Analysis
-
max time kernel
130s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 09:36
Static task
static1
Behavioral task
behavioral1
Sample
d1a0be762fe71e3d1e695733d97ff19b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d1a0be762fe71e3d1e695733d97ff19b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1a0be762fe71e3d1e695733d97ff19b_JaffaCakes118.html
-
Size
18KB
-
MD5
d1a0be762fe71e3d1e695733d97ff19b
-
SHA1
71dd3b037bd7d184527a37d51c43d1ba9a537984
-
SHA256
6f673f35a67f6224947591e853c5aab1d18801301c01ef1f0a7787480e78400d
-
SHA512
20ef04d0ac19d65fb9b7b1c41a924ce1f0396dbd216c534daff7ef71da8b5c8b1706a28d7eb215b3eafd15720fe196e00ac8dc275291bf39bec92b99248d4a88
-
SSDEEP
384:SIMd0I5nO9Hb0gEk4u++WkDYB4sv1gdBxDB8:SE90gEk4u++WkDYB4wSBA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431863651" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A39201A1-6CFC-11EF-8B76-DA2B18D38280} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2344 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2344 iexplore.exe 2344 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2524 2344 iexplore.exe 30 PID 2344 wrote to memory of 2524 2344 iexplore.exe 30 PID 2344 wrote to memory of 2524 2344 iexplore.exe 30 PID 2344 wrote to memory of 2524 2344 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d1a0be762fe71e3d1e695733d97ff19b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2344 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d32007cf8c49bca6311e740e9b9012e1
SHA15a5107a312b729507ebeb255818b38f1f3bba2b8
SHA25656b943cf8081a3b5e53edd057273fc1b0129e94e32fa9b8680c61ce84382fde7
SHA51257ff594e09a6a5e389b6237e954ff476437eb9ccf4667f61c384283dfb458863da3f16c13cdbf1957d7bb3f9b833e5c6ba5c59f66b71b5406b43241a92622178
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c519e448e23831f39818071424f1089
SHA1df9edbed93a8acab98328817bd7757ac3de168a2
SHA25600b9ef435de7cba2eb4797607700e819dd3006f4b8d2b5a6f017a1df0701091f
SHA512f5ad1bd4b24d77f07f41e316a50ba9f8888ba30fff22d7f0be8af01a27faf7f868b71795a74f22b10960724532bfddc696edc776a571942e7ea552f3786295c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa04c80510c6160c82262413b2e99b34
SHA1ca8e0ecd733bfc8307b85d797694e192c88d8928
SHA2562b768b1456365ff76c228af6b3123ce6a5cde6aa132710892388b12fe15c637c
SHA512404c6f7c6c771676f3e3d64b8e955b50228c8f37dc93dbba23c04e0b21cddb9a7373bc97db9b5c1f8a33f2f332db32c85f883f5d4e434b5186639d7fb3c6fb0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574e5121e6d63447c54f3d798798a1998
SHA14e119e90757e57d1881aeac177039236bafb0e42
SHA2560a6a30643905eeedfbedb17cfb0ce7a0b570646c20543dd5a06c46a0e777425a
SHA5123b5478d3642e92ea60bc0b02d259c6c915d5d243237030ff27343435fa221c5d3d83e0dc90d5152cbb3670c234b9d49699fa7d06808b4a952973262b27507c4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a656e2ca8c97735132dc3b700825d3e2
SHA19e7da2c4151be47504e43954b76167f62ffefe8c
SHA2569937609453e1a6ed1682691ef9a6790e603f8aab1565da1f60e37819232ec0d5
SHA512289a4df92b8eef43ef3ee66e3b96a85097e3c0f1d24c46d6f0d2e4787a94f5206edddfa9c4c4e61fb3f5180a77ef3332009e28e01f193832f1c32e3acde481dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4c3d2a4a36679e05acef7b22baf884e
SHA1ec58f83679616776971b9c1405923670f00a4bf1
SHA2561b679fb37af8b6b9d4957882a36a797ceecd955fce1451978a23f2a308b6b1fc
SHA51244a068dd3cdad48216d44e0aa2d2976b70a134abe1b385a700153d1c518f9bdd817818fd9023ff79a7af3bfeb745abc16d0b3cb106ac731f76d7e972e35dafef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c9d0d6b6d915637e89ded16508b7869
SHA16ba5dbaf4e55b99e6b054441f266d0a4d5cfaefc
SHA256457d86a3972da0a867405ea7022bbe3e7258fcc20603e74319e6895a848d80fd
SHA51212a3dc5241eebfd510988939e945db81534e5cc776d043555055fdf5108606fc63387d86644ab34b0f8161759cf1868f95177fa9c960f7c670a7b9e61eb39666
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e4c1c57796c2c06e301df41c5445695
SHA1bdd4b025789dec47dd14b78ffca5d0dafbae40f8
SHA2562edb40a55642987154427d0f6cdd0fe325c97779e2372c9ba09ec396a274d032
SHA512976e7ef655db2f6a5f5c00f8109ba6dff7ea6550071f93c9424d8badb2d92c7e33a46c19b801446df80f1365d73d4fab67e319789a8c033b07b116b0094187ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dd68e4680154f8e2a6c94dbfa0ed233
SHA1d5258a949cb6cf762f28b8385b8b8436f07b7aeb
SHA25663edd28559984de5da600724520c22b8dd2404ab56d00b4e5d0686cc2b3639f1
SHA512a86b71ae5298e990685b76f1038cdaf3cbcf4d7328dc3b5b6a46940c4d21a0ee19b8bcf7da2e085f17eaae1f5107cc910e830296fa7e71de9fcaa3cf6ee4c1d2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b