Analysis
-
max time kernel
131s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 08:53
Static task
static1
Behavioral task
behavioral1
Sample
c0614479d00db5dd42b86eb4c2ac2ef6_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c0614479d00db5dd42b86eb4c2ac2ef6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c0614479d00db5dd42b86eb4c2ac2ef6_JaffaCakes118.html
-
Size
26KB
-
MD5
c0614479d00db5dd42b86eb4c2ac2ef6
-
SHA1
b043d2f67181b069374e3d4b77718748f12761f9
-
SHA256
0f9ac3f460ed97a39a5c721bef8b8c26f69132f83d7d8fdc73b3674d848ea4e5
-
SHA512
1b50dc30f5d0fd0ff5eae3be2a2b8b53f5a792459724df66bf8090b06eb8882267d232a7131445abc5b7567ad07e325c723433a795d89c8efe078a967542a4d5
-
SSDEEP
192:uqlSLT2b5nYSXnQjxn5Q//nQieGNnUnQOkEnth9nQTbnVnQUCJVevo7NtBFo+Nzl:nlYQ/RygcyEEN0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430737899" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8CD3C0D1-62BF-11EF-9CB8-C278C12D1CB0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2120 iexplore.exe 2120 iexplore.exe 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2296 2120 iexplore.exe 30 PID 2120 wrote to memory of 2296 2120 iexplore.exe 30 PID 2120 wrote to memory of 2296 2120 iexplore.exe 30 PID 2120 wrote to memory of 2296 2120 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c0614479d00db5dd42b86eb4c2ac2ef6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD512273404d3ea4ff25782656ab5df174e
SHA1e1526af9432e06f9c6111ca61c56958e01957817
SHA2569cfee75e342f46e93e8bf54debb35a683b777568a67a04f2a9b392f42c6844bb
SHA512e8b65a29e8f76eac6cb4eb0868743a7890b4212ada572c2d4f515793038d1beca81b3510ee90baf972974d21a531741d10004028a3059a214d424eac9138b3c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bc1eccad0169af0b85094f075501001b
SHA19cb39c1964473fc9aade815b17bf33d044ef735c
SHA2562b6c501d756ad1f0db673ac16ddb2ddc1cf2a1c9f30eb8abae00c0b4cd285f40
SHA5122278f346b197639841e3905c9ffe7c5579a0bcda140c799b9e0957b8963174f7aa6c191f01d8d9e1f37661ceb3d0cd3a2beedcb7dbeb5771651432fa572c98f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55788e263e7ce153da59f23c03b2176b6
SHA142064d31a2c8423995935be8cf3eec4ce6feb139
SHA2560fa8aea05644b6e19f858d389b8da93fd4baf8b056a0cd4c003b8d406e386045
SHA512854fe6447a85eb6bde0711876777c8acfbf9c27d0a346b3c89329d0ad1bfc1a372945de86a2ad886c696d8f493e776aebc5ffcae6472c601f929b1d82556e431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD549a18604cd9c5fffdd92c30e7f2bd1bd
SHA12cc6574a918e1b1d822b799e7fc3cb927985294a
SHA256174783281d585b3b14fc62e8063d84efdabf8c6d6de1847bc5e1df3d656e9741
SHA51276021554bbb050ec76e0834e9c481445d029b03d098879c04367677d63e185d5f33e8e2b7617d7bcbe8440e300a0513870b39248d2fa889f6330a01ef8a5bfac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f54a23bd5973ecc83238c468e8f6348e
SHA1a96c41e66ad005ea53364a80f850730c77352d69
SHA25665eeaae08529602f6f8c9b9a28f7cf2a1779384c03843501f062621d55f3628e
SHA5127b03c0b22bae7a94478a2654f83ee144baa42b7734257fddcb01de93c63d43c488bf39749aa8fd2d400213c3e351be78f41b8eb2e1c4a071971b3deb6706248b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50efd2868c12313e47fe4b3377fd78fe7
SHA11497a2db19a1d7dc26960431f6b6c8662af9e0aa
SHA2566e318e66362fb988418d4bfc8312a03995383e4dd2bb44382e9dc5a61fa0a18c
SHA512b01008f3e061a40abc6f9d2e0ec66a19bb61eaf7f80060cd3756d58f21f3c47c861efcb8e3743ea19ba7aa713236b6df20cf5edff2b6168cd1e29c0abf14bed7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fc0a499a2da01cb829db2f81022a46c0
SHA12b4f49066a63405f3b3d03673a02130ee3842734
SHA256895fbd887db296e29c8a68442d31ebe909e4a551f05d23e23de47ea2c4587859
SHA512713e17b2d46cf21cc59c43f92901fe287b9072af369a76620b67d21252986fd79cbd17fcc6cd1e06c49053d1f9bde5ea14d544feb6944d31802b6c94dcb9c2cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cf84507dbd1f06317ab1b8e7c79e28cc
SHA199fe51480873aee3f3f3d63533ecf9ec8da42fc9
SHA256a1d22affb8983be49a297e822f2b88737ca0d4ad3f3df2a220629fd238e141be
SHA512fea99966b7fff02da33be9479c3e35b9fcc6161d1d5b2532d3cddc3794d90e18f0a264f90f9b8416177c29837f5c68557db8d5142935bb7c27cb3370fb274305
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b