Analysis
-
max time kernel
130s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 17:06
Static task
static1
Behavioral task
behavioral1
Sample
e0a2cca8168563903c378ee9b15be979_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0a2cca8168563903c378ee9b15be979_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
e0a2cca8168563903c378ee9b15be979_JaffaCakes118.html
-
Size
21KB
-
MD5
e0a2cca8168563903c378ee9b15be979
-
SHA1
ac17abedc74c4d74a6ee00d85a9c17f3fb170248
-
SHA256
322e075835944c8e3008c0148d3f0c1e11237f68a8a3a621cca27c4c87862db4
-
SHA512
ff47e3f1690266b5dbf8a151cd31a8bd7af1046878322655a6f4d1e8c0814b7202da917d506d2eb98b854be701ebe5d4dfd0cb617e1f79ec334b9cf8e7aa9d10
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAIv4BzUnjBhrd82qDB8:SIMd0I5nO9HtsvrGxDB8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432495445" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A7D7D771-72BB-11EF-8967-F2DF7204BD4F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2516 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2516 iexplore.exe 2516 iexplore.exe 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2476 2516 iexplore.exe 30 PID 2516 wrote to memory of 2476 2516 iexplore.exe 30 PID 2516 wrote to memory of 2476 2516 iexplore.exe 30 PID 2516 wrote to memory of 2476 2516 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e0a2cca8168563903c378ee9b15be979_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2516 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6b7dc7f2f6a0595067594428bc4f1b0
SHA19b0159f5b78e0bdcf1345296261ce7d7123aec82
SHA256a78e080ebfe9fccd9427fbb6a882c9bb026d907e2a7289b4349703e2b7a968a6
SHA5129f2ddce72f75d7d6fb405b25049898631bfd9c6ae50395398f6c19f2af44b6a228928efb46d343af85d004230da240dcbac836219dcb5742fcf2e53527c9eeaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed9c3fde76aba9e4b4d56365ab0209ba
SHA14a34b7c215184f3b90fef2daef56c80d23034c56
SHA25662ef5c6665730f258378fd7f9ad0a35c8ca2da7f82d655ec780db614eabe2458
SHA5127f0142c545308a1e1683bf1d88f3a7b038374714531e749f35c1316e5e433dc763c0926d19ce37bde534f25baa99c9b76b2bfe39bbcd143c2be166c981c87dbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec899a33034be119e32277744bf64375
SHA16798e3a9e55f162fb15f5cd0eb13ce816fe0c503
SHA256c2ed6e7250362f5e1cfa92c77963b2e0dfc48fbe251cbecdeedc11c90dd76d83
SHA512591eb30427d51922c91d1b884ec712044358441ae4e356816078bbdc3079c309c8d0277a8b7aa1344b346a752632919d0ff5136f765073718ed14f35c565895d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd488e9c1483d929c7619da72d60cb28
SHA1dd515ab05142d799421d754fb4d047c8b1ce5d17
SHA256e705f23422f9d09e61fceeb8d9703341601bd00f702f5f34fb7fa1b3ca115691
SHA512c5f38b34f546a694cd140eb7eb4f23a2986e13632b1f90ffd90a932e5fd03872942b3d11be10c303936ced44be4b22811b72b053971b0c1669948c3dea2569c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5af5aac7ad45367a48f548c3c623485
SHA154cdc6753d2da79318d4e6b9043038223543ad13
SHA256259727bf43a4af4bb23f40d1ff783863aad956f05b8f2ec22da76d8ac94aa9b7
SHA512d0e3e0f4bc1cfa183b75ff2ece45d98338d5d83fe7580c84245a874ef536d8aad770accdeebe23bf70af3d063eb08fdcf4b29e46de63c4727bbf4ac26f35fbac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc13f621a05cf18b69387fc3cb935ea8
SHA193e439669e967e4c258c2c586249ab876cb116a2
SHA256a53c74b30b3a135d94a8b85f595720355c62a0c3a2b1a72c27642bdbbc5dc814
SHA512bcf20daf95c5904dfd08fd9d6d20739f49f86fa4ae1d3654db45a1a6411c6a1e3f0dcd831e118f12f5836e1d5a10110de3070ba87b2092ece31a5f35a9d851a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0ccf8364945a11feb2eeed0566f058e
SHA1b88f36f83c7a3c4306fd6658f0d5e52a1e73c2c2
SHA2568cf9c32fb7cb355b6a38ef3460ecec5d155b36ee4df0968aba72bf81f4106271
SHA512f2344c8fefc44bd256ce915f3ec679698bf301276dbfaa2d71a61cbd768fc6f96182611c82964f685413c2b274ae34a419fd6d777c429c717219db38e0b264d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5338075cdf443d711e4f5d2f5e36ac96c
SHA117412c8cb829c7636401dfe7619f5962eddc34f7
SHA2565515f4133fb265467b5474068f7a2dc545b7ee97a0333fdceb2312b556c86684
SHA51294fd313481e2686e18b873c5b22f5c3808ae6fa5abf2fd88ef4e40eddf6a2bacc2ebb58613022a4ecce052550cc3d41513ba3d15992ce86b8dbd9f13beceab08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da149361c3b2e0418f0f72a57422e23d
SHA19527d451a57abe7a7c35767dab7b9310e86b6cb4
SHA256c60da87a4aaf41653d99ac13ba23af6012f4229aeeef199a33f46e9c9f0e0690
SHA512fdbd6e506f1312d4740cebf54a428099471cc19a1b5761a79a0a18c6d7b06df10eb55a124e3b0796317ed91681e6ab462fc074dc15888d20b0d214dde6a6f4a5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b