Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 09:16
Static task
static1
Behavioral task
behavioral1
Sample
c88b8efc94547e652fd0367a331775b5_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c88b8efc94547e652fd0367a331775b5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c88b8efc94547e652fd0367a331775b5_JaffaCakes118.html
-
Size
23KB
-
MD5
c88b8efc94547e652fd0367a331775b5
-
SHA1
5259c4474375765674bfdf5813bb24c9075cc7b7
-
SHA256
9fbd53933548e03206d046855bf2ab6bacba45cac52d114d09627402c50d96e5
-
SHA512
ef4a9d0bae6becffbf39da0dafdf0f71f6aff4ec245bba6f7fa3b8860d9bb883407379716d92d48ab22408a69c4146b954df1294671fc5d012927b24cd376a43
-
SSDEEP
192:uwPFb5n7enQjxn5Q/inQiexNn2/AnQOkEnt+MnQTbn88nQgGLnLnQtBqMBRqnYnp:7Q/s/vGSLF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431084865" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{64AB7E11-65E7-11EF-9889-CE397B957442} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2756 iexplore.exe 2756 iexplore.exe 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2972 2756 iexplore.exe 30 PID 2756 wrote to memory of 2972 2756 iexplore.exe 30 PID 2756 wrote to memory of 2972 2756 iexplore.exe 30 PID 2756 wrote to memory of 2972 2756 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c88b8efc94547e652fd0367a331775b5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2756 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543ba40210e69cf7a3dbb92892e95f06c
SHA10f45863deebf7701132a16a01edb7e4ff3d8e63c
SHA256d80f7736f544c5c0a840c9c07a9ec2abb6b66fbed6d4e6031fc5ce90e0d3c961
SHA512106fb178be7a78e72b5dad968dce29c8f1ba4abf69cbecda9424a8a7ff5599364b2293066e097ee04e710f9b70d1e8cc21d7b8847c08c81b38d8377b8b781ac7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa411dcfe35ec7b3846e0fbaf053b2f0
SHA1b8b3bec674bb766158e6029c78d1dbcb5db9de1a
SHA25622d2b9de310f7cab6e73f2d9138126e525dec3eccf0754a258e63d58238b65d5
SHA512fc7d0695f625b8f7f2ca5c4ffb5cc3b759ab70eed648189a082aff7936063f59a64e4ef7e40a104cbe233149073326cfb6fb383d18b3742a3c4bcad667e4363d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517109a7fa8f3bc2383655b53a6617a3b
SHA14f4b17e55118f93df1ab67f17164b8fbaa9e0194
SHA256277bc80d5179e9d36d4e1476cfc1f23d49a383f18ace6617ba73af936ff547ac
SHA5122736fc5ad7b4347a43fc9cbf11a1cc3efcc249902e79fe80c9bc984ada77a7a72c388098f34626161902a1c5921a891bb9dc8f0b7c3eb3217c97f7751f740fcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592c0297c16c23148d4978dd38f1c8e6a
SHA10ba10bf040f34a404a66bf4d0e08bc8c70dc73f9
SHA2560f7d7bf22f2bf82794231e0d1139f739febf79697c789e6332c7e3e236ae353c
SHA5123a49962986ce051f5c21ec5c7f58e49df6c3498e4e822ab09093bd1653b7f8c6f1b36c960a618c99c5828fcf584509653e3850689dca27355db57da4fbe3460f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a460b374955e2f78d3246c794e02ce02
SHA11efeaba8bb6321deb55d2b7895f6e5b51cf4ee44
SHA25680302bfba1eb826409aefb9e3257d73b846f2ef7e293af6f7c6520036a398170
SHA5126acbce7e7957f6337b2db6df36429b920ca8618d3d50d2d0f5368c089f5fc7af0d77d22a5b165c38f89d15c6f3e0610cff534016881b6224d6f0c646395bdf29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eed9185818c83ad2073224ad61c9d16
SHA161acbe9dc7f285feedf820b9ce7b117df47607a3
SHA256057a35c2fa7f5669828bdcde1070299648ca61f9ae6f44731940aa0906e5e818
SHA512ebaf7866a754d2eec10e7661e4116c3bdfef3d85f1b4d32ffca9d3ec1cd85f6116a291e193c3a49c2ebec98167197334113e57ef4f463894e989ed47db2e4df8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57339d1287ecd8ae54cfbfe2589cf7732
SHA1da1a34cf0bb9d4947fdb829f1022a2f5db336f0b
SHA256415c6a1336ad5224d9666df1aec0bc0cfffa2852ae0c6a0966081a44ee9ec253
SHA5120fa8d8c3ed6052539ee868bcc149cd26c67bb1a4daaac9ca801f1027af7fda5956a279d21436fed157ce1e17b744bab23a3580d598cab98cc766c210a3375d76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d74ecfc17ef0def52c3156abd68df97
SHA1594173cfe153868c75c5be4d2df68533a7227ea0
SHA256f7a608cf06c52c43cf32e4521a6a12ac6a0d6a5da08015af54de67a536c83847
SHA5124173fa9b909aa93599b13339de20290b411d9a96edd878f021dc6fd2ebd002205f6d67a4a957bfcafa00ce56c6692b1d190c7008eabbb7560470a3d732f9b6bb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b