Analysis
-
max time kernel
84s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 12:37
Static task
static1
Behavioral task
behavioral1
Sample
d653b6531bc7f47b64876f987c8f8a69_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d653b6531bc7f47b64876f987c8f8a69_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d653b6531bc7f47b64876f987c8f8a69_JaffaCakes118.html
-
Size
27KB
-
MD5
d653b6531bc7f47b64876f987c8f8a69
-
SHA1
487a4e788b3e601b080199e3464619a601970789
-
SHA256
3ec14875a44b45bd289979522aa4d7de15538ee66c319c0e0815f3797c7a8b48
-
SHA512
388c1a341a2ba5d92c27783014cddf3d04fda78e823d2944342717c4af2167c58bffafd95c6a2416db13c82d7b367bb25aff31e31645e16803f94f851b8bf209
-
SSDEEP
192:uw3Mb5nyenQjxn5Q/BnQie0NnmnQOkEnt7bnQTbns8nQ9eOgm6uhEqQl7MBUqnYM:PQ/abY8ENSOJM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432047351" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 104c2a2bb502db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000034e0efd5bec499ccae6f31940e89f4611372b40e7fb87c7a638e98f32d6e62cd000000000e800000000200002000000051ae513d4ceed4a5e690660fb58c2157895af4a83d374cb14f1f9e05449e63de2000000006a5b43ff8037bf2be71f500b6adb99b5d25f7c1140c59cb0968802eac0729b940000000aecbc43542b686309ac8498fde2a78cc9630c828e383a84bc59e95b0918fbb18f89ab5714c9648a1a0a940d7719bc0ad9cd730c3ee4672cc9deba5549e4a0197 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{54810771-6EA8-11EF-9DFD-D67B43388B6B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 944 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2320 iexplore.exe 2320 iexplore.exe 944 IEXPLORE.EXE 944 IEXPLORE.EXE 944 IEXPLORE.EXE 944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 944 2320 iexplore.exe 29 PID 2320 wrote to memory of 944 2320 iexplore.exe 29 PID 2320 wrote to memory of 944 2320 iexplore.exe 29 PID 2320 wrote to memory of 944 2320 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d653b6531bc7f47b64876f987c8f8a69_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2320 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539aeb9ed70db4533d454056b1f88f1e7
SHA123555f4112eceaa3b7dbb996e840d55c33a799f9
SHA256ec94a4de6c78afeec2fd6efcb745e80235b75692c2ccb269825ed79fd956c5ee
SHA51299faca0a930f675526545f47bbf43fc626f3dcf7d60f2670435209bc3a3338d7d514ed1e787b11354799895d2243e090cb4c12a7a7689769854a315140d9ba1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b69f5c6a48b7e98cd76ec6a55500f2f
SHA12c8cad95d8992bc925d5383e0789737342debab2
SHA256cea7835b197b24fa3e0fe8589d27a67a7f2c9a2ea13a7723fe2ea5ea1af9bc9a
SHA512bdcf755fff6374e2233acc99aead9c812f7c68884e3333cf1b3294a650eadab6e287993c1aa9fa6ea0e4749e9ded5752f560ba7eea50681a0b79398f8b440d3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57424b13c251a1f14b1ba7f90f6a839fa
SHA1075bc116c01311a7bdc95db95ce1f955f545ade2
SHA2564c1f8162484d92319d638a4d94dd4d4a8d33c66d2e374e42c7f03ee473ab557e
SHA5127c581c2a02ffbc7bf0163a45b463acdaac5de411f55e3b276ae1a9b9a378d6493d67529d38ff326ac65eba6a19b22f522503d7397ebce2b0178185dae131f714
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b173b0c76b119b6c799fd811f5fb34f6
SHA16078dadcac6707ef54d218876cebdba07df009d3
SHA2561fc35074b279f99b4e6b761d8e15b09296073110ba63f377310e196fcd160738
SHA5126390609c7deb8530c5f2d96b5d3c0a7dca84b99ec534236965fb0b4c97145881369974411fbb394ae1309408556d3bbe3ea4e8ad75a2e26cd3098aa65745d0b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2c316cf79188ab024b7cf3f73df9c5e
SHA18c0decd69c6ea593b69e04bd6cfc45845903bdd6
SHA256e1615a3bccdc6239bd9fa0532524fa9627e3a6d27c07997b664f9e40e13add66
SHA512feb96fbb9ac2a9e7946421ec08b4dea58b4b9a3888d415a71d81a680847d1bcbc0423123189e10fb9f658c04cb771740955a215731d96069b993d6d3d5bda405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a820f9f2509cbdf92efac3e537fe657
SHA14619a29bdde5bd7276096ec558f4eb0c1e91dfdb
SHA25606f1b779411b58b7d060795723fa825b162e69f7f62795fe2ba710695198e32f
SHA5129d6b24ce920cf8a16414b84b6e75b18682f4adadf10f7c3b8bbf16992e6d297cf35f48b56c8708de535dfd0ed90f323f7a6e6de0a3a5b55470a20e69ea636fe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517ee64ccf3bd834400369b312e7b8f3f
SHA173f6104946546938a47b8635a36a86bc5c9e9341
SHA256a5772b44662608b63210c1eb3692cab813320c3c31ca5ff2bf373a7d3b3f42cf
SHA51245da33559f322821bd4ff6ec28f29630cfd869b12ae4909b78857c9f5e5d77f6e5f3dccfacfa8442c2303a492409f59d545f54d2180d6e00d37ec7d98fa886a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f6dbc01ff063c9ca85e618053689bb7
SHA178a824b7f20ab854ff90d2b1f0a02c474b18d019
SHA2566790624e6a3401c8f7ac2bcfc8310e319477342d8183abf07474de91b31c58ba
SHA5128b2e5b56ea20bcb3485acfbd8ff764810ece51092b018cc9e9f56d1e4252acd28540858e42c3ff7006d1b3b2aaa234896b49d60d8c1d9d3c25713ad5c30561d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ec9a6f8c0550d8d5c9bb01e312e09cf
SHA1df7ab123d4a6fe0ee132e8a9b04aa4a06b065f00
SHA256936eb299ee3df60d6da062c780a36df6f36d666082fc6e966c5b73d3cb4d9b0f
SHA51290a0856ae29382696f92b106897803036189fb4839948626370fcdf85cea01e350bd70f51e3f7cc3c16917382a17378bf012c2a1c4b86bc1bd801c659403e4d5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b