Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:08
Static task
static1
Behavioral task
behavioral1
Sample
eaa4b289b94098a86a61befa57a2a33c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa4b289b94098a86a61befa57a2a33c_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
eaa4b289b94098a86a61befa57a2a33c_JaffaCakes118.html
-
Size
23KB
-
MD5
eaa4b289b94098a86a61befa57a2a33c
-
SHA1
470fa9fd7a8df757cd5cedb4d3f93e94190a468f
-
SHA256
d51d3c247f57e113586ca5c6299c4d54fdb92e1d4a1b08927c634bf7eecbc71f
-
SHA512
703ade59bf5d0b3e39ee06842ff362839f76acc1753ebbadea4b14dc3256509e7170a03737f337ddc6df13542355251c8adbf1710271831393b24da0d6832338
-
SSDEEP
384:SvdwGtJmKAbXLZUYg+a+EwMv4Gr44Ky3ASW9pp8B+:SNmnzLZUYgg1p8B+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{41D6AE01-7645-11EF-A7B5-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432884399" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2976 iexplore.exe 2976 iexplore.exe 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE 2712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2712 2976 iexplore.exe 30 PID 2976 wrote to memory of 2712 2976 iexplore.exe 30 PID 2976 wrote to memory of 2712 2976 iexplore.exe 30 PID 2976 wrote to memory of 2712 2976 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaa4b289b94098a86a61befa57a2a33c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2976 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5148131010707cfeef00e827633540e47
SHA16815ec5c319cf6569f7a8806a40ae3f3a92b6fb6
SHA2566a4758370e6a29331d908f9ef9d72745748d67ae1cc73d8a5174b0cdd7b53535
SHA512948f19f2b805a9f3cc15097b4ed452dccdfc4ae0738772733f4a22cc5f412ae5f25cca955bfd3d7c6113e1344befbeab3aa5b0a768f9d803febc3a392298469c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e9a0a0676de2b3274ce9eebbbf748d1
SHA1bd09593499b5a4b4631b418d27c209baa4d68621
SHA2568d031de1c0b141c1706939c525793fefd4ae09b3d07c060ff79f4cfd00cad36d
SHA51259631afdee0f39816eeeb67b6ceda73c182750c576d970dcae24440700d85957f09d7c6e45d9c6491e44784097ed97e58f03e9fb377cb4405d05d06ca28474af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2068fb2d8f510753ae1c365df5f8bbf
SHA141198655f953fcc633e0a17ce490904ddf8ee527
SHA2569e291bbefe2eb1971c819cb33e36d022e7e0b36e62f15b7c4f5c430113436e3c
SHA512ff7c3553564ecdce9ce32c97843cb5c2a8cce0a526c59c02c4e2017348d75b572d3cc7730c14739147d246478c9c43916409c2011c4dc45252ab9460443b64fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554277bc59742a13ae13945bf6de275f9
SHA1e8e121f2f48dfba1f829fa862666e8f5453a532a
SHA2562b95801e04c64d5da735d96f01ac6565ea36ff344360a14ecf90fcc3150b927d
SHA512ff22048317ce668870df1da2da046d4bf543cb3c5b7ac825c51a14c02d60de2faf27e945bba6728dc25d62c415b0dccda81c9c198e84914b95293132eb162545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55142edd3f91fb5ad829b38765bb58f3b
SHA1fbddd53568c581ba2c54d1444ba720e0270efdaa
SHA256f432ddcae08eb9d20018a3d825561ac1d0b5c53ea1b5c1951ec6a1a473fde5a4
SHA5121f87a4a2e37b6462b0ce98dea66e5ff9ffaf46cb17d4edb34223329631b3ed46b133e6f9370f23b6f90d219adb0586c276467a0a2aed75350f7ee94a41c6fc3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e47b853b7eb838c6ddad7a9ce3d83964
SHA12f7293c745717464b87cf81643f4e191186f310c
SHA2564cc8437e9a8712df1e9a9ec6e03346ff835b3b28f66531df0a6a86f078bfb144
SHA5126aa4c0f30eb9b5493b449d7ea9f5e6b3c4bbe5b3127d9f036af6edf6d7dc046eb236501d78a0e4bf647ab8c6889aa5f3b39cb2b5b8f9f88b21c779de5d778020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5360e0b7e22803dc7f64986690fb67489
SHA10cdcef1167e33f321edf2d1b10dcb71e5377be51
SHA2564df072c991a77b33a0bf1f4d5da533e5a135b3bd7763a73d4bc6ef15215d6cdf
SHA512d27b28e8956cbe2933ae0c5963c0a80d5a9a9fe7897e6ac3654915afd46727dd963a5983671f9ffa5f6b679f22efdd4a80a54532a21ac4a3280a59d4a46354bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a48f1054290e8c85250d489c4757e1e
SHA116b8e385a2028e57716f9fbab5394f0fafdef519
SHA2561506790196d080137d303559e7718881546ad027be3a68caf654cc19ea916b52
SHA512c6558fb99fc5ad4fc6c24299ab3e588b66dc1bdfb148fa25ae56f5ff41575e6c8941ab33334a755f495dff25bd544654e6167917fdd30ff213da75ace16ae3e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc27388f1bf902651a3de766f30a519a
SHA15c712c5fdeb25b54b4cfd6209fb45b325afa9dde
SHA2561c7b02b059e1685128ab779f2f2f94d3011503526d3f8b79c1f2584306f7785d
SHA5127dfae7962a58c4d9b5cb6191663eb035a36fa1b34ea5930407bbe9cafa0c822a87e4403c5f93fc64964a658020c145388c445a5387c68384b3467553eb73e4ff
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b