Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 02:56
Static task
static1
Behavioral task
behavioral1
Sample
ea75489fbd872d8a8c2aca4b978376b0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea75489fbd872d8a8c2aca4b978376b0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea75489fbd872d8a8c2aca4b978376b0_JaffaCakes118.html
-
Size
53KB
-
MD5
ea75489fbd872d8a8c2aca4b978376b0
-
SHA1
555de79dcf16999fd6f73de36838132f0d32eeb6
-
SHA256
98ffd6f856096e4825baf6d2b52babc567965e9f5cf2e9158846102d7a6f4737
-
SHA512
0d2ce10ebcec58f2a48b2cae9eca9c60390bc859ef471166bf464c68afb60776d9e01dcf229f2557cfb4432af1fbf73ddd17ba8993c72d735f8bcdbb58cae1d8
-
SSDEEP
1536:l1mAF3rIbOTtj2s+JVso9vw6x/emGYf414VDTu/QqMyCzBSodlhduXXWIjhiC82z:lgAF38bOTtj2sUuYf41oTu/QqMyCzBdM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432876477" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D0AE4921-7632-11EF-A27C-4A174794FC88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE 3048 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 3048 1732 iexplore.exe 30 PID 1732 wrote to memory of 3048 1732 iexplore.exe 30 PID 1732 wrote to memory of 3048 1732 iexplore.exe 30 PID 1732 wrote to memory of 3048 1732 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea75489fbd872d8a8c2aca4b978376b0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f470d7c99e1a6ea2d0a1ee7dcce7b64e
SHA1129019bd74d9a0468e2c16e2d26ad0775143cd22
SHA256600e6e827a05a86e30ec669e7dde5b24c4d59206f8477aa206a1774038756619
SHA5129c5206308c3b2da7d8f5f777924d7ef38cbf8dab4c6718cd27fb4e3d457585c21971c33555a1110b8b5b61284c7284051161bcf48582b68b8f28ffcc193199a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4b4a78133f06de5c8dbbd54c025068c
SHA1427fb49f7d3872964cabc58150a0f87785dab0cd
SHA256ddcb462d0e3175c6ed8486d5dc35826754cf81db00059ff837c4e02832c8b605
SHA5121a6fd0bd1c7de8d7112081464de6da3950b891177cd82027c126c908e1d508bd4f886195b94e48006e1bbe7f54d40ebb88454ff06d0a3ffb19a857285caa7ca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559a593cca4368b14c0290a4b47ae95c9
SHA1ad5aa358755e8fabd5aba8732f660450a5d040c2
SHA256c9f5a006251a998184a06083944df925e4af3e0c9cdc827df96bd7ae430918a8
SHA5126f46e2ead002cc61cd42bbfeed9b1040bb4b72be16d26213cb6c0024aadd86c1880c54a3faa8c90986d7c7ef7da005db802ef374c9e9cfa0e687ac2615a3c06a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa8a7f9bb69209c41effb5279e12b673
SHA1274a7a0b6c130cbbee558239b98af62a8273199a
SHA256228a486d675da14c6c2261ee4108f40e5cdfa885e19065d3473d0192b88bf310
SHA5126bf2de517bf42917c963172c2aacbb9c98b46de6c5d9e2ec47eb05a16331d0aca882ee3d5e14f322f9ac165d5e126278ea128b77685f9fb21b71ded5886cc256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514c548115646176eef3bb7c710dba8b3
SHA1476c577d66c1f9a50f0064643fb6721c860b6f7c
SHA25641a3ebbf091c6c91d751d14e0facefd4cf24bb30a0b9c493a79357a5e8c3dce9
SHA5128c34325d7adca4b778ee1df13c8f088e48763344c1d7749fd11bb9d8283a37215f07c66ca125bf88644bc641e4ca55fc5d83ecc8fe4708b4e3d018c295330101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597f60bd9ae4068a41fc8d857919ca9b0
SHA1cf896962a5d4ca2e2b30b09d3832061a1527688c
SHA2561e7621051b4e1b99ef2510efeecbaee8baf05370c433c2f8c0cec064dfadb1b7
SHA512f197bd02d7603d4a4ff79167744c68a1913256014facaf90817ad4dcc37b5a85e8000b4127794da2312b9fe03335b5df72fa269bf9282198280840188309ccf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7956e46e4307bc00a0e25e1cc75db7e
SHA1eadab0195a9d9a7c042741ace32e0bf85a80d4cd
SHA256c663bce2ae245bb13e35f2f6c417b33ce791d302ddb5905e0b41c74a9f4cc810
SHA5123e7063b07fba7dad087f543bf98b38ddc7f093c78f0ea9c6224ae68385715aaed61e4615f3e8560cb6bb30fa1d232c14ba7c47727917fee27be6f23983d2123d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2ec7ca2403dd2a338c5629e2df58f3c
SHA1a0b5fb959f8d4898fbf7e10d969db28e8653eb75
SHA256c4c4270e8417ffbc55d420d3f0c41df887173732786910b73bc04c6e03145f52
SHA512ded710d9ff64af6dc6aa4421f7a154ee2cef9c26d10104b7981f09764408072289334a1245ff76f035f2af81da54ea001a67b0ec80673ca43fa9801f3cee26d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524048e05400ce7f058aaf0c7c73ff521
SHA1ffd4242e1d6eee71d934b8d62aa016b40a980f6c
SHA256087c5230e21c76a020757868f4302513f6efe3a7b5061c6365529d5cba540472
SHA512a58e40ed607f6c35f6f07f745435ce701580ee11cc886fa1dbbba848b04a7ffbbad3a07a59a21253cf007ba933681275b34c689399c15d85e0901bc9da0e8a0f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b