Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:24
Static task
static1
Behavioral task
behavioral1
Sample
ea7e958ea1286ea04cec3edc39cf1573_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea7e958ea1286ea04cec3edc39cf1573_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea7e958ea1286ea04cec3edc39cf1573_JaffaCakes118.html
-
Size
26KB
-
MD5
ea7e958ea1286ea04cec3edc39cf1573
-
SHA1
7dc2153b06bd2dbac550527dd527aa2a8825a058
-
SHA256
d6eeb2260c3e80fb9b2552ff80e62270abd7a9ddda3c075dedcd0d7c87ba8f63
-
SHA512
da0eac572f2d3629c39854c1f59c0ccef9e3e7d37b65ae8bb6d6af52e4c6e7a55e8a4d8a4a8b82c7db3982635419f599252ad189c1ec9c87abdb0dcfe0479077
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIH4PzUnjBhV/82qDB8:SIMd0I5nvHZsvVExDB8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432878124" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A51EAFD1-7636-11EF-A0D9-6E295C7D81A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2720 iexplore.exe 2720 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2744 2720 iexplore.exe 29 PID 2720 wrote to memory of 2744 2720 iexplore.exe 29 PID 2720 wrote to memory of 2744 2720 iexplore.exe 29 PID 2720 wrote to memory of 2744 2720 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea7e958ea1286ea04cec3edc39cf1573_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2720 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8025c512df83d7b26d32a7e5f5c506b
SHA1ee31a6b3631c146900f4e836655af7a0124da379
SHA2569e03d73f23a3591b6a1c2196c7ebf3aa90afea6ee9de77fec1cee63b049fda73
SHA512acba74882ad92fb79f5cf03bc2d389c9b838fda1ff02899840aded2b79ad910192ca87317dd49205dd448f789ed0206a90f1968f7a6f8bdeb265b031b8715ceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f107b9f1036dd5a6f5d50f479e9a269
SHA16fe41ee05f92d7b23538d9248b4938557abaf28a
SHA256277a7dfff8f23ad941420fd76316f821c0d687ba8d3d48281a43751be4cac97a
SHA5126fddce20279cfb7ae2915c91fb3fde5dc6c9d1eed9727aa902e4bd95bf6d3dead755f3b7e47785bfd6689b4e292c75a14acf44e27f75ac667e1aedc123127ec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507b09114c43b559841d954a106e26962
SHA13c10cdb11341e1197ee75f73d33f5cab5269329e
SHA2567fd5492831233ce6876ad7980abc3e4d83733cd0891b8de67240ae09ce397fd2
SHA51296f623900e9e4556f85a3bdbd702cfc20961d0ce6d7134e3ba47d107855cc3ffa4edb9096d900e5cf0ed4fce9b828aa52fceac1519e92c832326cb720587a8a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecad4493696889bf35672843996bea31
SHA18a8d87d1962b0ac6ccb5bfe04c45739cef2296e5
SHA2569c3b1cf3e0d661d91bb38fc6d707e2c493926fb4667d56afcd935f10c0237328
SHA512082ff324703a5063606e607d249056b4df0f860621c417c5e619ca7c053e6630e95edb5b547e43d261548b004c9a8f6916979e67b2d053d541722be935a957cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531262f04b53cb48154a902362a19455d
SHA19f23cf83946a312197c558d4cb02fbde066f62a2
SHA256ec25a2769490326b1ac8079c91c0bde8aeba29d4b1459b84b0cf470f62f987d1
SHA5121fdf44f33e61332d6d40fa838b00572ba46c8345cd96bca6739fc7e75900e5276bde30116746c287bbf60c94c9e80877d9ac4327b5413cff15355d2924a9335e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b4d9351dca4199237f1d28bcb114cc0
SHA14a34f685c98f87861d7776b1b389658f78147d11
SHA2565b21a06f27f626c66e359403c545b88f2e3f73271778eb81e239e4400fbd9186
SHA512e6254e9916bcdf734c8477bd5c485c2bc8f2ca703107f96904bef97ce8a92de6777987fb97bb3b6a542480df901f9c731b6e4268cce91e4af809f473a34afd61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54660428a916952e90c5155444eca931b
SHA1368411d2e96ff99df89fd666db009d24d7c4c1b5
SHA256fcc227078c49f5f2b5f438e82de721f958f04aa99f055adb5c2bb5e1f4927130
SHA512c45dbe8ceec908035267c4ac7d325721151c28e1f5dbc7f03f1c64cea9fbcec75a7e54ad908758d97a0e5a44ba33a5f64b1d20043c69f31aa898ef48ca10c2ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55770d4af3962cf066d23afe596447591
SHA16b82632283ed24ce0ca240dc83d67e4b1293b721
SHA2562fafc5ef2ca3711a252e7c3ee8c46b85d17666382a25f7f8509dc86e8d278d84
SHA5125c87c3336e04619bf973781ec042b70d4d4cc862b7192da5da1631c7dc69c5138412c74405bf6b41c37d8637251065f404b899dc5efa62768ac83d8a45ff1cbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528a2939392012009bdf2d51dd8bdeb68
SHA17984f4005bd646949a5215345d1aa2fb771296f2
SHA256b40c7d50d9423b993aa833dbbfab840d7f0830ae7321ae1e3da456ed41a00eeb
SHA512674b341aa5483686788397bcbaf64d0aecc052393db6506aa12fb8e615671b2d438144682a2f57879b2d65c1c6119ace669b5778c89c395caf9a13735f5e968a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b