Analysis
-
max time kernel
131s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 15:20
Static task
static1
Behavioral task
behavioral1
Sample
de6d41d0056f17808b0d006a6d4eb7c1_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
de6d41d0056f17808b0d006a6d4eb7c1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de6d41d0056f17808b0d006a6d4eb7c1_JaffaCakes118.html
-
Size
20KB
-
MD5
de6d41d0056f17808b0d006a6d4eb7c1
-
SHA1
4cfa646c22f4409c22b12cb01954e275c9596020
-
SHA256
08dc18d93befcd516e077ce6d39195500e1c94ddd23bb22a48df365a43759908
-
SHA512
8c1f8f183d91a3f5cb069af553e19a7b2f6ca94815ad5779d7025944ec62cdc9628a4403d0536a45319c1dbdafd83c0c09b035d60c0225c73d7ee86b1870045f
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAI24izUnjBhWI82qDB8:SIMd0I5nvHpsvWbxDB8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432402705" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BA8C52C1-71E3-11EF-93F3-6E739D7B0BBB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3024 iexplore.exe 3024 iexplore.exe 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE 2384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2384 3024 iexplore.exe 31 PID 3024 wrote to memory of 2384 3024 iexplore.exe 31 PID 3024 wrote to memory of 2384 3024 iexplore.exe 31 PID 3024 wrote to memory of 2384 3024 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de6d41d0056f17808b0d006a6d4eb7c1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db96dec8660f6f089593e5a9055972a6
SHA1ae8e9c26bf473a5f1b580f0208ba8fdad7bc80b7
SHA256fec3232a503e15ac8cb602a9682f2d4b3428f83f319fe0ec6192dc32ef35e6eb
SHA512248fa8920cfdcca392c8df15c509a6fcaea3928ff85818f6d41518384261b646a6ec990f8b9640dc92c4c8edaf1e07cdfe48e7c4da45af3b9d47854fe18e3ae0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5268d6e26750ba9217e32160804bc2e27
SHA15bbbfbcc7271fa0b90d10b51fea5d674dedeec95
SHA2562ef0129bb10539e7fc76028b479017acbd9fafd6654885480a23d9f3facbc7e1
SHA512b0629bc0bd1641a6bc53f3e624eace6ee47c82946493ca4d89410f8a752a523a359f034ac9bef3b33cd22ba2620f76303fa1c8c0a01ea7bcab4a76587a1eb63d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5685cadf82f376d26be57ea25c44db374
SHA1aed1918ef45b1c3c6ea5a033dc7359d7e65c520b
SHA256e925b3ab2abee716914670490f60a7d6f41fdf2871a2274b6d254fdd303493be
SHA5120d623b0b28cfdc44373f0ec836e699338b43cd5e2487e1b5c836cb8af326ac048acf8eeacdc4015411a07f82c0eb6057afd0ab5eb70d29db9ddc12eb996a36e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a17a405acb02fe0fee5a7239e23d445
SHA1b7ab9c6daf0dd48cb2325f5b0fd9000eeeb77973
SHA2569e715600f2981c1442987dfa71ab16c88a2b77c09ce54eb0f3551a42a81a0448
SHA512bbfe1aa1e2d6007be5c2ddcf6d08fe0d2b010e8ad9362350ae2bd1be841a5347ae64c913ff0ad5daad3243d33cbc0f118aa794c140ddf5fbe78351ba912891a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a552d345b4519e728122f12b06c6930c
SHA1370d7db0ad7afc68ce43dc4deaea8e9a10fd779d
SHA2563e6c58e38e068194bebaae5416d3c751eb4562213ef34c43cbf22ed9e440d822
SHA512324d2099f30c32b4e11b9e7900450f20f500331059539ca1c83878d6b531106d5627ac89c0ef63170b268b96c4256d62f63f9cf3b90141c963a9f5891d7c59fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565461ca19b32d6987e09911178b53ba3
SHA15ab12aae7da1efb1981150e261c65d652f1cf303
SHA256898cfc74f11ec3b835e2e7b493530278ec60cef97f2002b1ee1f7606ae09f8f5
SHA51218c4f43939572fb6fc1cf4dc1601a5fff5b749d19760d2583510668a0b0ead6029d673b26c469d98d27068d08d6cdcae26b4f4da51657d7bd2fd8523d962333a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50888f037e36be17b49ffec2e3441083a
SHA1160b61f73c413326407e1c83b63827732ecc331c
SHA2564e7dc84d2eeba3e668e8d1e6b62b1044cafdc9e86d991b304cd951c75e6e21a7
SHA5122df2ba237acba8eaecc6ecc1c1c28d65f0abbb493df54139bc4f2d763cf4c2f70fa0914516c2dca21f659f84fc283ed44da23a3dc5460ed1295bcc66a53a5891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3d5fc7aab4b2de63704d6fa683673ce
SHA1051e6a92eb1ce484185f8dc06b68e2af3e3765c5
SHA256b6f96819a6a30fa14d118e7a8f4fed90891bb0429cc150892642cfbd4ff9c7d2
SHA51248ca522fd4d5de27cc2892a1e4be3418b89608dba437ee4f3abc9dc52a9c7aac24727fd88924e36834ea071567a49184a25bb82dd1eaab8fea2efe1964ccb497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50072fc87039da2b672b6ce275796ad58
SHA1edbdb215e6067473332465e11131e1ed7fa27861
SHA2565cfabb67d9516ac4a2cf76eaa615a983038262da63caf7157fe9dd9d49c69146
SHA512bea395fbbb8e1d4e8be09ba8134134e07c617a0aaeb51eed9208eec8b7c6dbc4606acb1d3f0b3bb855149d31f9861c90a2ada8eb8dabbfa1bbce954a741ffac9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b