Analysis
-
max time kernel
134s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 04:02
Static task
static1
Behavioral task
behavioral1
Sample
dbc67419ba4341eccd2b6b4e6fd8dfc6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbc67419ba4341eccd2b6b4e6fd8dfc6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dbc67419ba4341eccd2b6b4e6fd8dfc6_JaffaCakes118.html
-
Size
62KB
-
MD5
dbc67419ba4341eccd2b6b4e6fd8dfc6
-
SHA1
e84393e2dffb71efcefbd1357abf12515f5f9c96
-
SHA256
d308e1bda35dcaac13c237c821e06ad86b39e1e22b7c6b4c8438890d50827118
-
SHA512
11c8dabdf0e4f92f8e96ff5be5c893e5b89545243339d6d0631b43b69d425feba1c45298f8e04e36b8d6035469911643ea5baa8a0e4ba32fc02977934f32a0e1
-
SSDEEP
384:3gs/TWhzcLB63idlOZsrER+ozZ1QR1ZS1Axzk1rzF1ytH+5tH+gQ2dnhwUghDVUb:RyhzcL1+GYwxRFOlGLsFpyibqyN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432275607" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CD64DF31-70BB-11EF-BF4D-465533733A50} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2540 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2540 iexplore.exe 2540 iexplore.exe 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE 2064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2064 2540 iexplore.exe 30 PID 2540 wrote to memory of 2064 2540 iexplore.exe 30 PID 2540 wrote to memory of 2064 2540 iexplore.exe 30 PID 2540 wrote to memory of 2064 2540 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dbc67419ba4341eccd2b6b4e6fd8dfc6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b88d09c5b6246c48f76a92969b07a04
SHA1e27113cd47600a07350005cd032bdd8b3b5d4ce6
SHA2569027e624466e1fd7d3b5f0ebe2ca8aa8eac2d439de800ae8ee464c6371817f46
SHA512cf12be5719c7cb8cb6b24cdcd7498f222fbe7b6ca81e5fb3a07e36d9830fc7816771c811f9805350eb9fe94f356f2c2818a3d7d5ffca93b46e55e35d7c46fc3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a490950c79a26bd8094486cd50bf851
SHA15f88ca311ab681b1cf778de45812f7166c7d41cc
SHA25638efa22874fc70b0a611b679cd43c8c32f513bc69aab3be39d8696e5ccf75e38
SHA51256f267ea794367746562ca092b7319a3ec9dba6933c4510c10d4b7dd668c5e34a6bcefda949de9a80b391f8dffc69fc84556cc44b5ab1f074995a1bec65b2382
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e8853074bdbeab7a41f5be2d4d4075d
SHA17f5a76175a34a2ef245e71cad31a67c5288c405c
SHA2563308f870a0c46a987de3198cc013070c6bfaa3419cced4a0e40e3e6ffd510be4
SHA5126f9dca59e1f824c195e9a3ebcdf97ea607c844b1a3faee93bbc83139ad05d4287d83c2b7f7026567328868a55bb9b6a669e3fc1e8abb341a9117caaaf7d4a59d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5720dbaf30f95eda43723211f242faba8
SHA19121e2910ee00bdfb9b6659b437ea0eb4d6f63ac
SHA256b4538f08459f1f9a932dbc097914d0251a9a2121df1d08e46b21e8965947df55
SHA51217f4754cad4918df0c236b8b0faf95d32bb8a7aa9cf74aa136847051fe3a6f799078f297a6ac76f6b03388e027eaff9e9efcae3c29fd19a338a85149689ea005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5225ab4e0ebf831e16ccfb32345dd7a04
SHA1c18c6afd8727a86c79d17a57f8b791d87fafa170
SHA2560cb4a552ab4aa329d515a16047ab890cea06e4762e3843b8093abe2493f4d269
SHA51211e44782828f97b4a7efabd1e1c31c0c64339104002cda21e3f48424908b774be6c1dcb5062be404b0f5828606ab0d3077917479fdbd8acbf97510d940c3a416
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5508926c7aa2025db4de3182e1ebe55e2
SHA1bccc70ed250c48a898d4e6081f505b588829a142
SHA256cb29976e456bac726ce29f97c7eb357c01f0e84b9c9286b0afbb0a4c16a58c31
SHA512d91f6d06c8675304386913469977f5ddd7dd5c15a6798d79b4627da761af8d5c37dc248513797f4f9eb533f5d33b3428d63a350ae749ed0d4ab80a27e808451f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaa4867f34cfc98e4e422726de768513
SHA10594f6effa9dd4b68792bcbbf115eee75b99aa98
SHA256a2927f22fa0e0ffbf5a2d61cc3a1cc3dfe916d690cf08c4a1079d333ac93a047
SHA512472adf1db81a41a661d00782c7d85596721cf8e0a80582125203e8c3a22e7b3f54d6677b2d20574a98541c38ed2f950c8b3204b7e11955cd96e83a8247989c7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dab026b9f8a0e1cea75f4d9bb5efeb87
SHA16ab77d3b70da9c3cbef62011ae06c3827ac42d51
SHA2565b43ec1d0c66131757dfc49d8591620128c75053ccf3efc8e7393beb403ffe3c
SHA5127d52ea54feff29a96e748acc7e864efc3085c2ffa2084b0d4f944194fc0a95389ae5615d8143ec1c04595f156a6658babaa03faf6a633ff0372038ddce817438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df69bb8e875d64135471db9da62778b0
SHA104f552556a61599f0c372b3b7278d3ec55d7f10d
SHA25690049af535f0f57de66b312d2ad086e9d3b169185bc92b9c243cfd17af876feb
SHA512d5243a725ec2e174d450259a1502ae1f54f473c9f89eef3634b10caf2e7d59301c83c096d9137ced8a5803ee3c9baed29b77a515be9e15681fdef565279e2ba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5002788fad04e68e2de457e0cf087a8d1
SHA1b822205074e0fc3ebb28e03c9931870a0e012bac
SHA256a61f106f40a75a62ce4eda45b238fe49eb77b109a48c560cf21bf4898983e93a
SHA5128513b18c6afe434b647897e184ad888c90ecf99ca7eaa63b142cc23eeb32efd5b77bf566669a75b0065692b14b05e5bfc9cec98e186261a8e8722d536609dbbd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b