Analysis
-
max time kernel
134s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 19:49
Static task
static1
Behavioral task
behavioral1
Sample
db1af1b67f52e4ac76ae0e5821bfef3c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db1af1b67f52e4ac76ae0e5821bfef3c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db1af1b67f52e4ac76ae0e5821bfef3c_JaffaCakes118.html
-
Size
36KB
-
MD5
db1af1b67f52e4ac76ae0e5821bfef3c
-
SHA1
63b3b1b21a3c95f25f2e2a8cab6e07460e24610d
-
SHA256
eb9ac00c91c0ef1e75f3a4d2b267fa0b4ddd86db8f42b060775a249a5f9d58f4
-
SHA512
fd6b0ede770d424f5e5a0d3c6642fdd3ccf5ac5049cb10e6e78902e1579de83372dad2d51d55e3a7978b59f1a6d91486a2a8bdf3f887f98fb8d377b2d599e372
-
SSDEEP
768:D7izOhkTPiPd0m1J8yj/dB6B+RxwkwU8QJ5fsLKtj3YGNx34QcEnZm0Y6GPFe9CM:D7izOhkTPiPd0m1J8yj/dB6B+RRwU88/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432246019" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EA64C861-7076-11EF-B1BD-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1788 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1788 iexplore.exe 1788 iexplore.exe 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1788 wrote to memory of 2500 1788 iexplore.exe 30 PID 1788 wrote to memory of 2500 1788 iexplore.exe 30 PID 1788 wrote to memory of 2500 1788 iexplore.exe 30 PID 1788 wrote to memory of 2500 1788 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db1af1b67f52e4ac76ae0e5821bfef3c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1788 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51478ad9e94bc3fca996b9adbc7e68a97
SHA196649d358a8054d6769619f80c8c2fbac9b5cba5
SHA25651e06eccc05265c9b0f6fda67dd6407515b699d4316bffe6a99b8b29dcc1a5e4
SHA512ded9beadbe725e41d10adba03d5e534db0cc5be19f8b36de20d7171efc336ff7f1cbd515a81fc95ebe494a6fc5dbc2b96e455f14a468a14323833164a479a285
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b67fdac3a3a755ff2014b45202686190
SHA1695cfe9a60ef7ae9124dbab44fc0ca90a6fe09c9
SHA25601901e8a92a15ba5a1ca51e058428ba54dff94c47643d65473f8ea8a5cb9c9e5
SHA512bd23fab6d554e891fb34b51440bbcd253f2b254116075353dd18b9b5766ae1e9dc7189256144a6c98de2fa5175929e9d7c94ac13179bbb377c5235e8cd00580c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7c147e52b8b762282dc1b684a9490d1
SHA101ba42e44906037c47e0e4105241ef5ab7bfe90d
SHA256de09355df9211134da719e8a11aa7c04024981fc43136fe878a679e1e8cd01a1
SHA512e58926e3ef9908876595b6f1c08037c0f6cf80b4d1d7a1d581a96c129a7814ca71aaa55f03ce4bc80d5e1623dac5d3648d5ac86eb4c238a4f7e6250cfe4e18d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9fd0f30ac9fc7c9699c1172864c16d1
SHA158d92ae7907fe02bde8a8f93f2490441600929ab
SHA256fe0fb1634969e922db30f24648ef001f4b2c26e7bd744cfe8fbe75bd41c56c09
SHA512b052858df85e78f1ba92407e79ab63af55e4e53be5ae5a2ff4197fdc2ea0a188ad8f10873056566cb538dacb6d5285a7f053a1a5e7868639c9acca2df7cc2716
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56389854dda6a62f91b1de091ba35994a
SHA1d9442f95def382251b610644b3906e9de402039d
SHA2568164334e6773e3bfb801a01b94d808723a89d1f574a371b6c04fc1d3d45dbe96
SHA5124c187fedb86936385fd7f585ca1cacc9a06e6ec03c2ff26e9c903c721ff06c5dd1b7a695437416613fa1002efdaf0f66ae013f01d4e9f2f99663a4bc4c148a88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bf1555178c5fa464408abf88e22d411
SHA11d76d57ff549aec4104e2e7527eebbb8b1cd71ad
SHA256c62dec25e748c37a7dbc2a32e2f905544f614dd4f7957d8940e94221ca4321b0
SHA51215f5e2e14662918e0b760dceae9e291447ec352c4a753e59b73d63ac920915826a629c4418d19a8baa2332d54038763c18125fc7167b5a0261caa201a211b10a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523d13e99ca5d06022cae4ffb6d8dec7d
SHA1bf883e369ef7a7bbaf0091700c7482f2a27d64a5
SHA256727c46be0f305b34491c416b3cf6234bcd11db17c7dcb6c254577dafb467042e
SHA512f3481b4dbfd9c24bc288ec07a65b2b8e99b884da9c902fd61e5075e2aa33960ba381b2b8fad5ab6e97c5da1b8cead64cb83989e6c987db373ec6881886782bf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5478cdbf8bd4e06442958510f75606111
SHA11a1a81405b9f6674f9f4940a8c6d887992537b35
SHA256f28265e619b8bc7eacb04aae2c17db5e0956b7333b53df87548cce7913a9c5da
SHA5121e9a1ea0c659498a36eab58c3ea27e7f9a1078ae70f1faa26f03c89b00f087e7c01122e28d0022d7ac3789434374021cac2e0b4d997df0ffbf3ada161c771958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6fce7e6ee61015003d0c4ea7e937ff4
SHA14438afec0937afa72bbcf74a1a4604cfc1133d6f
SHA256144db7236aca6c2e5918f3af32e0f08133b427127db7cde40f1d6716ea8e8f63
SHA512e05b4cb4ce0388cda0bfc9ee852d43402d14fb7af5c79ee672b1d300ef067385a5dc8717a5dda63227ab7c595b42249e6e48359c92af3938c75c526145b74653
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b