Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 11:25
Static task
static1
Behavioral task
behavioral1
Sample
d637016069f97304942047f3d5a1f183_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d637016069f97304942047f3d5a1f183_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d637016069f97304942047f3d5a1f183_JaffaCakes118.html
-
Size
26KB
-
MD5
d637016069f97304942047f3d5a1f183
-
SHA1
978f8e076e630f844a332e3a9c42a5220b30f417
-
SHA256
ef4b3de685ea751a5c6b24501368e748d440972e1fb3b819a9866a744dad65a5
-
SHA512
14d7aa1475bdbff7e86bcf415de8a1450b38735ac8371b9510f2baf8513161892d290cd1bcfd0799b7ac51df5109acb2dfedfc58d95590af9d2cce464d165578
-
SSDEEP
384:SIBrEqk3IPmdCFRKE0ExY6soGj9Wx0j2lQ4T9jD3rGeEbqszfb54XtW2ps9RdyZZ:SWkOZhlQ4T9jD3eH6Z
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432043022" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{46C674D1-6E9E-11EF-9438-E643F72B7232} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2572 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2572 iexplore.exe 2572 iexplore.exe 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE 2116 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2572 wrote to memory of 2116 2572 iexplore.exe 31 PID 2572 wrote to memory of 2116 2572 iexplore.exe 31 PID 2572 wrote to memory of 2116 2572 iexplore.exe 31 PID 2572 wrote to memory of 2116 2572 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d637016069f97304942047f3d5a1f183_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2572 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e82cde36de041bc96e5fabf43336c188
SHA1b0a099d65e8a9d856321526399b17a5e2e8b7af0
SHA256c9ea886a17f8f65554f2795b025050e1a329a58b096025d004634b4195349ecf
SHA512231a93c34814712b2df572fb5399808e84e516c054bdc49b63471630823e84dc2d08487864a8c70c55050c9bd9ea48e3abf09b53739fbc831a933fda1840a272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f02039e7b8b65342982c5d558c2d4c3
SHA10c1448db3b57877bf891a8d3fbcfad67fe49507a
SHA256267128f7a70412173dceb092113c790b631ae1eeb1aac965c54384e768b4e11c
SHA5122641a599cd48a1fd0a3d22bed5c11a085d66fcf4a9b9d359d208fbb0dd6730bab37ac304cfcd47345db09c9e33e14c9ff13cef4691981d79233f914cd602f4b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568574ae8a82c50f6acc3421aba3e6a4a
SHA108cf177d92a95df18329e8456975fd638b3aea41
SHA2562bd56de3c6e707511f590251d10273e6cb80be4f0f3f37d00be0d30735b4108e
SHA512716512eb049747b43e96677ea7e07fee964b84017b3c322ef3bf3e0c4cf717f9fe18a82c51c9fbec640954f0682e68f905467e06ac2fb6f7cf88152f9adaf605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558a99c4c2be067b88d30c351a3730760
SHA1d815a147e1943d0c9a45b0db28aa90145027f9d5
SHA2564cda096899591c9b253ed28067dae3ef84c60bc65c44413f65a40c0a38fd6772
SHA5122ec3026b4918fd9b6278f5361e5455066d3e1ce78c014f5802a70727ece905104553ce6bda8d5a923d123460c911c229f440d9d5da87f5fb290498b66e5f1081
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ffc3eacf664a3a471eb79bbf802451b
SHA132e71934447fb4baca36813ec2af99229083783f
SHA256ff694815df87008e2407413a59d5ccbba8fcccf155df90447c8f0d9599baec09
SHA512337a238450377fce87611683131bd33926c145b70c7b533551f41ee9d26d59672bc8ea64d9f3332b39d306b454980fa234bafe841ca921a412d1c32f4a3872e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5892fd1e514811307517c7e476d2e03c8
SHA1d35434a7f1e76ef95db6598b75bbb82f4306021a
SHA256bf1436b5cec7638ddc549851f2aa9494783680a71b110ea79109819a49a73566
SHA5121f2d510b1905690103091f19d538928bf335a1bdf402e632f7c64788c64c0581ce4e4b40c84277e3dd0c9f62812571a47761f24b5ef5d0febcb70eb50c908a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a405c12eb8dd72614c0b753cb0609a8
SHA142d06eb3c9ad859ecb5550d4718b6c646f0c00f2
SHA25695855a96f7c2bca4db1b098d569d95e00b35cd70b4fe6fbc3e3e2eb0feca6df2
SHA51264aab11dbbc6ff70f6738d39b22877d1efd47f01a512bad21b9a806fcfbd1cdc0caf1e6139438f20e5ad73b902c60ba340b32d5f0975ad292f45ac06abd2a181
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc913eb3f8244f113f9f704876b7ec65
SHA155c38eb5fc91becc94db423d425d771a372f9904
SHA25695fea4b03f41ed51c54fbd76087003536c02c0c61057cb44b397502b5e4a7f38
SHA5127b252565788bb1c36f9c47d8159e395db06fe0f60428429c7c0313356a5f4c93c0fdb3b8938d0082cbc13b1a2add97c2c37ca844c3abc4c86c064966dda7d2ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbcbd2d1d487f89743b3fa1953663349
SHA127904a593aececfcb69dc01236d59f110c83d02c
SHA256fbbb0325ff8db4375426b2451fe2dbb7ce1f82ad841fec0babb850938c6bdbe5
SHA51296f24fc3b02f01998e145d1c5b9d626fc9f52797451e240c4f05c1a52ff54fb5d8f6506b8ba163dde733f9d9e192593b555ca58bd61bf08a728008e786412822
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b