Analysis
-
max time kernel
130s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 15:39
Static task
static1
Behavioral task
behavioral1
Sample
d69d0f73458797429991b40b3206dc1f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d69d0f73458797429991b40b3206dc1f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d69d0f73458797429991b40b3206dc1f_JaffaCakes118.html
-
Size
142KB
-
MD5
d69d0f73458797429991b40b3206dc1f
-
SHA1
0dc88ff5796b8c615c49c6715e573cbc2a754dde
-
SHA256
6e10967623ad6a1e599695cb76751227e070bafb7af8f80c5e0c36c92dd37632
-
SHA512
6512f5b6fdc8bbc2df5babd97c7e6f58b7d23730ce754ce924b98148525f46656ccd64e74bfa94c346f893296a9ecd4fd31b2a7952e3fea04fb1ed8e8fe75f51
-
SSDEEP
1536:ScfMJSv3xaTXx76vuyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3p:S8JMx7dyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ABEA4FD1-6EC1-11EF-91A4-527E38F5B48B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432058225" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2784 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2784 iexplore.exe 2784 iexplore.exe 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2860 2784 iexplore.exe 30 PID 2784 wrote to memory of 2860 2784 iexplore.exe 30 PID 2784 wrote to memory of 2860 2784 iexplore.exe 30 PID 2784 wrote to memory of 2860 2784 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d69d0f73458797429991b40b3206dc1f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b32b06ab1eea7d394353b2d0b9d06b25
SHA1043ba2a816b3a2fa2538321724bbf72ce04e3632
SHA2563d90597589ad16f23094b2a294a1fc2244a2602bd823789ae235f62b2fb56022
SHA5123100fbbe56f119ff70908604bdd9cc202b770f36b4982ea4ed868f2914f8344c13358f278a30341155e0ed75ff38ca3e00299d5026704e1ab94b8474788a84f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f44462aa7ad595455579586ef2005bb5
SHA1f9cecf15a092a660885ca80e3e7b22f5a3645de4
SHA2569881fbcfecfdeca08d444f5af3e512449fefa51cd18671af2fe31e8d670966a0
SHA5129b8fd4d583dd43188a6376a963da8f09a927880a11e4e18cff05fd2d8ba89893dda3effee59cec8d7e473be72c4716b3ecd0aaee590fc10cbccba2550e4306c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a71c0cfc2c858b5c2b92577348e58571
SHA13fb280b54af740efb9b17c181b55781b2f71a71a
SHA256c7b2955a53a22781c38396b3b9b168c7dba3baa8087a30dc71a049876e85629c
SHA5127dd288afef484471f0c00dc31f5fe89df39621b39c8a57fecdf7c57fe4700656c7bd1f2d5f1d6821f55fd1eb4a8e4e69cf8d04ee9787104327e8d0cfe6d6970b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b6fd53ac5f848b3dfb1a33a2c691257
SHA107edbf6fafb25a576776ebb7c6d2869edb81dbde
SHA25670c2b15bce70881bd81b50af81fbe76e7e1231caa159143ef5672966dd4d3ba1
SHA512997dae7162a866185424ebf6dc8a7a5e5159beee3c11e14b88e12155d264316aaee6c224433657098cdf1d1b113e641473796751bf97958f1783a58136777630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58af6748b9b6f5d5ce26f31796e55ed7e
SHA11fd310979ab403975d2867178c0d880038835a79
SHA25651bbda37c55de5da6d3310d4e828040b1caea6c0897f77acbbd54327e4673446
SHA512cf97ee365dd306c6070aa0c250f4f149af99a9d4f8d4a76b1ca24071147fdf21b24527e8672775844801311a5064aff2aea1ce03719d0064cc06ff2642b7d6f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5907dd08a9f381c3c3fd62650acbb700a
SHA11f380708db55c6664742e244ad6f988cc8586675
SHA2564c54638dafa9b2c2010cb623fb66ef57fe719bcd7b77ab56876e84f4b5f48e82
SHA51228297b1d9ef64304c4ddd70745e627059c7114581666f1c90fe5b7c7bbe725d5226a03ee112d57f1f9810427a2e3ab8cf7a7a75bdfa2b22e1129cca1e1641bf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffdb8fb4be5f62994d3ffcecc302254c
SHA127bae50cf4ae35dcee355d05aa7efc0efe48e3a0
SHA256b3a8abbc3bf352fb0c6a1dbb5ced9878f70a6056e852f325163b7d3484ec98eb
SHA51239b5477c62bf444215f33362091ec580acae0b3baca4a43bcc6e78432a74d136af3fa98dd7af1975154dce1effa702f3eafe4f6bd731d87b4809a501df520ca1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577dca12b6a60f2b61fa289a9378a150d
SHA1a12f25c32d17193aadb68047f9f9d796adda1e27
SHA2560d3a6086bb65cee55c4c47d24f63b2e32fac29c8d6bdc120e66bc3e46ba444d6
SHA51214fbd17a8e96a97cb3380168909d9e0dc83f5177db1c895eb8ea19561fa52b096f049c47f6f654bfc66100b8d3f3714cf13df8a015b9089550e021af5b1d68e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548f41ada8a38ca7d67647df2ae6aef59
SHA16113f74ca1972d6b9f4c722cca5fcc7dc6608301
SHA256531bcaaefdb5b8cc49892e94cea1fe9ba81d17d2c83f2a4960a16bc316cbb1a0
SHA51283f5a8725e1e9d85852dd896cfbd0b6805774bf813259a0ace3eff3d986f040548cc839e2197d4edcc9e94c74d2c96c9035dcf43660aa41569b3aec1a99b917b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b