Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 00:48
Static task
static1
Behavioral task
behavioral1
Sample
df3161cf61eb67791f6f5225a28d08a9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df3161cf61eb67791f6f5225a28d08a9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df3161cf61eb67791f6f5225a28d08a9_JaffaCakes118.html
-
Size
142KB
-
MD5
df3161cf61eb67791f6f5225a28d08a9
-
SHA1
d5a7ce3d10a1f8c276983b013a58f8f161c31d03
-
SHA256
c68b40131d4e0643acd4c53074cac6242212c438fcbb9d7628063b9b267e7a90
-
SHA512
c9bc6dfa028e22052df6aaecf056ee4889490f7f8095be8d753ee0b4122c1acb5980b8f8dd0a1455a0aad29d608931f69908e1d5bba883bb7a946a17969233d7
-
SSDEEP
3072:SWaYW3pt2x7dyfkMY+BES09JXAnyrZalI+YQ:SWVWj2x7osMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432436755" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{01329731-7233-11EF-9B59-D60C98DC526F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2672 iexplore.exe 2672 iexplore.exe 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2200 2672 iexplore.exe 29 PID 2672 wrote to memory of 2200 2672 iexplore.exe 29 PID 2672 wrote to memory of 2200 2672 iexplore.exe 29 PID 2672 wrote to memory of 2200 2672 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\df3161cf61eb67791f6f5225a28d08a9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2672 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571b47b5a4a75fccfdc3cbcdadcb5ec84
SHA102067f8b6147cc4838b738b24d4ae2795054541f
SHA256b6e9da2b7f292c3a7ab3a71298b695557274b7bfab7ecad2a96df00a8858020a
SHA5129453d1a6f771ba94b0f1498a3cbb8235fdbea1586909be873b6eb58667f3630eab2d89dff4ed4b072382fcf7946e531bc03a9da5524f3a16a2620296162ec3dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e61d4685d2b02a09ac29977b6e48d19f
SHA185325fcf8ccb5911f151bc2a5fa03b17448ea8ca
SHA256929ad0622cfc661125500b4e2f812503a9957c1002cf1088f5b8868084a10f54
SHA512aefe82e079f4649a4cc6e57cf0bf60530b59716e363d2b9f170453b189aad4ebd6de5202ade04d0fd5ba1b0127325b0ed83cf44b585f54e8d86d218d25bc34e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ea67d528415a46bb555855e9bbdfe7c
SHA16ac1939b7db32b4b8fd83554adff26ef0d1ab314
SHA256178e6cb3ba2458c3427563889ed5ff2c2e3180d88e6d4bf1b3be58b272cccd8f
SHA5123a096d3e3a30fab9d14975755b5a75fcb0e32c2cce0917971e37d6c187f40be8e7681588b88fc1a3ae4e3814c61497c372a6242bc249bcddd89c2d45d7718d74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5564871e012c0bad408328b17b5bcff6c
SHA151889287bc7e926a76c564696a19deb8cc5eb09e
SHA256f2e8db5b93408c05e2ddfda4cbaada0ceebed4fabcafa7723410627c832ada22
SHA512cad55042e032f474b4a22d72f2b5d4636e7b6ae45006cd0984c01a7ad7f199ce7fca4d45b283188014c4309aa8a45927fa1607dab5ca90f5e5db147181607bcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df11e95f881035654b8ab1daf71ddc08
SHA1c18f2c567b23a364583a0d4fa4fe5d12cd6c36ba
SHA2562cae37785b6123d0910add33c75e570bec35aa6f27789029a2bc8a50e1abc587
SHA51237f27e5a2c3afe1350e71d86085402fd05bea6ed01d5f189704e51de1ac988e78f796c3bb6533b21b80fb51f0ebdefd1de1a1acc733fedd1cbd5e9b57966f94f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5507fd72b119ba7b67c29ebcb62024e46
SHA10518cd97e95c05e92fb8a1dc36747e37ccc49562
SHA2565d14a9626c34f175978c11f3631521f2ac305cbe457b62eb44dbdf09222f512c
SHA5124056a979076a68280d086493740dbe16ce78514348124a532abfc364832e7069cb215861914b25be0a1def1fcdd0586261296202204db61ba5a145cf4ad77111
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58025c2c2d5c4b495cc9259d8fda2467f
SHA1f5dbb6dd673ad8b86d9616c1e5a3f550b85b76bf
SHA25659613c4368ae057583a95735488cc8c95db04a5446e1e0c5ac522f982ce12ad0
SHA512672aea3dbcffb3a2178fddf2a3082507e9538d54f2f63fcafae4bbbdceff18c98a5e66b4ac8247727392c0ea95d3463437dcf04b6c7243d1f45fc55ba1c2aa82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58241e10251bfb43873a6edd90bff7013
SHA1237e76a4f3d3e69f178ff6e1a8f201d1f9c37655
SHA25626a20fba4b3ae89392b9e24d9733fe6b8a99859c481e72f655837a2aa25e8920
SHA512565ca0e8ba94985fd637e5a4e72495fb94db4b604ef5303c5de6037c3897dc1672b136f274f0d188105e9c48d7b23c33251c03ed5049a81e64e8e7b6c00f187b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530d3f0b309fef5e63489f6eda16de353
SHA10eff308c539233df0c9095b21251388d6aa26993
SHA2565809619729e8cb4036a5bf7bd3aa99d4b64c2e67b3eede5dd5465878e521b3ac
SHA512f8f22b8291af45cad640a7a0b9e10653b98705eaa7413503bf0f454a219e3716dc6dc920c35fe1b7806d98acb9a330d77d1ee0feb336404360e4a5cbfcc6c9bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562727af15ce99ad935d33df9f129477d
SHA1a9ab51661497626d913d2db5ee59b01acdc119dd
SHA2563b39ee2b97431f619350062e0e1bd86c0dab3ddc42f44ba4ae716f987adac6ca
SHA51218384ce227338391de9aa9a9884bbbabba4f42c87cfc480ad9c10262470a5f46a376c082c0eab911cf28d5278e7723346c0911380599ded4caa08c4829ae0ff2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e323668babbb44aa759252d9bae9725
SHA1a6d7c01348d6970a97ea13a90c18407a3f9d431b
SHA256a78e0fbf181aeffd071605a07e2385ea281ea4972a81a04cc511f2ff7b141c06
SHA512342493131498935aff393e1e0670793f08d4c19f5e2ab1517006a00ff14aa1646b23ff7da3ac8cfee4b4eb2bb0983af000aab49401092611f68cfaec513edaab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e28e59a8777da212debda4208642be89
SHA19da4f1394986181f880df67efe490e684ebd3ced
SHA256ccd768243b3b230a68e1c06df0ea0c2b4c9f93e5d0cd843b5a45fff2143f0aaa
SHA5126b21cee451253563699945c86854ad5d3e3913dda977054cb1d4e8b84a0f1cd50c38af8c0c61bfacaf0b4250c864060058876d07632d4ac29ee034014cd22e69
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b