Analysis
-
max time kernel
135s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 18:08
Static task
static1
Behavioral task
behavioral1
Sample
d6d80a5ef6c0e6f7597b747645beeabe_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6d80a5ef6c0e6f7597b747645beeabe_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6d80a5ef6c0e6f7597b747645beeabe_JaffaCakes118.html
-
Size
28KB
-
MD5
d6d80a5ef6c0e6f7597b747645beeabe
-
SHA1
86c5e1c927fb9783b7e8410758dd2121380d8203
-
SHA256
2f3a53372ec0fb694ee7260f3062f0a8adfe7f4c6eea59fe7e76c9ea560fcf1d
-
SHA512
583606b2bc9fbcb4c70ea76e5fc72d805ee309903ebd7ce0791566d1ae69fd7f2c8866be188de841dd80d3643a60d3804be2b5219ad7a83ed535f8dbbbd32187
-
SSDEEP
768:Zcd9QZBC7mOdM87pC5I9nC4WwGwbwCcPd:gQZBCCOdf0IxCJwGwbwCcPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432067164" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{78F641A1-6ED6-11EF-923A-F2DF7204BD4F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000c249411c4d2ef8611b2e20cb6b1b512c4e9810329bcfde3a31429497deb64fe0000000000e800000000200002000000000a27280b66aec3d564e805c83704762156a7ce749a3ca4ccf3b5f8f2f09b7dd20000000cee9680d54307ebca05afe3ecd2b1861d471f0395de693a6ab45c0439f079cfe40000000e6954611ac303ff8b0bb37f10716ce2c34fa1f198d3b1ec59f9702d3733a2a1dcbade67adbf5bc51dee120f2396733b3aa09a67f7a02a8c834690ce0bec4e994 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000f32b27262a52bfc048bd42d1cc9e9d764cf4128e313aeec8c7dce19ccc8d7d46000000000e8000000002000020000000e32a4a70c34fe8f66a5148092455e5e029f9e2252ce9a41221e1b4f0e5e60e7990000000308ffcc4568636a3dd914304ed963a77d6e8aa59c1ff35c0aa5fafd94d888cb5f9b888715a50758c9f646c757d38fcdd4c8af228cb53b430f2eb055f8db6e9e033bee5a399aa79917562f0d5705aed0638c76cba9a8319b28824317bd35ade8e5fb420bbd978e7f2a6fad4da04cd088b05570ce275755576e3535883677b8b57269b1854634061afabfdd0148daf6778400000001e91dc2ce1b3b7d011c44c885333a57a76f7ea9b6ca5e6339c7e071956fb27a048b04527e619eb6963a0c4b007b9e92c5054cb02e639b4ab0b9299eb99f95ad9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20a55a54e302db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2896 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2896 iexplore.exe 2896 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2764 2896 iexplore.exe 28 PID 2896 wrote to memory of 2764 2896 iexplore.exe 28 PID 2896 wrote to memory of 2764 2896 iexplore.exe 28 PID 2896 wrote to memory of 2764 2896 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d6d80a5ef6c0e6f7597b747645beeabe_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2896 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3d9907d88562820e62e87b52740446e
SHA1cb3fa53953c8dc53eda41723dd155a6a5f2de3de
SHA2567028ad02d07b797d538eaa1a3b144b43ac43c9f18248789ff38e5937bf1a11d6
SHA512d5b4926060633aab057ace91bafb7cf0f5440b01bebfbdb6a6efe2198c83e45fedc31d43983d5b83da6825307bdf39e0f5b65861f6e60a240e2d7e1168e05340
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506be772add75b3d30cacda868e7a924b
SHA1da2a3d1469c07fecdcea359a8aa134b797085283
SHA256211520be66143237ccddfd70efb49a891dcd46f46aa5d499b5ba60c13f7bb3e0
SHA512c4fd381dc5ef7e5ad3b2689edcadcc2640ea853aa90460f045dadb1e5d748c4c2f6dee20503ee04e362cef47104a7a0d5251d21ff43366aef7287dad5c73de34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea670ba4cc28732f041749f0b5998f4d
SHA189677d0d7dfbca8e91f9da02a0218a500f068430
SHA256fbd19f65817ceb2d921f9c25b070465b7afaa0479fb38db22575d46101115af9
SHA512bc8ceea5991621c5fa8a115c6839da0e450fcc4ce56eeb30a84733853c2d9d82092b38b87ce86b463a86cdfae645116ea0ee0b28b1ab6015ee52073c9ea5add9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e02e31b4c8ba38dacbf5a8385834871
SHA114f3dc96c2bae9a7b021ac7d49fa42e4610fee36
SHA256d9120dad80af715682d7f08d66f4a840944788b7692c1ee2fe2d407de819a548
SHA51248191dbdf90b12d1acffbee392230fca45cc247d4c39071669c6fe2791678d349f571b152cd59aaff3475fa1eae7f2b9d43b557dd16e12dc1ef9381d54253244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ba9fa66f3d4a3c7b5d301a10b921432
SHA121967b18cf3f7781ad3bd3f3d850ac3694903c32
SHA25644df063d0978b26e4439cd2b3f17d8f4de361d124a1352e61a117e5f3ab5b7bf
SHA5128455e0aaebcdfade0baf922adb23ea93c6d287c985f50b9217dcf0051452f74439882389e4c982f9b67874d0f93c67f4b27e6fec1fede72e5d9cfd52790701ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500ca9027eb22770238d68c225e1b4bee
SHA1d8dd133d18403062b51922eea4c3de1565b96c90
SHA2565a5613070dc12e27980d7707c02f0a53c2dfe3479b5d22e97b79e73f35b40acd
SHA512c14d63c1541fcc8c2e0d15dc595b3918b50a869c333a3e438e08972d55dd19dadc663b12749793c9103a4f8546619830cff465820e25861f74d6740ad4d5f690
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538fbbfe3708a4540c5a7be663ebc9001
SHA184ea538c8e0ecfc8be122f0f6c18e4cb2cc0d7cc
SHA2569c40ac04d829dec91be0da0287cec96eafe5e9668ac59ba9d5dc62371aad8ceb
SHA5120a52cbf401e72859cc801a6a61be21aca30726de21b16a0b72da86c06887cb1876e6377d60ccab72453523a3b205378db68933f248f9866a46e0aba7d97289a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac6bed191db7f39b578ab2782aafb235
SHA1cd002d73a89ea0120648e7d495d10f8bae0d9d1e
SHA256cdd1cb0ddcc6f4e36fca1cdf8c4c5174846de32c08d1506bb5573106a63589de
SHA51211c39a188203597cae4007443ba918454cc64b4980d20c6391dcce3bacbb5cab5bdfb9cd9c475c99a6635e7c46c432d92435c157e7693d0f491633361a2f45b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7753405a3aaf0a66315dbc26cdbddb2
SHA1cb90e4b080026e9f49a60ef857350cc71322f95b
SHA25676ea312a37f345034c7f31b41be72187cc3ba08a7a158389761b0c7705325236
SHA512a1a6564ab31532aa0fe8dd64dac2f0af6f1191d5bb007f5ccc83b56dafa52653186975e8514443e940b00c2f062b1d136206c26f459545c685ad265eef52f650
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b