Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 07:45
Static task
static1
Behavioral task
behavioral1
Sample
d16bbf974be84c4ca2737cd25b3812ad_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d16bbf974be84c4ca2737cd25b3812ad_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d16bbf974be84c4ca2737cd25b3812ad_JaffaCakes118.html
-
Size
14KB
-
MD5
d16bbf974be84c4ca2737cd25b3812ad
-
SHA1
f718e21862920c3a29aad38de9e550b0800ea865
-
SHA256
9844200c1fc32dca77967c83033908ff034070543411ca34e7fedac55453c41d
-
SHA512
63d298e026539c088393bb2b939ae0ff9477647779d2ad1bbafbac732b43bd0f6c5dd4c25836492fe8a248fa47c0e331fa4d09cce28da3b320e1a159c330afa6
-
SSDEEP
192:IvkdquNYk80/eqj3zqvZAJ5LsG2+cGXP6qn2bMdDe5L9g/ss5oIJOy81anhYmP:Jdl80/e4zcZORNcGf6K2Iy7haOy8MnzP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431857023" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{37534DF1-6CED-11EF-A429-7A64CBF9805C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1760 iexplore.exe 1760 iexplore.exe 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE 2152 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2152 1760 iexplore.exe 30 PID 1760 wrote to memory of 2152 1760 iexplore.exe 30 PID 1760 wrote to memory of 2152 1760 iexplore.exe 30 PID 1760 wrote to memory of 2152 1760 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d16bbf974be84c4ca2737cd25b3812ad_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa3ed4a4d911486fa1e97136daccede8
SHA171e7a9a6f3ac8f16b2acdcb3a898c13a95d93701
SHA2561a49bca2d24c64f1c0f9dfd425ec2404987395720801f76a4d04587469e78c94
SHA512423ff6678760b9dc869f604e3686ae0b29c354f6adcccf935773a8eef177dcefc1eabf997504c8451214b0e924df0c61b36010ac93cff35bd157896c3f9d5bca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5187aaf45212e530c6667f83f72020040
SHA105cf02c02e55036474a21f580a36757fc3f38192
SHA2561e022bd4999d19bb75b75d6630d3754061d933030dda4bade647559570a06cb8
SHA512f68d6b1c70aff6bafc65fba2d4d10661196baafeeac4f6ae557d325055b386bdeae7ffa5dc3cadaf705d4aae57fcb388b9beaacd4fadfc3095b2dfaed671c69a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577d4c3eef705383ffc92f7bf0522c57e
SHA1437a0db97f53c47cf9c920333884205199230d32
SHA256bc9630238203a8b531ff47d008a3b995a603179fe39ffdbe57a53305751efddc
SHA512def6337af21d37daae033a07ee8a0fec9094ac4f34d8c8487c31d3d20fdd11a07149260f0d7fbb6e3e1a745bb7769e4e16915e6d1771bb8c6d45156292cc4710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bea15ecb1c9d1e2f1b41c68b1285901
SHA1b89ea6fb925afefec32c7e83b29c8abed58aa23f
SHA256aa1980e37a92ea96da2e88faa73e34cc2e0798c809925f9c13bb61cdbae0b7c9
SHA512b981a705047e737664d5cbdafb9654c5646863d78e76a9929af8ba5c403617a186051153c63f8874471b0afdc77a98f3e7d8fa2c0f8f1fbe9a4b3e04c19eacbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534a89cd0e120576bf32ab8226081be95
SHA1457ee68a1f86cde1d9cfeb5747463dee0c55f9df
SHA25624d1aa4acf6a495cf4b548d38cb84917633a1cd2b5d62aafa53bebd01d24c60d
SHA5124dd5037515d31f0962e6e9e90892548c8eab052cc228ab8c33fe8951fcd8c08c6ca40a2f193b3fe3bf82abc82ca75e4459041ccbaf5031606e72734ad216052d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51aeebb9afd94e3d6793fbe23bf266df5
SHA14e95d4c9b2bbd30c0e4128518c8e3f1b63d2ff62
SHA256706df0c0b2821bfe46216b41d535ce280d2f789b91a6851aee2816c98cd46e9a
SHA512ee18b5a1b3a4ab182b0a65b5444dc9567a10e6db5ff542846cef1933ef3e7232fdcba56fba06b20a9b868cc70b1de3a02e7afc01276311066f7083f2fbdd7459
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534dc3cefc7a93f3ac1633583f9db9afd
SHA1790e712ec15d08c9863ad9fe8a16aa62c8b70865
SHA25639c54afda7885cf7e916aaf720aa85fdcfb2ea586855ff298d5c52d7234fb947
SHA512f0a9d9a820aa75c6c4a62da8256c9715cd48744bffa94b3aa884d8da8af02f64bb9d7ee0b411f4194bb07a22a3bf883ac4d2d338662a799c3afdefb8cb1d9492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53304006397012374e79e6acf847033a9
SHA1ec889ab83723cb2cd36a732641591b034468cff0
SHA25606028623aa7cd02c12d1fd688cce047cf0eb223cd7fea9d329e8745146b2d075
SHA5129aca114e994a3278b55fb9f587da5a00ed2f56db4012af17f9d7350c6a8045cd2d41f03810474cafd03afb104dbb29961f405ddbf67d71ac2be9be7119a1c067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520ab37cf9b1f47806c731a8c9af51277
SHA1478d8ff69bd7aeca5dd5d527db6ee036e093dbb5
SHA256752f08724e66f1f51ba2b5508b7eb3946a13365678fda87cf9b1c571020dbdb0
SHA5124e87b62b0583444551f3825ea7e8f43a44d01a02399274b019479bc99e3edbab1d7599f33462863c90623511380b04a36e5c457e7d00ce2df16f851bc8d29f9a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b