Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
c24f87090dec4c8767e739484bc76db7_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c24f87090dec4c8767e739484bc76db7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c24f87090dec4c8767e739484bc76db7_JaffaCakes118.html
-
Size
29KB
-
MD5
c24f87090dec4c8767e739484bc76db7
-
SHA1
f16d1dc42456bf4f6dd86de5182ae4b816028753
-
SHA256
f1459dfc987dd4bcf0ced73481f9088b7e17849dc858a20237d7cdc417003e22
-
SHA512
4b517217ada007b20c24e99130a2b856778652ea492f3f2245b98498c788ca90fc95d04dbf7688a70dbc5668106700c3cc63a147971088534252222b31864540
-
SSDEEP
192:uWT2b5nB/nQjxn5Q/EnQie/NnUnQOkEntQKnQTbnBnQtMCdAkBuz0EA3KSmdHsGM:jQ/QHNXl290e8CaO2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430809511" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{48ED6C21-6366-11EF-9994-C278C12D1CB0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2656 iexplore.exe 2656 iexplore.exe 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2676 2656 iexplore.exe 30 PID 2656 wrote to memory of 2676 2656 iexplore.exe 30 PID 2656 wrote to memory of 2676 2656 iexplore.exe 30 PID 2656 wrote to memory of 2676 2656 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c24f87090dec4c8767e739484bc76db7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2656 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590af4ec35646680d55d88f5ebcf7a6dd
SHA1e4b5801678743ee0834ec84921f94fa73c1e6665
SHA25631c1e5da69dfeaf383635006993efca31dea43f47e4c55249de875e02e21b748
SHA512fbd314b15dd0220dccc639560086bad012346fd037cffb5dc6445e0173855b755565d4db66dd6faee9e33c06015b3f6c0d065b49007b245e5d42283ad133a2a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54137eca62e7014f258649f7b1dd30722
SHA1f7f7b5fe596425ad69966f1e9e363279ee9fe060
SHA256156c3b76ac0ef2a1c16c10371a0075ed9a3f6398ed445f29b997ca809d73abaa
SHA5122f8067dea9098853389cfd25795870b9de2c962cbe8f8af4a8ae8aca457458f3c5b0d7d92de8e4934ef3330393ff755a198e33eb937c11cd1e958194c593a39d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea027ba12be85316c987098748c89a9d
SHA16edaf9a8485021968f98a5f08a08a5783a3d250b
SHA2561935c5c61b3ad1140e11943a322b808adde012cc7028291b9240912b222b847a
SHA512f71327c097467d77f0e7aac3fe930f723893a1ffc44b3d0835ca27794b620bab7a6222d6adaef6ca486aeb470284fd4c8598c602ae5c5b29155777e15a3e792d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c2923bdba467dd909e484dbf87f84db
SHA1d331c25dfaab7e070003d0ccd49d6acbca063669
SHA256e2316b6f156afa6bae74e3efd106f175c7baad8edd8c8a830c1d779fc9e15404
SHA512998524e3314ab8263cee78c58220bc47d4fac1020a788179531c808963d97812e1bf4f8f2413c34355fcbeb8d873d801036378e02596af2a82d2516a97960ba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580d31a5f80dd4f2b96f899a1324fcb6d
SHA10884885840e6f2f5efcea5b027d8a82bd68872f2
SHA2561bd5d711bdbb51bd705dabf97096f64eb0c93880b08a3912f9bd355cac21676a
SHA5123699a9ef958155aaa06625121a232b6642dc69073c9b533e856a568c74cfb300f5f89ac19a7a02b300bf84994d48b30b9e351e53f1d783f60be2f0c16c9acad8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5127c846f8f74f712b0da268f0b4682be
SHA1d9b9baf6ec056ae4badf2c10571eb0c05cfc4bee
SHA256c1a9150c720dd70dc3caa045e6a468460a6f9ea27f3433c901a120321cb0034a
SHA512b0956cc21b18a25c9725778f31548d3e989d3bb921443111707c97351464de3bc745f29908aa45154260ea10dce53061065f49099b4045b57dc5769f7bb92637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcba67eccaf9c8290adc289849b00d45
SHA1a221841c27829b75c81953d34a1ada1d570a7f79
SHA256deed42ab3b4cbb79b6ed09c36e65f6f6b707f8c9deb8b7e57b2229c9939a981f
SHA5128ece20ddce77499f35782ffd3e7f2b2cdb0ddcfd4a8254065f45438d452cee810f00c95783ebc7f9ed27ba71600d74a6dc71935aea42102c2a35a99ed11b7fb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595a81ba19951abce202d5458673f7f98
SHA178ae79a0f0a981970a58c55c668570d7a48c8b56
SHA256929633d2991ff0672756434a88a6db8d3ddeed8905de7adf2f5eb0a255f1b6a0
SHA512c081046255ed523ed990aeaefd2eedb25b4be5c7753a1992880e99ec0e1e0b5a4cb7e05d5a0d100260d6ce027f2cdb8493a617ad43aba7dc942425482787d451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57516a3a375df3cafec82caf78c823be7
SHA1fcd8f9cf0808c25d9c250278e109a22c661b57f0
SHA256310dab81c9ecaa2b45f82f6cbb1dd5c6ea6c57edf0fd0856ae22e71bc237a8e6
SHA5126522036c87c74e54904773ed5e6d56ff899f2c1c43f7fe439c6cce799fb5bba523296fa98ab2cd9d689b0e66fa00b58dd6883f0aee6196b5d3a9091a4739a58e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b