd3a1ab33fc
SHA18b425a5bf5a115546f19d96f86e3d5b8fb297779
SHA256501cf21c84666195995228e2dbccf68bd8a6ff165a3ea3ddf5ec52d5ce3c7ac2
SHA5129b6105342a3b218efb49defeb736d133b4df07f88640a6d7e101a2b45867eb9c924735e968ad389943239eaacac3f55e5b98e7bcf76e25ddfbbcf3daf221168c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acda3d65dd8ef54024a3902b5d1413f4
SHA1f7a66059576a712d849326490add82a7882fc520
SHA256d69f4443c012819117ce625dd033e01110ce4d007151e26416ca212daea8a391
SHA512805177886b760fd8355eb3cfe3465e3cd97bef6aff7438e890ce0a9a190d93a257b9e04540990480c167963e32063839d9a9d6a04e2a959a7ed3afe04bc67ba5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517a442c1c81f32c9101c280d70cd68c2
SHA13804f63dce2934d8774bba10fef0b0a52b7f4229
SHA2566f8fea92730de942b8dee1e6b1be692e951006071ee51a8b1186866d95193d42
SHA512b7d3e5270314648fca7f91a7c329ce90c8f84c78f18dacb9399f768c951cd7b8a2044ae80f1436d67e3b253a2e8c8a1e663f5b2450d97edec9fdef09f2eda0d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b2d99691d5caa7d9d8e01913ac4982d
SHA14a1093083fc4ae27600b2bb0a388a0d6187a4cef
SHA25652f3aca65909ac4a246c999f7564957f744e8efe9d5aedd23ed65f11642c7638
SHA512eadd33b6aa4be2b113a3656c99b0f6c84ceee667b9845fb75588f3e0c407cbe3109e485eba8082869b8aa0e5ea1996f8b3a88f9352b6311081a3c2b82115a6ac
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b