Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 16:05
Static task
static1
Behavioral task
behavioral1
Sample
dab85a08e3a0b98e7f138898215694ff_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dab85a08e3a0b98e7f138898215694ff_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dab85a08e3a0b98e7f138898215694ff_JaffaCakes118.html
-
Size
27KB
-
MD5
dab85a08e3a0b98e7f138898215694ff
-
SHA1
680d64ffbaa84860a73bdea47fb1b81d4de70672
-
SHA256
7ddef6648d929aa7f8d5f31d2b82bebfcc6aaf5783c54c83c7b8babb17b6090a
-
SHA512
db0c9dc1c9e6b49c468dac5f814c84db3daa3753873bc943fc166d385666823e845869f058812c9797dbbe8c81c49ff088510803096a4713fe5137c19e31f615
-
SSDEEP
384:jSIWq/TV4/jIBIqoLsE2UqW3CxS1xhGxCexr2x9Lxmpx0xx5xxxTlP5h+LiJrEuw:jSIpIjI3ab37FF8oblhh+LiJrEx
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A3C6A141-7057-11EF-A3C4-46BBF83CD43C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432232587" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1744 iexplore.exe 1744 iexplore.exe 1224 IEXPLORE.EXE 1224 IEXPLORE.EXE 1224 IEXPLORE.EXE 1224 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1744 wrote to memory of 1224 1744 iexplore.exe 28 PID 1744 wrote to memory of 1224 1744 iexplore.exe 28 PID 1744 wrote to memory of 1224 1744 iexplore.exe 28 PID 1744 wrote to memory of 1224 1744 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dab85a08e3a0b98e7f138898215694ff_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1744 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cd5c8127b5f254aba7e06a24bf44a98
SHA16e193637e89b145f4bf384720488374b44c94799
SHA25642896691092f2c8b8394db3fed6404ce0b653295d41d6b3558feac4201938a5b
SHA512f185a8824d3a323f8ea70eae24d2a59b2e48103e61f8b8da0aa451d5a7bf4ff57d743797570f54ec69a46f54b8b3cb7a8239e697a3f27b36898567ec8aefa141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c17bd85e92317a0bb24f94340131b5e
SHA159fb6c507641245b400b06f06b7e0d583d41fd61
SHA256c29f3c64a6388a61b9f3f405b1ef6cd10c5c767298779614bb7a880f3d7ab577
SHA512864ddc8c7ce718620abc1dd009a6df56b1ccf37ba1a8ec23fac0c71b483c4b06290252b0b9293b00b423dd783ead49285ea37e641a66b7f82a6ac809414625ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b9e73814e70d6767842164e12558862
SHA107b58b2f564e07293433bc1ece09cf59fea7143b
SHA2569a7bb20c144249271bb58fd80f4212dc86d721cdffa2c2a70a960d145f823d28
SHA5126945d4b2aea4b8a7a55ed090386d19de87f8776862b54bed0e2151d77a99b99803ab8c8d604ae592583393e9eb6dd975753b72f957dab6c601c72f57e89e94b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f193e696a413a7403e31923dfb979d1a
SHA11071c1bcc0cddcc0d646ae1c3eb6d400f309f290
SHA2561347dc3abf918c50813d2697f5b7bb0953eef779187f03d894c94e7dc5775278
SHA512f95e4bdc4bc58d526f33239039e4d7640776dcf99a2f6d87c04d6c443cb9c12c4aaa62a3eb9a1396aa6ce1adbf4d3bc042ccce47dc39ab0168ab0d852fcfb932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce4f6baa6e0271e930970c37a122790e
SHA16b2c024eb797e7f27db47d19bba934b1aea14b53
SHA256251ddb7cd8cb3affd16627c854f3109c04a14fd2bd0db122ecd1970b10fc509b
SHA5126eb5481d235fc9b9e3084bf89c229c0063c0e3ddecd78c5ca84555c544ddc1c15ab2b45969a879580d530c6edaa2fa0c955d636ad1d19f1c0ae7bf01913c66b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f251e5855d4ab0159a0938a3ce0116c
SHA1895da407045b20c23b9ae28da8b5272dc6f5243c
SHA256d9f2966d47b2b0e0aec81a7a02ef52a6b2342899895a86dfa93f88857b670b70
SHA512dd3003bc60cdccbb9d09207a03eb1747dc3ced04f9d54c36a899cf14f393921b73ba1fb03b504d391dbe0cb371f6a6f0f7a12b2c3cee7636e4e42c10f5b3af98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563d02e1e0954598c7ec472e40e16fc71
SHA19cee76f5a31bed9371d242c1ebf0f377bc72d9b6
SHA256f498107ca50cd244aa5f8c3cadb44e6e4163d6f96c59785fe10f5166eb1a4631
SHA5127f5a953049b4016d6c4e061251d1d0260c4386efa48bb3b072ff23c3e5ce3be6cdd2ae19bd6de9c44bd2cc51b561820fac707f36380491cabe8f1f5503311050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f7e834d509e02474dd4265065069c01
SHA1847fd034f04f06cd9c2c3c1790ab4da835696821
SHA256b059607f593cd64ac02df60eaef9f6eb87297f1d536e5efb300efdde3fbd0bc5
SHA51212356dcf2eae8819a39e7ba8904525a3ba91247e14ddee8ef6308757a480bd9ca0968c07b16541da5829df67ee0dd34ddc157190032c37b6eb96dacc1efabb1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56628e707c0aa88e6197109177d6e5a6b
SHA18dd1ebf09a50ee63db2f57c1e81179bbfc0bca3e
SHA256379dca147cac34cb180857fa71a5af148b2e610bef127462ab615dd9adf8bbd3
SHA512e85dd8dea3381156366c3714d1fead89d733182a7a33427d4926eaa21e76558aece0f147924fb4b97e9c71c3dcfd87182cd9cb972aa450b2827306b1228470b8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b