Analysis
-
max time kernel
147s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 19:36
Static task
static1
Behavioral task
behavioral1
Sample
d4fee0b08de506cbc7e7dfd6a6a0b763_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4fee0b08de506cbc7e7dfd6a6a0b763_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d4fee0b08de506cbc7e7dfd6a6a0b763_JaffaCakes118.html
-
Size
139KB
-
MD5
d4fee0b08de506cbc7e7dfd6a6a0b763
-
SHA1
7d39728272daacd90cf8f0b533fa303754db4393
-
SHA256
dc884dbe7e2fadd2ed73f258900667357bea93bf1f24939932122c4499d2858b
-
SHA512
35f1d97e12dd06715bf471cb2b655dadf3e49448a37ec685d970b5652fa0e85bf95929f8853bf80ceb6ce1f83130e5e63e9c05a244db782134e30d810face02c
-
SSDEEP
1536:S4P4UIlZQyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOZ:S4qQyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B7768BA1-6E19-11EF-B12A-E61828AB23DD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431986090" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 506884d12602db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000ed359165682b11d3f45ba003366227be1cc43d71f12d0f774121978b88dca51c000000000e800000000200002000000046dfa6578a9d8ce31064addcfed3847035932ababf52f63fe1a0d428479c34d620000000f5a3962e23187e166bdf38ea983a98f63b687cf531a762a8edaafa6085ddc9d94000000034b621ec286f2d9ac35e74f96aa5637aa09d81cbcba3ae094346b7f61c98a304a724dad92653cfb63c4bdb9b97c5183de4a42436c86f327753cebbee12735faf iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1884 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1884 iexplore.exe 1884 iexplore.exe 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1884 wrote to memory of 1808 1884 iexplore.exe 30 PID 1884 wrote to memory of 1808 1884 iexplore.exe 30 PID 1884 wrote to memory of 1808 1884 iexplore.exe 30 PID 1884 wrote to memory of 1808 1884 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d4fee0b08de506cbc7e7dfd6a6a0b763_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1884 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c677caec6c2c4da2724e9e5c54f3f56d
SHA172d35c72ef7b5b1a8bf87ab00bb8495bf1582fee
SHA25660f3e9b9b9c7e8c11eca168f33f04d9cc0c30d80310d5b1d11dd9c079d36fe54
SHA51280040a76b6165c957d3862e7b754d7b8ff9535edbce30b312802c249c8cab0211b87c47c98e3a05fa449dae76f1802a9c3b4712ea80a6bd8e3ca1d88c4a6634a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb2a75576314ca2106b96e40ca028c45
SHA1f7ef06659790dd1d0df582b26ce01401debb0c38
SHA2568b12f704fb11c9eaa9c30a14d91f836c333693809c4977814955f30983d123a5
SHA512953c82167913ab11f24eecc5858bede835c5e8795be44cee7bf6b4bfad3fdf08acd67d44ca3312788fc3b335a1f3f7e88918cc7e7dce9e86c13950beadd657ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512412c51b40aed395d0c863d22ea7e12
SHA1a7a7f908113f77b1f26fdd132c6e36c18df6a9b2
SHA256451ac8e6c754ab4705bb9bbdb58606135acc175568785ea99e58392718a05fad
SHA512187ca30363c5da91063eb5182b408a3213d02aff239b2768a6e10bbd57a6289066378063c5b88f3d4abf38240846b28418cfb31a32e7353f3feab97e27c91992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac100f345440052af71c597e69058db1
SHA159d768bd65a6c704c05e7fd59d4fe69690e6ca3a
SHA2562d13ecfc34763a17b578e9cb32d51af73cda021ae63c72c00feaa40020cfcd24
SHA512ac5f78e509eca9eddb186557390780d7ebd7b672542ea9a6a1674a90048431c8d8787674507258cbce1b27e2fd42463572afab28045ba9adc616582cb1935a86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa960caaed7b2fa62c5d0e9767f35ee7
SHA12116998d99596ac5e7ed17f2d56a9a21e5d09abb
SHA256f939835da420d48b86fa134023da270536679b02a04622b44835484f189bda09
SHA512bfa6591c3d8677559d103c2875d49660b1ee9e9288e52fb797b70511b04d89893a8a1c5466c5aba7de982307300835b5dac480ec6be08c7ac4efb91545c273aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb8f46dfdd18eb96065f07b4fe61391e
SHA161b66fdbd4e704d1e8e46dfbfaadf416204d8c50
SHA256e404ebe24c0b5e25e16f6e082b3444a9a21d450e4f15e0958ff03389de360ddd
SHA512f87b77cb73a7a11930985eb833640ff0efe42402c77a1dc3e67d1755c4d1613d8589f0a8d607566da9d6f94eabae9d9f617da885e865cae42e55e52f245e1670
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b