Analysis
-
max time kernel
132s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 10:46
Static task
static1
Behavioral task
behavioral1
Sample
d42dbec6364cb0b72d3d782a908beb25_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d42dbec6364cb0b72d3d782a908beb25_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d42dbec6364cb0b72d3d782a908beb25_JaffaCakes118.html
-
Size
53KB
-
MD5
d42dbec6364cb0b72d3d782a908beb25
-
SHA1
c2febf8821e7bef0979d1080852569540be1727f
-
SHA256
b9c614849119c3a239560ccbc0d3cc630f0cdc4ddb3ab0824b89e5eb6111196e
-
SHA512
064f9b9df6300ce6363f97fb283f53d3afa01156a0628c90683c8138c61cfce0a5bc89fd7f0e901a935de7c6543a1f4a77fa4642f0a1d555f266b46a37d2df16
-
SSDEEP
384:swkjd1QU7cibxOpBbYPjOOsDjihQHZF/ediSOYlZF/ediSOZeyiXdUgpxDXnc8af:swkjd7mbnjihQ5YDZjsxba
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431954259" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{98E6B8D1-6DCF-11EF-BA23-C60424AAF5E1} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2352 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2352 iexplore.exe 2352 iexplore.exe 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2684 2352 iexplore.exe 30 PID 2352 wrote to memory of 2684 2352 iexplore.exe 30 PID 2352 wrote to memory of 2684 2352 iexplore.exe 30 PID 2352 wrote to memory of 2684 2352 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d42dbec6364cb0b72d3d782a908beb25_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2352 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546e36d9f42c9a2046c3fe3b7017521cc
SHA11b411dd10a1e0163287a2bd020f56a1c24c318c3
SHA256fd7c7b747742e7a02f15d24aacc1bf3e670836cf9c6aee4a7ec769c98c18bcb1
SHA5126a0a04666c58d8fc9f2dbefcce5af97770d0e3befe1f06ffab1e9f7d427cf63c5dabd5ab30fdf01f8749bfdb6629832bf8784dd469c03790dac2a48a7e5a99ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8f2153b2ca090365445887667bfc422
SHA1a92e9e856614b758d41f14123ab78245a2512921
SHA2564d1746abcf0decb93be3d7013d2b72a062e6859962c979e0411928d373833a17
SHA5128028170f633a339cc009f4a8c38683ea7d29ae1ab85fa81f245b34fac9997f181f70e40ce4adb6fb0a11fb07bd74942554fdf866b0bda2bc68c4ad80d1f3955a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540bfa7a3538197c8662c52dd19788617
SHA152353b3dc3f10970181becef6d93fbcdd64f966a
SHA256896b4cf26acdbd2affdc5f61e28d605ce260f8898691348bbeb781eca1978196
SHA512df9d30c58dea847824cc975d455ab315435c2a7a8b674ea23b3f1b7beaef6b622abec02beb877380d4f4c513509778e75625f053b3f774544f754e041e3f6e8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d571a34752a4e56233845f5671ab90c
SHA17df9b5c003198d51564fdb73227bf969655995f1
SHA25645e79a9a4afb81989cdf50f7b5802245d73d4b233231b9585db8f1433ee84e12
SHA5123e4c719ed43592bf3eb318e03164c8878ab9c64734798908c755241f89b0f201bbfbffe437b7cd02b45664ffe24cf7c981ae30d88770d281a3e516d046688ae2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5273e529796a61fb70d72b134ab30213a
SHA109bcf1f47d3d0e474b1125b3f39d708ad862cf3b
SHA256114c4697a33b42c87389c2b7dddb5efc3af61a0f02df90b07a4ca70bad228fd6
SHA512e9356bb387a16d0ef6cf9b4eaaef6b1acfd6b357af1e246e8f04fb0270c8c5dd677662287b68722b5858ad8a91ed62ce85fbbddcf48ce3fd7ea8fbca927b8d01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55585569b97bd9dee49b3a6d2216b56bd
SHA11d77d74b9da9b2ad7c21a6a817230c04a4b33084
SHA25628dc7904c3184cc40d76937174e85c701c681041943d9001892fdb11d8d100c9
SHA512f871e1014ea36e6d9cac876bd37ba76ac832e2201c0b625035e95e1e4e353402ffc86ecc9c5c05c3d4e5ab91d9edf72b1113936ebde5322f2bea69c8adcc3616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad63043e3229da4b19e0b71518d31efa
SHA12dfae1afbe38106c0ed71bb16f8fe6c2d71bebd7
SHA25693524ce8c66befdb64e0487475f08687ce872423247a7a6563f5471f12006b39
SHA5127cd33404ab2676f9356a26be444e67cb0cca0ee5e46a7bf188d7cb39e2039a83d6a0e4c84c09f9bddd030128f6e130c87119936a600acfd5afb14c9f5f71ed03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ac89deac24ee62a03bb8c67e2d6763b
SHA11ac49bff29f484e520b23e0b43a2dacfe920e77d
SHA25675ad172ebc5467975acd1e2c66d981e4a085f32bc6f66a7c8adcb46200394b34
SHA5124dea30057723cba45323abec2dc38d9dd9dee1c7647edb611a2ed5693554cc5edf845426310c1cc863a9659563d901ec9ca866e5ce45fa182769eca3e277eca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a994647ae69a4e7fab2b8e7fc850213b
SHA1737d0b35047a82d59e69de195a33be4f7b47edf3
SHA256950e2fdf2497e4269212bcb27d97b149c0758f060623fc679a8f41475d1242fc
SHA512e52bdf502f4396d1a174a02114de0bfef84f8c58634e4f76f18acec12367e478e542501cc09cae56b3771252640dc13e9614b2ba90313ac03cc16d5985a40cf2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b