Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 07:47
Static task
static1
Behavioral task
behavioral1
Sample
cf09a29435dbbe8a1b5f493fd3a38be9_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
cf09a29435dbbe8a1b5f493fd3a38be9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf09a29435dbbe8a1b5f493fd3a38be9_JaffaCakes118.html
-
Size
16KB
-
MD5
cf09a29435dbbe8a1b5f493fd3a38be9
-
SHA1
526686ad6cee47161a5a85f1e6bfd56b03364a9d
-
SHA256
3df7e856813770c33914c5e9c69e156d992a062703c27cdbdb6741d8ceb8f809
-
SHA512
244f4865a63c5b6fd5956f0ad5a8e03d128c4c6afa8cc72434ce6473156f9641bcb15267c2604b0a63d08ca745edd1e7d260e940ab7b2826d3c71457b3701e77
-
SSDEEP
384:6QpyVoRJfIG5Q6dFrt21JVY8htxKtLmKOP:zhRJfIG5Q6dF01M8yI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4D47DB41-6C24-11EF-AD31-F6257521C448} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431770732" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2008 iexplore.exe 2008 iexplore.exe 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE 2832 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2832 2008 iexplore.exe 30 PID 2008 wrote to memory of 2832 2008 iexplore.exe 30 PID 2008 wrote to memory of 2832 2008 iexplore.exe 30 PID 2008 wrote to memory of 2832 2008 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cf09a29435dbbe8a1b5f493fd3a38be9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a822e82a5ca8f92b24754c4e7d121ded
SHA1885bd499dba17137020e04ad08cc8380d2409dd3
SHA256c21c651909564a5065fc8c3a985ca7d94bc4267356fdb572860c4cd894d3a297
SHA512e33f38b9e37c0b960847c81e19132b53513cc5f9de333d593d99c44850b0a5ab4c14c6f021704f0639af65a652ce20edbd0476f95bb66e76c4560ca0ff26a1ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d297587b3e64e9335c67fa971310b468
SHA179b30df727c645db26460dcb925f4f4fb83a8f90
SHA256db2077cdcc9acfebf6570f6790f22c82ea66866ce771e1ee90388387054140a4
SHA5124f57083979e43e986bd7e16365a479ad2ff181d202ec261fca1215edb12fb71c48d1efcefd4286a1c5a7dfb6a0a9e60d31968d6dd05790893d8ca00221fe5810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5900bb33e66dedfd410e0222c8ef952ee
SHA1af8c233e3b1bb8fdb07535f20e17bf089429e917
SHA25661b55b0505764bb8cdf127deed2e8bb47173798bf402984ecd4774fa1243d855
SHA51204f71abc77a0db395d93f491eff6c754633b07da4c8857ae000db90176ef30dbdf4b7eb4cbb915c0e7788e038281f5d00b66609f03b7a907b3791dd313684185
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58eb850bc65bfa5aa113a21f091fc2d7c
SHA1db1ba8dc1e29febfa8cec69494bb73f594d083b6
SHA256c4ff579358758a02ed02fc56a09f1d37df9ba0235430c0c19642705c7ffeee37
SHA512dbbca3c95cabeca35941fb0614af887a441bc25db24fe765235c96561dd38516b5632c7ae7d7715ca8147c81844e2bc24ce0f9058ed645c6a6dfee21eb406e2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fe4cefe216f56806453d9fa7b7802d5
SHA1caa4474f0ea1d4636603af7628926bd1e9a7f141
SHA2569799c3a0fe05e6430ec5120aec53ef059c71503c11f50503567bf2fd8e7138d7
SHA5122fad5dedd9e00b8faa2cebb2fcc85cafa82e0b2c23e4e593989691678c70b23ce53d71a2d1ba1fe8369693dc395d1fd74880fb81bb1230c6ecdb0f6b737c138a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8219b10710e9bf3c441c006294eb170
SHA1a4f84b930cb15ddcae02993b025d933af09df0cb
SHA2561412a79be2dc653ef8ad14feebd6985833d5c3dc8553bfa012468058d0c94518
SHA5122bdb2daa3a37ef055ab1becf1a90b3494653f16360b9dd6bc9896575ba4a06edf5eaed739c3bca0189bf1ae5de68bb3c45dd892b8e0be05c1a714c4da2986389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5467ad3fe03da749719343d92344db1e8
SHA192e3fa77ab67a2280df53d8741a030d0cc915e5c
SHA2565984e00404963f17ffeaa17256d65f0e637c80a47ee57a13fb5ce17fdf802807
SHA512a3b3094ee50b5a7dfff3d759e60321c5ba1aee5280e02326a81c56de8a777445a354f6d8347d84733282fcb954e507fd7bff65b92e5dbdfb5c67f7b313ce813f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502592f27a736b30e7c02e54d67a79ea5
SHA14ee6d6e0bb60fca6df0c9483e4945e49b3aae29f
SHA2560933f70381b497380b24117bdb71d5cbd3245f4c340ffb7507466bc235471dbf
SHA512e8203f1712062e6353fe10f7cd5157bcdf7482c33ea94a121b94439d39f3a0b5a4d4c42a5b192dbc35f8d3054aece20e16822d79cbdbca1d7981d1293c13673c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557ae12f8c8b698fb05c684b27a36594d
SHA1007c524662a96d88a021ffaaa14f56e4919403ed
SHA256201d43dc3e002b196772f24d1fa0544a5cb00ca26fc77b1c8d12e539f428fbb2
SHA5128905a21f570e7f0bf0d1b283631b09245c3bdb85ad355ddb5d3fd3a0c73e0f56b0bee0410b7d0ceaf0e5dd0f57bb09f7b7987c38d2d1fb4f1b3cdaf631d90360
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b