Analysis
-
max time kernel
135s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-08-2024 03:00
Static task
static1
Behavioral task
behavioral1
Sample
c226ca3b9c75c815760bc9cad76cd708_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c226ca3b9c75c815760bc9cad76cd708_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c226ca3b9c75c815760bc9cad76cd708_JaffaCakes118.html
-
Size
29KB
-
MD5
c226ca3b9c75c815760bc9cad76cd708
-
SHA1
eabb563cf0e08390ae4a2219c9f520552d8f2771
-
SHA256
54fdd94814b27b6de6e235beb33e3f389df6cd18f23540c795def96b56162ee4
-
SHA512
c9246a53df21a1bd760d2591ee9f1219a6dcd7650f85a3c3bac1580c750d11e055d9ce91516d14060d6613b4b2511b433b223817720851cf5998cf99bb079ca9
-
SSDEEP
192:uWLbb5nmpnQjxn5Q/RnQieENn2Q5nQOkEntfjnQTbnRnQNMCNApH+OhgamdMZR9w:LQ/AQ9XC1xZ7BLP9Qjfkisc3Ok
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5947C8E1-6357-11EF-A205-6AA0EDE5A32F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430803097" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1724 iexplore.exe 1724 iexplore.exe 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1028 1724 iexplore.exe 30 PID 1724 wrote to memory of 1028 1724 iexplore.exe 30 PID 1724 wrote to memory of 1028 1724 iexplore.exe 30 PID 1724 wrote to memory of 1028 1724 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c226ca3b9c75c815760bc9cad76cd708_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b57fac3b230dfb44b2765860bb022c9a
SHA128115e4f0640e12a5c34c91226ea7c73eb70802a
SHA256eec7213072352c90c0c3ff2bd3adc057f2eee97971435edb9b77179603dd69f7
SHA512ebaf3b70cf930c0df5024774ffbcb3677aa7c405e216edf89b6fe56fdf3230cf6f5bb1483f2bd2900d6b33ab5a6255f4a8741b4444a0a93b657844d0306cd437
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545754e43cac2a8f86d81e4dda38be23e
SHA1724396c2e26418023d15e786a150e402d9dfa310
SHA256cea593915d5a2642ac696feecd52f516410cf5bea8048eb16915add846b3b71e
SHA51208344b48c74d8dd2f28c565cf859928e87c629b476e57affbe5fb59e30c58790d2a26d5fa7962e4c78e53749d3b1bcd022d4a4942db9617add507931fbb2ecec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56440bd4be6bf093539c8cb0bccec9a77
SHA164d6ed0d01766070e8050176df484f62a177cd1f
SHA25664b5ccbde4dcd72a98fc7ac5b87c70f80f9a8ff19db74162684a3a7d50e44aad
SHA5129d7090c06e151ac3f5a5db66aefdaa3342ea0a3e4e9238c3d035c81fce044a4706ed51d9605529988042b30c584e712caa73aaef1300529f98590d93f53a882b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5459dec82e6b545c74ea60c19e76718e0
SHA1acd3feed0ede6a8ad30bdd609c64c31117e8fa33
SHA256a90360d149a4edd1be3be37c4148f6aa0b3e8722b6d22e96b7ca574fc54f85a4
SHA5124bf655840ca172004196903156bf014c9568680bc406d6df54ee4b70d19717a3d437566d3db1eb5c60d96fe6f72481a00815a50ee37662187c8d477f9ba41198
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58df7055860b8ee00c26939612e7c53da
SHA12ef5e10b70da6098d3c5a34abea132e61c47d932
SHA2564022467d3862f2db7b0049693752e2b71bed46edd5e8a6322b80911b02a5b648
SHA512362aacdedcc70833c2920139d062d794a0c1700c101a15b5bb197c38e867a6249a542cb59feff4b872c6fbaa441adf308e213c1cab525303c043ced9f3fc4912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d64540d9adfcaf5e1b2e52fa8073c53
SHA11f2706fe1c8cb2f7b21fe64722e3f6fb20a905a7
SHA256ccc86897615a99d870c16ae27297299c2f91f1d780925ed929a3782bb8ab253a
SHA512011f50ff87ddba174f0a06c8655f658f864c7b7c847826f40d0728c21c5424471234a8eb99855285511e7e516f1a0be5e7a47fef1305c2dbb5b7337b4a495595
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54679a4f1d77a9be4cb3fd9c6ddb0eed3
SHA1c532942bfa8667333e210868037cf84197f47c09
SHA25664b0f7e20e0a7a6559a69eb93237fa3bd5e1bbbf96103f15914f2495ce3e217c
SHA51253975f822cd63fa5cbc80b98bb1c2128c649b78102ef8e68f1da902f66028db9d84c2a0e363d5f53226bc423fa271e9d2554447371f6ede9d4144be1c1460361
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b