Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 20:59
Static task
static1
Behavioral task
behavioral1
Sample
db34de5b49dd24b44e1f475839c90a20_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db34de5b49dd24b44e1f475839c90a20_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db34de5b49dd24b44e1f475839c90a20_JaffaCakes118.html
-
Size
35KB
-
MD5
db34de5b49dd24b44e1f475839c90a20
-
SHA1
2de7d587b1a735ab7b91e8520244997a28b4ece1
-
SHA256
e09231ff2f81c37300737baa3ebf82454e474dd31ffe93876aad6bd6201a6210
-
SHA512
87e4f80c89be2598677c7a483958f9065d440003a429f2b362befa6a078cbede190f84e27e688e739a5351df5533cda1d86398296187b03bce61cbd04ac0973f
-
SSDEEP
768:SdsfaYT//ysnzNm9F18Hc9snzNm9F18HVAv12CSnUcQhvpyLris0pvicaID4fJWi:Sd2aYT//ysnzNm9F18Hc9snzNm9F18Hd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B561A981-7080-11EF-976E-62CAC36041A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432250225" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2572 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2572 iexplore.exe 2572 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2572 wrote to memory of 3028 2572 iexplore.exe 30 PID 2572 wrote to memory of 3028 2572 iexplore.exe 30 PID 2572 wrote to memory of 3028 2572 iexplore.exe 30 PID 2572 wrote to memory of 3028 2572 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db34de5b49dd24b44e1f475839c90a20_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2572 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fd36439c8c288b1535c801779b5fb08
SHA168d3581c96addcdf560c0ad217de0fb7203b419e
SHA2569819e43992848e965aa2b0c8ab6fbfc64e6ea23e2db8edacfe7809131458a852
SHA51238c9d5a7c2a8d02166be97639e84fbeb1c9e9aab9d7fac33c42e4d4b2a0a879ce063b9bcff09d09a1461bece0750c8ec07e0eb5e270eee6dc2af1ce20d714ad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a474529ba51c34f0e467cb09772127f8
SHA1981ef8088bb6806698dbd451eca3dcfca2ec94a3
SHA256220fc70a780e8f01a8006b6e0d6284515a3d009539b4482ad4bd8c800ac1678d
SHA51283e8d06faebc7d13fdccf0ff24fb5046d7cc40ec09887fcbd502763228081e0460e3bf2bd050964a2d7ffc1cfaf9d7eb76fdc1d25ccdcbdbc48c7536f20b4e17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fcefd3936783a69813c9feb7e28cc0c
SHA1477ebe85e30fadff707145dbde6b821a4c1e5536
SHA256e8d349f483ea9f597cefc14bea6a0838eeb52fab4655a3d2899af89cc1b49dba
SHA512e27b7e36e788a5ed5da956bf9096d71ec8c2d99f45bd939fb31c99f1b2f4b413f2020889ad36ad3344b191d24c9119f4128f21b9f5d033e530fd48a3506bc0ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da269b295c718426c2b910f919cd38fa
SHA106936cd671a6a5e0355ba4e594393d60e8467bff
SHA25616ddb28b8585a9b2d2056a1602c6b0a01b5b35735c5d414237a51139c208be03
SHA512230051857fa52930d6500c157c0d93f9e8c843cec875f323a7cf91464622bb4e90827b8339b4ee55b938e1c1e57c4ade8d7e07aa9bbc4ffcf76d8b65b8f08628
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535a1a73353089bffcb3586cd732007df
SHA1ce283adb184a3486983cde5256b3dc6387ce8290
SHA256ef2609f10bd37ada357e71b4143e180b524b29590b7c42c3d85e3af0b5cb7e48
SHA512bd1a1e001bdf7795b574bc55e4ff75aa8e2ed3cccd8a151a003b7a62c0051107e928dfcad92549416d20e7ec5940a6988319daaa96e7f647e2fd9e0c02aed04a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519b560394f49f19e96d69e15bdfe7bd3
SHA186d46fc68c123f3d69de6e7c6e64858e28e0332e
SHA2569b2143758b31f55cd880bb8c41f5efd6987329ca01b6b6cf09355e5edbcbec2e
SHA51222e6680c32451c437506c6f60e4be4ab65913204927cee8a3a500cf988c2281f64e1130892cd22cac485bb71e0fc7c5b99baad220257673cd75b87a1ad7cecce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d185468d2c183fdf55fabfb46d7af23
SHA1762c898fa49874f690b8adb3a964b42a21371016
SHA256010e368b3deaa425b9dd8fa571b91fdf55f7248e1d1d1f6a19cd27546defb072
SHA512bfd3ac16c7b98c31dd9520d70bc3fa8a1195d850f23e878ba1fee1fee6eaa58c7e69a50306620bed3a969e1c41f89b3fd2ae28c6cf0867f5143327f442763c5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0bcfe50f103433dcf98b919b5d4b042
SHA1347d477bbe946cddde20b51fa89cfc38ea3cedf7
SHA25688e51612303565eafba48db2c6f474e1ea3fac37566f43abec5b629e388ac977
SHA512b3b70a92f01a1a43a506b8254e599075a972129542863f8e3e0d9ea29608d17eb95be31f3e27e065a75e6ead7518bac2d7ec6b05b7d9d6c200f2a2b9439a723b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb39edb3f1952c53d6ccd9be2930993f
SHA18ae45b4a5cee2a164367e3a9db365be8e24a1243
SHA256ff0071544c9b0a871cef799f54b3f7358b5569dd0b0f898d271f91b779c50c53
SHA512bcbc07ccef327fb2ca060d66f71a2c3fc7b9ac97167a53e4a304beb22473791299b1e96d09cda7f6b7f90c4c770f60e24bfc01c2e6de71b89d4a31064e32ad6c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WCATT3E5\ga[1].js
Filesize45KB
MD5e9372f0ebbcf71f851e3d321ef2a8e5a
SHA12c7d19d1af7d97085c977d1b69dcb8b84483d87c
SHA2561259ea99bd76596239bfd3102c679eb0a5052578dc526b0452f4d42f8bcdd45f
SHA512c3a1c74ac968fc2fa366d9c25442162773db9af1289adfb165fc71e7750a7e62bd22f424f241730f3c2427afff8a540c214b3b97219a360a231d4875e6ddee6f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WUBCGJ0A\WeiboShow[3].htm
Filesize171B
MD557d4df52bbac8d80282b1b413d395363
SHA151501b66afd4af9a38f7353a85b1052e6b6bfbf0
SHA256d9e4021adc7c405b14e031005ca8e92a4dee81ce7cc77cd3ce73261f22afca20
SHA512bb11df92e241e0a8d9b8344c65d4556bba7cabfe88ca02561c14dbb8250befcf8d1a823e48e5e1ad56571786ac4acddaf23013eb85df1be7681cfede10310ceb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b