Analysis
-
max time kernel
132s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 15:12
Static task
static1
Behavioral task
behavioral1
Sample
da9fc7353b19b302d6093571b4ef7f6c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da9fc7353b19b302d6093571b4ef7f6c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
da9fc7353b19b302d6093571b4ef7f6c_JaffaCakes118.html
-
Size
55KB
-
MD5
da9fc7353b19b302d6093571b4ef7f6c
-
SHA1
d380f5d852b58a99b2cae8cf47903721d760a66e
-
SHA256
36d868ebeb53b26dd8b83402ab4177a865305a998b57b51fb6afdcdaf42b12f9
-
SHA512
38b08de79eb3c9869c8ec7842027d08e2ce823fba909818f6058a1de18352faadcfa1e56e0b63405d3504fadd0b4412bdaedab404e00e7d3ff5a5c85962c9818
-
SSDEEP
1536:pppm2MSmzA4B2glKnPhP2l/PoYDyBOlM42Z/ooKs:4SmzA4B2glKnPwl/PoYDyBOlM42RooKs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432229398" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{381E8EA1-7050-11EF-875C-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2684 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2684 iexplore.exe 2684 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2428 2684 iexplore.exe 30 PID 2684 wrote to memory of 2428 2684 iexplore.exe 30 PID 2684 wrote to memory of 2428 2684 iexplore.exe 30 PID 2684 wrote to memory of 2428 2684 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\da9fc7353b19b302d6093571b4ef7f6c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2684 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e57d84ad7a26016632f196aca7cdb53
SHA1fc244f4cafd518c33f1ff7b613b1566576f27ff6
SHA2562d190774a76e48742d13c34c88e6ab16edfbcecab9de7adbbe035796b3a86939
SHA5123fb797dda5d30ac7cf76a7e4dcb7ddbb757dd1799895fee784cc4b58fd7f61491471937af0cca79433e1e4b4f932436f2a45db9990369a7036121db65494eec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b96e96b3ca5bc69fc489c51f94c4a83
SHA1c73a30343a6b09dee5a0359765e688b114c57700
SHA25671c81231571f4a2a807d0b25e5ce8a30ffeb0ee85fccf9bfb863f3ce65871df4
SHA51220826ac2d7794d6a613dcca16c1a9c5802059edd32aa04b01a2fe605f4a14024c50f76eee1134b4bd117277a29080b82ce63a4a6e4f7ca21f3bb9354b7bff0b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54126adc88bac97bfda1b4b2e95e30f27
SHA1aab9320d7f863f203af3f5747b7f6d067953c340
SHA2569b1df6cfbe167d6bf13920fbf12f1952ab951282d033d82a566b3de93c12d460
SHA5129d8206daccfe397a0d7d128c0401406b60d5d0ce4208eb5bf54a6523ca1e7427537ae68369febfefbdcf6f6a4cf1822dd70f1aaab48f99c986b3fc61a4642ee0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fb3a675a0584bbadde4f25b241e4ce3
SHA1de73501567213e83ecd9e97d31b15409bc5c69a0
SHA256574dab9c305287ba941ee372a5e65a5aaed90541ac5a7656334dba44912b04cd
SHA512d5281d7baaefe5738e04067fe18d2d46c9c84d48b2e853ee5fc4e019e34632fbab7e2e50ba35128d5342e9e57b52a1eefc6c9e1d6be92ac6e172db2791262af6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a72487719e71ba96ddb436d8039cc01
SHA1bc786d3cfc37d8347c964e99673928445c8c1ec2
SHA25657879f86feef173fb32f16b0900724f961fcf3b2f25343c874d8a1b7299e7936
SHA5122ed970802b5f35dc124bebb53773811981b04717e55a3d8c9b607c01534ad9da6ce9fa966c08349c8148f4cee47f122940d79bd359e70a15dc3c07599f2ec0a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc17afeb447b8d911314c4a8c8ea2013
SHA18d0d712c507db55ebf4a2ed517ef0ff282c1fc8d
SHA25608cd77735dd08afd95efab33af313b4dd806ae30954a79e851b98cc5829425a7
SHA51249fb1c2bc445a1371f12efbb777407ff0102186aabdc383e2aac747dd6b60bc5456a1df80b98c4aa9eb108ef2da0b127a729cbcaf9e0e0cf4198cfe2190a09c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3e65f30818be336100d77d5d23bfb25
SHA18eabf16e7ab40f6e5f4310b3ce1b1044fc9cb116
SHA2565d1d081892f30c8fbfd0ffe57c9cb6b02aea6785771c8abf9f366e3e49bf1d55
SHA512a01eca01d80571c7952ac0f6f608438b902308488a21f287062ad8fe861858c341153ea617fc5414ff61410475db4642d6ca8ba1ab93d24e5ff3c964175d6171
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7b626c274388f9b426e19d252d0946d
SHA1b6cb40bcba28a0763609d7357c04dcb88fe436c5
SHA256e088702af5234bf05b28de0620030fd0111540186829bf635a34876377ce7547
SHA5123e2939cebe02fb11d3563ecd24beec916fa24a6e1ac2df6c0cc5ce99a7e2ef106374e6bfcc4d74e92edd9d929ed3b503f0464ca1972e9d6a52fd5f3fa8d07277
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5278609156d608d1061734daf0b8932aa
SHA1ab59420a1a431b3707f0acd910b5457f381cb1c7
SHA256e33e3834cb341f6dc080714e3462b33c57ecb13ab92e1bafa65d26736339bbdd
SHA5122bcc75b90fd888b905f58a707b0e58f3fd88874f4e5830d126f163565282074a476a47ec3ea50035e9c1a47dff933b3bda8ebf7f281aa48eabd63921ddcf7d8f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b