Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 13:47
Static task
static1
Behavioral task
behavioral1
Sample
cfaba310a6807947b58389b09698a30d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cfaba310a6807947b58389b09698a30d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cfaba310a6807947b58389b09698a30d_JaffaCakes118.html
-
Size
42KB
-
MD5
cfaba310a6807947b58389b09698a30d
-
SHA1
a79cdb890015faf36fc2bda31daf12c724b612f2
-
SHA256
ee6a6969fbc3dab01c8f786f372f52586e1f192355c5d37cb30b0e09e8de2784
-
SHA512
285d4ee9bd311c3257d94b450e3c2a3256540cf8ff2509424d25bf40b49e27d40be508b4fc728427b3580fb53e5aaa1bd4d0d93a9b021037256327982188e1ac
-
SSDEEP
384:S33j2LaIDzwA7DblQLEwpx0bKsCKuzKYxwKn2ihKARKssKj+o395zYRn:S33T0cA7/Ks1u+Y92NA4sjj+o3LzYRn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{899E02E1-6C56-11EF-8705-5AE8573B0ABD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431792308" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2060 iexplore.exe 2060 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2820 2060 iexplore.exe 30 PID 2060 wrote to memory of 2820 2060 iexplore.exe 30 PID 2060 wrote to memory of 2820 2060 iexplore.exe 30 PID 2060 wrote to memory of 2820 2060 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cfaba310a6807947b58389b09698a30d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2060 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f973111c6529a1a67cf0bfbdfb878d5
SHA1b799ba5adf618067f86b64b08d0f4b82877ba76f
SHA25688a02cc7415ad1f2f9696eb51fd328c7f5a74b21a80e178af1d4bccc0085578d
SHA5124d3a11b4f04f431283eaa146cc04b68ce43092d175fa9bf80ced765cccc7fbbf07895e6cc7d5c0910ea20721793af9627ec8921b71527fbe5aee3f494756b52d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d782c6ac258dece8d6bc5f7b90bb08d7
SHA1d18019a136844707995e604f28c483ec69aee8f0
SHA25640dbe27a0d27eb3470c1de31b8823778366a7ec23dc8b608c97c242a29d7e74b
SHA512e170d6663c5ecefdaf4fbddb02da1b1a58eb284c967f1af918642384f313bee85c9beb400954f50bcae2cb5861d0c63d74424db0b5d674d946c9ef84d545e23d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5676f92b93b6a1ec71f26834fec2dd5b9
SHA14ff516ee19bb2c8ffed0621421726709a536c1d7
SHA256bbf9f936158513b65806e6ddb582d4367e4501d6b548d74a8097520159cc7ee4
SHA5129e7f46b6894f3f209788d9fb953169ed475ce3b2846f122b24eb36a7df3a35e15df2d3c88c8d6352c6a4ced6b423aa2dd2a2f5bc400f6c82e4f8864a5c52511e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4f47572ba3f45d44f5b3f4faac92d94
SHA193cf676d32a1650421b79a1367e1efbd4dc94710
SHA2560de657c805d07ac40325d8e71bf6698c65f5b7bfcfcd584407307e6fa19b7884
SHA5121cc294308eadcd1cd86ae3f1fd8785850ef5d372371855c510ca27ab9e1dbf75831118d6338b189e1d68871f6251ee674dc087eb0983ad15aa89327c53e53c9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe9d4bd374027fdd9acc1d160fbd4173
SHA1722973b1d3315fdbf53da54db8ebe12dbe307a98
SHA25662ac09fe9b978e8d9cbe45375645d43b1ebe55b593027f69b6fc13009fd5ba98
SHA512b2a59c2bf4cc238e541d2bcbb932fb9e2f8215f443c2a486beeabe8579fada2836d302bb4ba8bb7132f737bfdb58660a2809c0fbe9b1c46ed1a7076349b6358e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5634318aa0b32475e32aae25f3c897a16
SHA18e162c5471e48778e86a0a837a3860581c756b5e
SHA256c313fd0d70d25de62f61489634bf5d41bb990bf2e175c672b57ef7c69a1de841
SHA5123a99c163b4e1e554f2731e78510c784d157b34308226503d7a75c593655d66723bfc4467fa8b969e2ee0dae77074a0ed67fafd2bdb7ee579888beacf524207c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55346ced24016c4b8d81af6f58e0d8cda
SHA1d88a6837883ea77e32b64177f96c7973f6c9cef3
SHA256bdf56cf16701cf75678f35b5be70dbce27324e36e68ba5bfd96e5f85d5cec11e
SHA5121c7c06bfc78cd4d1bc8a17829e321f0c7fc7fe659f04fbd2ce41c8f118dc3331fc9753180e338a5eade613237e5fa977d0cd9e3115baa3ab1bbf03ff3cf41584
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c49c84025ee16f7c0dbe4f758fb68966
SHA1f6356755575f577caa6aca32072aeb56c6b94e3d
SHA2564244b61c9debd481f1454f6b3d53145b35f25b93157f8e8f40ebf73fc5c7103b
SHA512657cb0ea3420346aff170b8ff09d08cc2c8206163084db201137270fe99736867c6e09c6b590ba8725cabb89c6d41996053e3c731bc667384bba768d2d77ea87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580f7c79f4c8b822b61e1c62f5696d507
SHA18a23e33036fd7ca83287f7a5321a695085eaadea
SHA25600ae3903c7594755d8f8fe686af388ddd114ecd14ba17f45c36401e10a45b2d6
SHA512b9c19aee1a14fbd66449412ca2dc771fe95497f0899a88f82e945f25c1e51570cba4412a6f157cf18df159cb551ca57cdfa533c3bdd9598058de375b0ed8f91f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b