Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 19:38
Static task
static1
Behavioral task
behavioral1
Sample
c97f50408b4896253e960d893aa4fd4e_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c97f50408b4896253e960d893aa4fd4e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c97f50408b4896253e960d893aa4fd4e_JaffaCakes118.html
-
Size
8KB
-
MD5
c97f50408b4896253e960d893aa4fd4e
-
SHA1
7e213bfc80d1d6339e2469452acccca717dec96d
-
SHA256
6b99b282934e707868c777a5ffd5d42ba993c966a9d5b4c7bd471bd798bbcff2
-
SHA512
b5cf6930e344847dc0c3f3e4bb3e2210f0ac3987d198f1052bbff6e64028de58e6388ae00842ce0d2dfcfe2db9434c298537093ffd5734778c8059bb47459c45
-
SSDEEP
192:SIxBLZMtKytuinvmQ3Frd5Xpd5Xje4Ga6:SIxa93xd55d5iJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431122211" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{58A66C91-663E-11EF-A5CE-F62146527E3B} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2672 iexplore.exe 2672 iexplore.exe 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE 2864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2864 2672 iexplore.exe 30 PID 2672 wrote to memory of 2864 2672 iexplore.exe 30 PID 2672 wrote to memory of 2864 2672 iexplore.exe 30 PID 2672 wrote to memory of 2864 2672 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c97f50408b4896253e960d893aa4fd4e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58155ad747d8c1848fa984edc9ddb1bef
SHA154a551ae73e65d9895910a6c092d51e4f7e0b706
SHA2566fb4c52f5a49aebf62cd834112e067a54d6d93577ba13718bcfe4e42904865b3
SHA5125c1414f80657d6e26f138fe94d7b56d4fc20d148cbc686cb31caccf76eb50bf171fa04af9fe5e0b0e857c576e1c9bde1ebac916d44be166e6d70e566cd6c57a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53435ca9b3bb4103e03c5d73391e14bf2
SHA1da6e3ebc6d367e19d742f328cfda2ceb3db1fdde
SHA256985451a925b19c5564354d88d2ae7ce647441fe8106471426f5b9b3af2b9d414
SHA51278b3845183cc58505401364c6c07d005a90e1de23f190b0717e5c405730442b6d8dbf520b553d9af20b4c5bfbb798ddce07b287dc78bec190119d5f8421b3a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3fbc4e2bf1ad3c2d2db31196b7af98c
SHA1a3b7ffa44a7592be7ca4de6351b7c03cdd38d639
SHA256438050a06240b1101a54b758eee26b9ce3647864724f49d1620f7308720250f4
SHA512ed25b5cad23b33d66b7725d313f08521c73199d69eb9148e0c31f94b035ebf1fa02708c34d3c39d3a0e52fd88ca01329964239f8c147651cba1f393654b2667a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbe0bfe63f5a1380630b0aa39d15b5fa
SHA1ba54f363e91774a107a8318b25f1a388b84f0c3e
SHA2562d028da1018fec5f7bc127d7122ebf5d63262debb71462ff39371e609757d56d
SHA5124393152c962f23feebdce36914181d9073b2a1d3ea4ed4fb3d16f751b6f050a12ec1c9f11efbeff73070f8163d440e55b9afe9b6d9ebfb9ff9e732ac80bdef68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe3fc87ee5d5d9896ab6670da16eeac5
SHA187e628e73334feb7fee31da43b9a2f45f1a4aaf1
SHA256baee617ea8e39011628524e27d67943a4133314ec4cc6f9cae25a497c05925f9
SHA5124b4c8c4c0ec0586df1cba4021c1b082fbc2a92643e6ea19070e4492fea793be984f5d2a6ea03b7462aee60e013135ce638aabc25b62df8555b6d0f13c172bef2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f67ba0328f20c914d222004d7dc72047
SHA1b1438ee93b404f8e89195abdd7f52297b64130a5
SHA2567482356367e1730f6cdc2cd10b72c01b21347c0e76f4789e3e786aa54d746612
SHA5120b5e34d6e378da35393076f9432d4543a3c03fe847a83d7e1cfe78dbcdc2d4b34a170adf5f5ef1c3be693d473490a84da925aff9da524b5125eebf0d54e06a32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5674dd42ee58077ffea2a319aceffb636
SHA1066ac1ba3c26ae25cb81e476f129554aec20942f
SHA2562fa400b2dd504184471d17b9578c85618e5b8c2b066f19cfca897b6a606373b5
SHA5129b1f6b73f8cfce8983eab9761c155397f14c163b152f91f19cc9bdbff0295869026e0c3a360b62968bde57e455ca8abae3ce6d7e57663fbb0a470c3030e05859
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb52dbea42dfaeb3179e52befcfcd7d7
SHA13c7e0dbc55860957f1fa165732e4964c9473e6f1
SHA256d2cf343e11aaf8e1cc12a6340ac54fa55c3e7960f36d5536537373a2804dab3c
SHA512ec8adf688fbbf4383d3adcb32f857a6793e70069461dd4ce1dd5095d7b9c45f6794ce6b16a06c2dedc3a3d5ee55f7213bba1d4bd149c351b623ee618d4954cb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546504c65099979a4d86c7ec7996e013c
SHA1a1379f9e1181c922ff5e3481a3ef0532ec91b6f2
SHA25646dd91b60a762b08c2b1b82bc68bba8fd55a9b47ef23a345a0784dc358d03017
SHA5126fa00b898f2660ad6faf02a1615a17952b160de0ea736bce7cf57b1bd3a0703b076186646f23019a5ecf09022f9a95fcc317d4682fab0f3f19829f82d53a77fa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b