Analysis
-
max time kernel
132s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 03:39
Static task
static1
Behavioral task
behavioral1
Sample
c82b1d5df07c1a6c0bd38b4528d4f54e_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c82b1d5df07c1a6c0bd38b4528d4f54e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c82b1d5df07c1a6c0bd38b4528d4f54e_JaffaCakes118.html
-
Size
34KB
-
MD5
c82b1d5df07c1a6c0bd38b4528d4f54e
-
SHA1
3a497a47832eb0013ca64491eff9fd12e2a44318
-
SHA256
5498b10118e8fd8fb80b9dc98aac793d7ef29a039aed89e6221f9867f78c7bcd
-
SHA512
d17a0c160da5e3d3c3a4449849f300a6ffdf7e8af81c96060f11fe52e760cfd6edaf0365035da6a4070feb23c167438407a790ac2f88f3a3eb54aa6036f002cd
-
SSDEEP
192:uwyxPUv8TBcCjb5npINntBytOiqtQtnYUhnQjxn5Q/XXnQie7yNnzb8nQOkEntlz:KUQUQ/7TuI5ouOtKUB73Dwot
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431064643" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4F6BA041-65B8-11EF-BDC5-D61F2295B977} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 600 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 600 iexplore.exe 600 iexplore.exe 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 600 wrote to memory of 2520 600 iexplore.exe 30 PID 600 wrote to memory of 2520 600 iexplore.exe 30 PID 600 wrote to memory of 2520 600 iexplore.exe 30 PID 600 wrote to memory of 2520 600 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c82b1d5df07c1a6c0bd38b4528d4f54e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:600 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:600 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD573729b2962f3ced80de2d955b03f4a68
SHA1608662eb7e43212f7278d54f9c1295e5b64f0123
SHA256b2aafa1bd5dc1f117aa912dadbab13d7b8b41d5d4382dc75fee0c281467329a3
SHA5127f040e313ef0911bad107b71dc0a4d42fd1fc98e8314564eb5d7dd3a4059d65388c968ff3c765eb629d94e65c453c20cacd3c5a81eb346769e11989a2ee7e6ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e687de5c8f9fc4c3efde82d71180c783
SHA1478031c59127e71886bf0eddcf71f5ca446afbdb
SHA256b69a51c7b5f884fb736a44c74f30631284b87da13890b3487195d621496a1b4b
SHA5127c3cdc19c2c5ee9f9dbbbd8aac2eeb91ea16f36fbe853769f6f78239126cda2062a84e34af9ef559d95430c55139a84b32847ba46189cc76517b089ba4f3b8d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5772fb4919b5e5dade455790e2c0f208e
SHA1957fe6ffa48f3f1a277c0ee540db6608aaf1fc81
SHA256bcd560220f2ee62504ab1c34f834c1473026d9bec2798d2264ea6e3113daefea
SHA512eb375675325f69872bb730aaf900211d5da5e5cffcdbb618af5cd502f2403322912857aea14401ba232e32466f03aca2258692e39281ce54264bedf6718d476f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58249647bc3654a18f5629824b094fbcd
SHA1c31aa6eecd273143784225c37151b229431f6c5f
SHA25680f7f4f69b2a1f7012bff41979412569fb43664ae7d4dc2fed3f2e87e604f0a0
SHA512aa7534980e66ab5665183da35e4a381810992ac7914d00911178087875ae9b03f8a9ebf6157092a9001c5daa14d8e7484706ca39eb2e7b578b39987545e5744a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD585bf7162e38c6f6f670cafd5139198ba
SHA16eaa704191f5794534d60f8f4e04a5d70b8cfdc5
SHA256d93af702a5ff86861e6f9ce5fdca51d4a68e7cfddb2458dc6f365a1b8afb39ed
SHA51241e401e6653d7b1a88bfe6c5ed1be1092aa9a6a9fd9b2cb5db6d672bf25d9562e097ed0988fc48a497c68ad052bdaaee01f7400fbcd8cc008df60e6d213ac1ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56718567e494fee1df9004fc50069f3d0
SHA1f2c7ab84e3d254418c2cb3e189f1eed5653fe846
SHA25609f6f5bdc40a0d816a276a02812a210c078508100c838e4c5ed3fb99dcc540b8
SHA5125a3841c112058c8d32f4f4279492bf74bbb13e2d2618842287a017e965a267efeeb0bd0b02829e08449ad8d72abd9d6b4a81b75d1cf5f063dffbabcca0bd00f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cb376d9a59a349cd5a1287c192593617
SHA12d24da71a3e18ab0d4ec9d78609fb696ec24abd7
SHA25605f99db94699a7bc4e33a275b1021310c592971146fd35aabdfe59cc27e7b778
SHA5121ddb29f0ce2f289dcb16cdbffa3a370d8b1ccc85b8a79961a44760fd23345feb6669f1c057ceb684911eb7e7740c85fa7613c755fed11dbf5a5c5c699b115f0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD541cfa2549458f484f4541f6ff2d09486
SHA1807c268f339c1df75f1082339dbbd7674bf6a0e8
SHA256628779b8516044079f57b1bcda9a04ccac655c1515c920588d673fbaff71e42b
SHA512ecce346fb13b1483825f0cf595ff196ef2b43f42681d48f64f4fb08fc6f33cf9f766ed098a92140d1f0047497488a0845878aad3730702223521d49a9d8d2dc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e8627c92de7ee423f56f749d53b485ef
SHA15cace6af4471690316023f53202068e321a453f7
SHA2566b942f0bf036dc86d4c39f94d0f83a034005fbdde988e56584afe14a178038ab
SHA5126322f85337f9d7b660c221752b1adcaa8587220ed9f274050261de296c4f9e3c6e954d33b2ce1b82c6fa721fb3ab1676e37f4a1ef2d26bbc4cc9070db9c413ab
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b