Analysis
-
max time kernel
135s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 03:05
Static task
static1
Behavioral task
behavioral1
Sample
d0f1d4d75cb98e4829a5354f9aa71702_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0f1d4d75cb98e4829a5354f9aa71702_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d0f1d4d75cb98e4829a5354f9aa71702_JaffaCakes118.html
-
Size
201KB
-
MD5
d0f1d4d75cb98e4829a5354f9aa71702
-
SHA1
ba552c9df231e1fcdc65fc4302af844c99e9ad5b
-
SHA256
897fe33869ca9fc3f92488f39420403aaeb28a271ed524ee84fdb7af5f61a53b
-
SHA512
be6df931c4e197714e150dbee353dbe21320474530b3ef160283e2ff1cab4e71c35985f72b24f4aa2184c823420e639f141c2a2b8f7e8e131c926ec5c312660f
-
SSDEEP
1536:kaiiDMziD7tP3JShjUhk4VQOyApgBqWt3C3ETGxzGvM:diCAc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20cb5f0ed300db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431840195" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FB576AB1-6CC5-11EF-AB7C-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000b2d580149e51a48e4711c20d970ced20277e8c16bd0a7bd6f54c91e5f4a977b2000000000e80000000020000200000008c8eae91ab92d194f02bfeb6c23d8258cf029db71264e459e61637f74b047d4f200000000c3e8f6c5f0864f5029921eb2833be1081f14a8d5b1abd6294e8433c0eb0cbf140000000c4eab8837e0bf0492fe93cfbf30d7656eb4353959a9e23dc9bfeea0cd7052d5625e73ea7c5e94fd1a7a5092c27ac13d9d601a4c25856ddb55b3096ecb80923cb iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2512 iexplore.exe 2512 iexplore.exe 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2328 2512 iexplore.exe 30 PID 2512 wrote to memory of 2328 2512 iexplore.exe 30 PID 2512 wrote to memory of 2328 2512 iexplore.exe 30 PID 2512 wrote to memory of 2328 2512 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d0f1d4d75cb98e4829a5354f9aa71702_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec4a19bae0980939298f416c2c849c40
SHA1903705c230e9eaf0cf42bf3356f2a8aa174bc190
SHA256fbbacc6ffe60fb45ceac36b4d1e7ffb180f9e8a67f2a4beb1c037c7b32613153
SHA512879cd98f41ba1177c9325d325a909f220afc0113403b05fe4f813055cc5f7e409cca347fe2dda0edb9bca60dc40a73fa526abc2a588acea15a962b391b7590c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569f302cef3f2ff2b90b403df8a32aeea
SHA16dee2f890bfa247541b7921d3b074d74bd884f5b
SHA2562071455b5bf666fa0683a8a203e08d4035f575e05cc18b0b935bfda9e41c328b
SHA512fbda2940089d4810a439bc9d50fd7bd27576b343c0656331da53c48f9d5c398db44a4cba88ad9ba966b5ac573857cecadcf813c07727b6b37d2f644a9c346fee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560521f3cc27d3e3e948ae899820c7785
SHA175a2b425ba19a7d0ee2636acd492ad20e3282467
SHA256ea3cd86ffb9f4cfbf9c04693055103ff83d9f1dcace9b2291c7b04481d939463
SHA5124699dffaa6d2d343d64aac16e6f52d17cb200de9d3619affe9c9bcfbf9e3f1af37859c5417c0fae80ad5fc1cd7e9f3239ff87c49731a378677d30777c8f9a30b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53db51c810b272802504e0a2406ca04d0
SHA17bde4c972bf8cb5a8413e5054181f2ca72d62b72
SHA256f2ea2e536da3e7528140409d533bfab643b4eeda6cf62ab0e08d5e12670f5ba2
SHA512bdc78df7816f1f0cfb1ead00203427f2b0ba681bb5540bf335f09bd014982de4bde792f2d36c487ea9b35b3b487669b9adeca5c5b1f1e1e13e8e7e84e01c8688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e676910031d830ef6d79513dc774c5a4
SHA1c6cfd622e3719de99e52ac71c84e0b8dc50b0c63
SHA25669cc3e74369375a4c63ee15f6c26915b52ae9f6cbc24d2aa05dc9e0d5f06aa52
SHA512c013ced71dab21a0d45067574257670924f845fc25cabed0847acec3142b90a67239783aa043c296da277d11db4fe3e34d8da8196d12c9cf8bd29e551874fe2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508d98583252e3638ca8534c3b1eda3f3
SHA15b81caee841598c483268ec3bf5073299f5b1edf
SHA256ba47baeaa81b998cdd29fb37ec01060c8abd7410dea4919c3bf07fe47f9a5a51
SHA512de073733eabcc65b956c1fd7498845b9926788cdab81aa2e8a5227ef36cd84c3e64a49eb8b4c6a753ef81593024ae9f24df9f0b4f963b970a2d50c8e90519ef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5400bb5e488e58e224242cb030235c3df
SHA1679c1f319010286e0c8d161bbc1cc32eba30d960
SHA256f700b6a5a3c47bf07b76aeff4ee1bc659268ff9720899c7729343fbccdc939ce
SHA5128d749739fa796a099537b4c2aadc1ad51b6dfceb12919c35ad9f0bfdec6a22d0eb64b258b50c05b5e7a9766fcc71d33bc8a86ea4c946b355921626fd801e4064
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5227980ad68f1da34cb02102bca488143
SHA1bf3bd505e8d4868bcaa8fb1d80c9ac529e4232c2
SHA2568455fc02d1a78771cb718c8610f36b6ea55a8f5a4f5c40201821777e53fb8eb5
SHA5125956f2dd962978efb8917688d262175c2f04825107c4faa1548c17f78b86d3f8f91ab22ec88f1fdf7888e14df0d860bd7a7e60d946ffbab51b69f75865d71589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eddf431cbf90b8fdd6d4c6a76c8efb75
SHA11c2692730c95c983e90970febaf5a63b2a7c09a8
SHA256dc8ba1f9d5edc3c12638cc4a57254a882d8ea49a07706db9057132c90f70150d
SHA5127bc4489992c1572bd2dc12bf654d664d367ec29bd8cfe31ed6032c948a244df2c617215d6e98b78942f922ff2bfd59111e0d10bf66e922d44d81f66bfc14bb7e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b