Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 06:17
Static task
static1
Behavioral task
behavioral1
Sample
d1436a0be7512d14205f48e9a107cb47_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d1436a0be7512d14205f48e9a107cb47_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1436a0be7512d14205f48e9a107cb47_JaffaCakes118.html
-
Size
187KB
-
MD5
d1436a0be7512d14205f48e9a107cb47
-
SHA1
1aa3cb8f20feeb203ace76b6683aa3a79593fe7c
-
SHA256
1389cdbc18e489c8255c00bb37b49e25d49e559f15fbd8cd454f072b65cbffa8
-
SHA512
55b46e8d5b5082db199984d92eab710ed8c20b48ccd7d0120b922cea59008cf308e901e939efab266360d35ee6e2488adcecd227f9a91283e96693db990b5972
-
SSDEEP
3072:Nsf5AsZIS+f0vXfp8qVyTXfpT0HXaoJLpjzfwsMhq0NrQ:YYf0vXfp8qVyTXfpAHqoNpjcsMBW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000018dd59f25b672caafd1177ce50c84b52a7454a97deb9f846551beb54f15173f3000000000e8000000002000020000000b60095377c2f9556f45757d112a70f61b07a9969aea444034521b6d8ce8fe53c200000003068ec655256e64654eeaf8200c38eab7f413c89e7fa2d7b1ab1fb08ac0b55d0400000000b9aa0de330d4d92677aa059ac993d68ae8c3c329f74ee7290144a358ac61e5e92c51143640f19f12d354ca7fed849dc84567d37d7cd9d80459829859f5c7037 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30abbbeded00db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D91CAD01-6CE0-11EF-9188-62D153EDECD4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431851718" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2720 iexplore.exe 2720 iexplore.exe 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2728 2720 iexplore.exe 30 PID 2720 wrote to memory of 2728 2720 iexplore.exe 30 PID 2720 wrote to memory of 2728 2720 iexplore.exe 30 PID 2720 wrote to memory of 2728 2720 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d1436a0be7512d14205f48e9a107cb47_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2720 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5d6288d1c41a1b7710aecdc1a4b43adee
SHA18ad2985263e240943f5b9328377baf0ccfb1e2fd
SHA2568088f5c1446a60554a1f919a9b24933ef63d72c971df7996cea9470d174dbbd4
SHA5128da85dd57e7badf00a30bb8a751024b32915c681aff93ea028e09d65344bdd06a830b8797bd147df099c767d1feb4a8eb188d3b048eadd92fc66ffa498adab29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5986aafd21dcc5bddb5d6ae8127eb758d
SHA13a3a5c0a6d50bb9182816268ed4b9e8ba560cb25
SHA2566120fa313eaaae2275ddd1049c7d0e32caf7cc0e69fc8a507a89d809ce82eb76
SHA5122646082ed34ecb53fe3434ab29189712657074f0b5806aa5f6c845b26271c3e41f0841f8e2144f0f795fa1462c8a74124bbae14b073d690446a3eb75d4548b22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cf9f832e7d30b80e86842b786aae65c
SHA193878c044bdc27a9b0317266c9e147fe5eda295b
SHA256283da6a5e9e261333f5d1591f5bcd8ce730c689d9e324b52f7a14871c78b2e1e
SHA512e554f5a1045bd37bdabd3e5d7be2e843029c340a6c8231caddde2cf7a14cbbdc851488a8356837579ccd94cf131b7c0b366d886d97028b0f5d7b89575c8bb288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597591cfe0eabcd55dadf623d1e0cbe95
SHA16121343aecf02b8ddcf8b37e1178b4f2ce9ed551
SHA2569a5f2e87a464f3023c908eeb2507a2a71f0db8c01fe673599555c2b0581dd288
SHA512bd26de5b3b7006204c5296652996d3baccc38b9cd3ecc4dde209e41d1d3a7231f7cc911c4fc1fc1693967214c2d6fa3fdd9d6940613e6d01fc3a7f19e05d408a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5441b0f27d830c7dc7360ce2bee764d67
SHA163698c8eb9c4c6a41a93a9732801ede1cd882079
SHA256492d11a2d5b446ddd3b312c4587aba109e617b08cf7b45cfbd4661aa071eec1b
SHA5128018d7efd194ef34964b5520f48df2813b73084db4f5b44a590f206c23b9185c1be75994c39bfbb85e89dd87166363e8b2fe450b838a46cb1be420ae9639f2cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b85ccc063074cafe55855794a677a5e
SHA1e7833f01ff5e71718e6717f3b6095ac98b4feaf6
SHA256c46320234db02468a1038105531ab1855f13a7e26740646d0a59093e1385e3e6
SHA512274f04a3dc15078945972cc6d1a92668ae9d7ad1c79ed6efd99ef766ee5fbedae558411ac25cb35825286ee2b54d23c22c90a18ca84407da582940581ea60e38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1aeb6d05ebc62bc202ff7e6b91a2852
SHA18a7b1cdb5d61158d647c3ed40feea15ebe39ead7
SHA25651134a46ee911cd4dd6f51e3388131c868b2ce0b0201c4541545423da6482a5b
SHA5120dc27919d9631a0a7007f7cf58111773b5e734e1bbf0e32c6ab38480c4b21c21054a50bcc088154769cf9e8e1b61873c1719275406ece5196dc4c959d620ba50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5b487162f1b2d5b0d4be67f4001cb8b6a
SHA1f4299b2fc48c21e4166d8dac1973c7eab225fed7
SHA2568d002c31a0357044763dae08a7c79fbe0d604ddf643e8491b7c8c210aa295775
SHA512371302cce2b03677733006f5f1375517163ae01828fb85792b49351825b82382537a4ea84e8d650a52c2cb18f71af2dab3382949a7de4bb700130074123b7202
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b