Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 02:55
Static task
static1
Behavioral task
behavioral1
Sample
c81c40aa8cf3a72bbef61c182677d623_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c81c40aa8cf3a72bbef61c182677d623_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c81c40aa8cf3a72bbef61c182677d623_JaffaCakes118.html
-
Size
218KB
-
MD5
c81c40aa8cf3a72bbef61c182677d623
-
SHA1
5234def8b03c1f0a678f89258819fb6ea8cee38c
-
SHA256
5bf2d2bd66491bda1c045828c361e1b3079bbcda052efe6495c357e1d408f0dc
-
SHA512
d8578cf5f98bc664acf92f82808b2c36bea466f18a68d380ccd3f48255f74196657fc73a03a54c8326f88b9fd812abcaaeeb60b144b6ad3d0e4de667d7aba642
-
SSDEEP
3072:SS7xc9QgdXEL7myfkMY+BES09JXAnyrZalI+YQ:SS7qQgY3sMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{29DBF601-65B2-11EF-AB78-F235D470040A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431062003" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1356 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1356 iexplore.exe 1356 iexplore.exe 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE 1668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1356 wrote to memory of 1668 1356 iexplore.exe 30 PID 1356 wrote to memory of 1668 1356 iexplore.exe 30 PID 1356 wrote to memory of 1668 1356 iexplore.exe 30 PID 1356 wrote to memory of 1668 1356 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c81c40aa8cf3a72bbef61c182677d623_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1356 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5433fb7ee3d45fa0d137af01dda9c592f
SHA1350bd0cec37f40e62ab6b5483979ed8008243361
SHA256ea914e52b4f16742a725dd8397d67c01c2c204bb37725643634c3f142fc473fa
SHA5127b8a8e715e33d88d2bf2dada41d9061b95d2098fff0f7b91df429191ad60d49e8305496593164115571055f477b0a56fc255607886cd912b6b512dd43626eb30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dac9c0ba570d410a0b1ff627b3c2e94f
SHA17473a34c7d99bf7a4a86d8245b5a8ce89f855b99
SHA256f36803bcf7e11e3524e8ea8dedf51ad15dc49bcb17d0e301d1e1ce52dce830cb
SHA51291c198e95a577dd3dafcaa85c36815ef7f0276ded14b82f4087c195c548a57df2d05ab7b0b6562bf666f34ddd6ac27ea6185fbf841f73538c39cc8e513dcbaff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578e61a4bfd6ade3c33ad5be727decc3e
SHA1845618b5841fecaf78c6171e04c5e9ff4025edd8
SHA25626db7ec71bb4553d75e7e82ee9d7bf3f3f43f90f40628552cc153d6b00c4bb6e
SHA512f8d47968916de68e7eb59ef8ba4b3fede4c265f3d96b72180a12a438ae0f7fe188a893ec216afe2f4d5dcf42a1e3792c8caa7bdbfbbd79dbdab717ceecef36d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5492aaaf19fc7b40bb18b3f81faf0a105
SHA19189c12b4c54490009fe70d88032c72d870b92cf
SHA256e84994048b4042b07c3fd89e4bc4d908f9dd23086fc381bd37d8db73526efb43
SHA5121b245e74f553f897e6f6917e1380bd58787aa5b8fd089407e91d8d9b67b7ceddb8b3d8e264d00d4f5851f333d684680446065589c5acb873b48a66f9f9a420d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db4431aba56e4f83dd0639bbe225211d
SHA1c99d2e5aa54b5dd0d6bed1f476c7a6166ff10581
SHA25683e0d7c0bb640bf6c1029860bd89880b145771fa8e11f279d538247bce186ed6
SHA51298e80cb0b137f6a32d073310d38c0f3e2d7f1446af1077b4cfc2ceeed099ae466d34ab551ef33dd3f1da0b1f6e30826e4ecd2c4c42bbdfb3c8ac99750fdcaf3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bbde28dd532ea175bb69b4b35e3825f
SHA1c09a3af388108d3c55d8761c4d51dfc3bb73fa2a
SHA25694aa5dc4583d326341857f9f6474c30aedae3c7e2b155d5045ec42a7ab242ca1
SHA512dd4e831e21a67cca62364eb89bff1de781cf12d00683a49b7759a16f7cd850dc9aadb59ca893caca06178b67ed67c0058bb05dcd9349119d9c5e0780548e72e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54708fc773f86f37d1cab9fec4c7ba002
SHA1d72bdc589c7cfa05af00f5eabad613c7e16ea0eb
SHA256edb28b10cc730122dfe287ba400f760932996a6d57e0bb7b270c75cda50a5e5f
SHA5123245b472010f9e291274c0c8424b817d688e350d5220443fae77e906be784585da5f901a3ae46210c2dbf75105decdcc6db6aaaf46ac208d0fe24dc97a421bea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3b1a20d014fc4b6c7cf45cea8081796
SHA110d27c05d5eb7802cfeb6516b0dd9ca177595074
SHA25612d05da75f6303a5f9b9a68292601f76b765991e37eef78a185c8a94cb5116cf
SHA512b546e5631f3c7b0407f8b9fcc5f8c5d3e7fe03df73cd0c4cde3e982c6bb49ddeafe7206701f1b747dc9d22e0ea4abdb894b778581bf51e9573b7658f9b2eb0c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0c1d968c26da29d655a158e9aae28a5
SHA16131379cd9a6d7e208febbfa560a4fb9c7879718
SHA2567c780468394b890b469878c8f0d158061170b2502d3ca6839ae8c4af598cf863
SHA512a2163f19b46ea16c5b8cc0cea12a65e357169cf1fce565fcb16d580199a06d90a8c206c6170a2128119f47a6b37217e069a71cb51d6377b1c691b813d068607d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b