Analysis
-
max time kernel
132s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-08-2024 10:25
Static task
static1
Behavioral task
behavioral1
Sample
c0893efb63429b1c0b0ddce14f856332_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c0893efb63429b1c0b0ddce14f856332_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c0893efb63429b1c0b0ddce14f856332_JaffaCakes118.html
-
Size
27KB
-
MD5
c0893efb63429b1c0b0ddce14f856332
-
SHA1
a2949e856bed5199be3356fa829e7f4d3a0c8ee0
-
SHA256
ecb2e8dc97407574404afd4a1b7245455165b72ef214897336b46919ac86df92
-
SHA512
025840c2fc867babf44946ffcac215df2f45ec64aee2a1934359d1dac9b275a5a6c747c11f629187a9e44fca4798d0dac3b44dff091031bfb543bccf55c704a8
-
SSDEEP
192:uwTCYP9x+LZBb5nYLCYGeRejVF6vz7nQjxn5Q/6FnQieekNnZEXnQOkEntE5Nyn1:iQ/oIf6noSDsU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4C2DDFE1-62CC-11EF-ACC7-DA2B18D38280} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430743375" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2488 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2488 iexplore.exe 2488 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2052 2488 iexplore.exe 30 PID 2488 wrote to memory of 2052 2488 iexplore.exe 30 PID 2488 wrote to memory of 2052 2488 iexplore.exe 30 PID 2488 wrote to memory of 2052 2488 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c0893efb63429b1c0b0ddce14f856332_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f33ce95574cf899f98e901c72b38ef96
SHA10175532e7084f57bb4c8a0ec126e200acfb611a0
SHA256b23992402c95c24420558d73bb0f04bdd6f89eaebd298cb37e8ee7c8b9ea157b
SHA512b0c95ecdeb4f596ad5b3f1234cd66fc4fd0116dc0922c61275d56cd7c545a13939dc47532174b6a4543e53fb303e7e5a78a1abd873ba8d5718eefeb30fdc407f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5928a830f5e26fe53e40d5d079c7bbde9
SHA1d36c8ae5b9c6d350ecb6bdcdc7af7f8c88b151b5
SHA25642f5f47f98289555ac3b2243d8cbcd5de539650f4601c4f3d9bbb8b8a61e5b2b
SHA512dfdd2e817273b3fe041d05b0c3f8de8ac72e7a17e2a49451cacba09a657289dec18c39a41d0e75d53c66417c54c1a99dfe531935621802694788e07655e747dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50528c1cc03484e582a98880f035afb93
SHA18a835e45c38eace1cd8c8b9684bb8c61ed7279a9
SHA256c8dd25df43cf78bf46b4f7a8d7ec2141a241b8576da4d3f4afd464efeb84ea83
SHA512722592db9016d1548156f01cc3320621fe3562e69ea30cabd222c5c3dfaba64eb75bffcf1b5400a4f76a7a20b6edfe9fdb1cb0bb7bdfcb0a4e54f217196a598c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cccda4d418ca139d3a0e734527936bd
SHA16ff98e56a6dab1c0b9ea976dacc144a0936d3a4f
SHA25693ddd52979fa241edc93b25e777df02cb3f9e9fc6171686d4203c03ed6745c39
SHA5122cf8f3caa6434fca6970681547e0e28fac2f4f63ba1149660566f621275cc22e12c817ff3da666f6d7d902a9831f5cb05b60ffa37c662c925f3b8b7e6afd1f6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51351434c4586bff30134d65899892d5b
SHA1c90eebbd20845953bf22e0c064451313328494fb
SHA2565bc334f01fb0a291fab8e2222c0f7c8192350b764a1dc1136c21b6302328f827
SHA512882ac66a787297c73d730a91c207922c1b2d2c1c36ba4d7df19c8835f22fcb2387dce8e841edae8e9c753f81a2f2c1b044fa5423755f36a47f6c5402e5359d6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9f77a6a1ab91743c9881ed66a19dacb
SHA1eedd09ec49ef8e86246c2e2cd2df2db358c5ccd6
SHA2562c63c4a644b0c2be03e3e64c96f2b9b0c4f1da2496ca293c5aebefb50f7a574e
SHA5125e38fe51def454cd68ff26c9221d15ce4c744d30cf8cc2d3ff4d4c016d565fefc8ed873a1300d723b58df180ad83d132f08bdbf090d10ae1dbede5a7db00a616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bd3c41a05892cea9ca9771dd157eedc
SHA1d2e6a5f998ba585a8f51c00f14b87bb5e038a4da
SHA256d793525a716bc29fc2d11cfe645a885a5b7ed16531f73d15a180a712aa6c1b7d
SHA5126cae75c6e9107c45fb100d044a21fbdb26389c5221199a71d6f1858b36128ffbf82a4b0d5411b8a34a98f4ff154ac88ed921019b473bcad9216846c22611b82b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58418ba2763d1d12cced8ddada4f5e2e0
SHA1080448fc1bcdaee3b7e5e34271590750be6e916c
SHA256217a7e1a553d538f09de1a8a595e81d092ffbdcf94df7287f2e113314652cabb
SHA512707bd763303f52a09ddfb957c02c9cd52e6b72cb6f28ccb67ec2aa0fc21487419b804c05d41aff2a5efd64d556ebc7a2ed5d4d351475bfc1fd58df3d7a580f7f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b