Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 14:21
Static task
static1
Behavioral task
behavioral1
Sample
de61ca4a27921d1632412b9fd517648d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de61ca4a27921d1632412b9fd517648d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de61ca4a27921d1632412b9fd517648d_JaffaCakes118.html
-
Size
14KB
-
MD5
de61ca4a27921d1632412b9fd517648d
-
SHA1
e5491de28a7716723657e715ff1d4d05c90db3f7
-
SHA256
64e3aef3ad5581f96360a03cbf256dd76639966342b59d4711462051712b01f6
-
SHA512
6eecc4db0daa642cce194a020611c76e113f787d84df494d532fe1fce81d2a463536baffb00987a17bdcdcb653bf1c16f162199e35fa2119e5f5f06d45e015d3
-
SSDEEP
384:CyiMKPjWPX/UqrIaAi7zy1wDMM2kPjBjyhBHq:CyiMGjWPP+aAi7zIQMy1u+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000095cd4973e73030a1e6826c914ce492b6b3a9f560e54861b5186ad74de395faaa000000000e8000000002000020000000bca2df0f43be0ab4ca0e3934c2cd9c581d72c07de20250fd51d197deb63bcdd5200000000aca43e280f4ba64d5360bf2d4905f4168ea8b8e68362bcade471876d2ff44c640000000f4aeaf5f61d74c54dc8d085a74f32256d69083a00e617204f936dafabd4216a5845cdfde86fb95dce54c9ddfc3baa1e460a6a09a36ca6b85983e7e2a39bd3fb4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{890C35B1-71DB-11EF-9109-7694D31B45CA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432399185" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e09d435fe805db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000d2f9f5a99e49dd32bfd325edb96b8dbeb9dc3d11e4b911fcf318367b6637c547000000000e8000000002000020000000f6160cc1923398e612e1ec7b2d4649cfe5fcaa6402b21ccc43cfaa7ad2ac65f5900000002da0f0f64f80293ab0c1c6bc12d42e62ceadcf510f8304ad5610c7bdf57962c530f413f704e1354fb37ddafc47567e75cc1ba156ca85b6b19fcdea761925403adb3818c28937c044be26a4b4d8796c8d74eef950b21dc4695a4cc45d7b0c618865491f17791840b3011da25e31cb22defeaaeb3764387df0b2073a8ec0799d8d77c783c7cd6802a061a3423fa1889e8540000000583358bf4cfe555eabcc35845c437bdb7cc006cd14b11e2e5a943794e8caf36c88a8f31741cd711f43ee67d726f3197beca222443a5e685b42323c02c5577872 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2404 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2404 iexplore.exe 2404 iexplore.exe 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2216 2404 iexplore.exe 30 PID 2404 wrote to memory of 2216 2404 iexplore.exe 30 PID 2404 wrote to memory of 2216 2404 iexplore.exe 30 PID 2404 wrote to memory of 2216 2404 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de61ca4a27921d1632412b9fd517648d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2404 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58059388eabcdc3d21c3741a2883c8355
SHA1514cd23d4e11d45cc7fbc2b4b30fa9fe374eab14
SHA2564876f02e868e345110a74a9e3aeadebed0aaf820b03d6f76c09482d7e3923202
SHA5121ec11df1aeaf9c445e9f39cc2f73bbe49859377b184253f85147a36df8d1322d57c69f7a99d4853b097d52c0a3f9b230a2682f7f30d248ebbcfd8ed2e2daddf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50adeddaf9eb2e91efad75f363c9a5a36
SHA1ec88157cda8bf01079bc3341566b3b008eaf85db
SHA256571f7373d235a74268d74e57be74b7a508c86c2921081ea1368525d535f12f7d
SHA51227631c4f591a18c20c947978e36b7757e142894012c80a8cc74a1143cd4f09a706c73bf75f491ba385c7a9fb6d87a59cc7d809aa2cd808741e588520b73bee18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc13a83e71e900b02d96b8b3e16f07e1
SHA14fc2a4a66ff12605f63f8dc8d452d3ab0f516c28
SHA2563c981f86bbd17dbdf3d29b897724bbcf19312beafe45460ca936bc02ed49cd3e
SHA5128063ec4064e1abc0811337987be837bfe1d96104de74817b0bb049c5bd3e011927a26674caf84c665691e4700b8039dfba4f3dbfe16380418734d899b3375e7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec1764633caa67cb6770df21e80cc8b8
SHA1ce00b148353d10d894d2871e4dc47ae29dd5c41e
SHA256c8f32674d9a181e1e4cca7610ba344f5a0026908fc90b60edbbfd32be0bd9435
SHA51281b2b3e6992438025180379e45448ed2c41a72bac010a37d5d7fa454520441f99e57f20e006578470f89a06421dfd0f6046c4eb6289a3fc5e068ad491a7c0438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae74d5c1a5beea4697408f09ce2ff6de
SHA13260b9678c9fe962233a356aabb3a8fb91cd1a0e
SHA256cdbe37915adda25e62d12deabbe0de78def2c7b6e937b6215b2eb73a672978e9
SHA512f0e794664cbc34047eca7e20a91001f0edf4878171a218e34b5dd91cac36600d288ffd0cc91a160c5ab2863a3817a6cf28accc2202265ceb6b5127da49109c74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d90b315a1dbe907e7c26a2eb024072dc
SHA1362a81afd1ede8f3a794d4c0f5a609f719a643fb
SHA25649c168ec041ec7f2ad4c8d0c2d2b652f38cf461c37dda6f5f5d3b50f1d83afc3
SHA5121f1deb8cc5b5de1827e5206a6ffdd773282c68ccf2efdfeeb8803555a2f767e5220af0f3775a7bc8a05e094da6daed0de9fb5434ed4766617ef0474117cf4f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50028a16feb3c59893472729a01fa7801
SHA1b95c04a6ccf993258de1e09a6734e1edfc2d611f
SHA2560c3d3cf805ff775f562621a73d051894ef288e800be752ba31204d1eafbe4e1c
SHA5129bd62e00118fa65e6fc5114d30fa7ef18bd5a553ac9f518cbde02caf78c96a50363f5d0ee5ab7c1a5546ecf8de0a8c3228285c5296e0e67248cff6fd664cc158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51259a720f95bed4823a44504083bdcaa
SHA114896f7096682ae4ed744a05f14e9fde4e8b7ed9
SHA25661a5713adac084209b583c2eff7544607bee5760babd92f10ea746f37ce226c6
SHA51295ea3b6140fd32207ed70896060d6b57c5f05b543f0f11ae4a191076e18635f838bd10614a075c64a4d8322a06cf6f4eaffba3df27855f20fc3f1ce0ac4f5c57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52026ed8c464b0f38b0a7c68da1b4ccd8
SHA106badf736b4d72c8f9ae14d16a626359d5712eaa
SHA256f17aa5d7a965c973d02ea1af556fadbe5c899493496dbbbd1079b7600cca1978
SHA512f37528400fa78a95ae3624a3a5b847f7e6788c94caf05ae4fd878f471c1a613186c26d6da2ab0dec0ef24b2548de29c1e428ede8779f8ba5cd0d21730763f799
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcc7cac12a762245dffdefbee6dd1df2
SHA1fa25689dfbc8babf06be14364c477b5eef85a50b
SHA2567d29a0ce597f5b90a4b33e1bafef35784479a28a3eb8636d50a7a20b18e95220
SHA512e1040c84bae79ba108b7e7a744f8e4cb6ddc4ac3e17bcb59dc9d53e9d38ff8494131b0f835cedeb0083a2f1825230a9b228f976f82d4f5db8d22d3791746c13f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55df117f373a3d299b0c5fb9899249406
SHA16ccf22b5adfc284f5e7bcbd8e3f849c252f13d88
SHA256dd66699740df675e97e7e1bb62990a933b07867c4ca38d35be3150e3a7b2fd19
SHA512e9c9c164cafec220cd3bbf19624163044de9e35aab0605fbc083e84f1d662602772ce44bf78087f61a8c9429f47ebe77826dcfcfd5d675ebbf280146d69f1610
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b