Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:19
Static task
static1
Behavioral task
behavioral1
Sample
eabf45a1fb91ec468e7455e909fc544c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabf45a1fb91ec468e7455e909fc544c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabf45a1fb91ec468e7455e909fc544c_JaffaCakes118.html
-
Size
16KB
-
MD5
eabf45a1fb91ec468e7455e909fc544c
-
SHA1
eb62497336a06c0c7c0cbacddc1b576168967c6f
-
SHA256
188087182b72b0d2e29f581cbd8e62a472c81f61fcc3c3d43d41afc414aadb3f
-
SHA512
b52d5581fa14c807fd939eb3f462c4f004627c48695db90cc42d2e230580193dbd3443d54e174e0cb45e10400471b5c61d1eda961dbaf8b65fa7db2c9561e879
-
SSDEEP
384:lDmZ5OrR8RcrAmj24OGYKb0CKI/i39wFx0jzJf:lJriyrAmj24OVHI/i39wC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 101ba3ee5b0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{15D62381-764F-11EF-8C85-523A95B0E536} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000c3130198c531ff24c2c21875b07ebeff95412f321a73ab3744061d21e2326589000000000e800000000200002000000015ed36dbe763d3e6aadc49769c0898144e21016cdfbe5495271fdd600c82437220000000ca2bcea4edc3da18aa67e575d2096bc4e8be4a9594989919f7f7981b9e56685b40000000e1490f729021ce1d8970818560786047aa7a5205c14cef2c6abc3d514588711a6c966aa73b470feddadc2e6acdb6f43b786c19c31994173c21a880b386e75404 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432888623" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2148 iexplore.exe 2148 iexplore.exe 1864 IEXPLORE.EXE 1864 IEXPLORE.EXE 1864 IEXPLORE.EXE 1864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 1864 2148 iexplore.exe 30 PID 2148 wrote to memory of 1864 2148 iexplore.exe 30 PID 2148 wrote to memory of 1864 2148 iexplore.exe 30 PID 2148 wrote to memory of 1864 2148 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eabf45a1fb91ec468e7455e909fc544c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e06a9007664f8f01ad620a49adb4e36e
SHA153cef7cd331b4973a01a6a505d383e244385cd06
SHA256c016481caa95b9d0e53b1b94d8e02f6f043bc4b91ab71a3bf18517eb5d44b1ff
SHA5120028847283cb441fd166b13a7dde2c061a1efd6a8ef94f5dd0ce58fd89ae6cca3916114c989835215ed59655cee48ddcffbd571d148ccf9ac08c5ac1bae6ae89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589343f68560a4459c7b7497b5eb9b1f8
SHA1b66f61bf670dec009b07bab373eb8b9ddb7bbfc6
SHA256506c829613a6304eba8fde90d8667354d2b11b74839592d4fbf328cee1b33e66
SHA512e66583e9dffbda4d5f38a2dab712df10ba744220b173a102577fea86ea09d8af852feb0f69ecbd36233bdbd2045a195eccc598a23a7dbf141b362e810f09b927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b54dd9958671aaf8ad9778f5d0998deb
SHA1f77869ca5551afde2688a7fe1b4850dba58ff0c0
SHA25623ec4fbcbdfafa103c3372316377188b262342e1d1767a70a32f1474a8f1202d
SHA5123fa98ceeebc538d4a0742665c7ccaaab8b2bfea123c94f18528d9423b8f5726e8e24abecf7e470b01619f746aff2d9f27eba29aef6ddd51115edb6a05ae1013c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eddf5a8389d0d993edcc97e6487a4066
SHA1421e5d0c1cc933995c87f2c1b681c4b64193ed2b
SHA256c33007a43c1e7c43c32c1c090d0f0441d1b5bdc0fec82885e1bdc2821e329f1d
SHA51213cb6e0e0ab2957a4f677da098c3dcde394c579b1c2208af7e890fc970a709c758708e11b5c0a2582dc8eaff8355c3283f7359caa391b26f68b328e9139d8808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3ae9d5a5cdfda98d28663e3541cec5c
SHA16c79d1bd203f4282fde4605bf67833635faa0136
SHA25626d4ffb9f906118ae04f079ef4096e6ec55ad794394606b75dddc7867a660153
SHA51268289beae1be6289cf418f418e68b06bb4d5c8de9e31a976c536b2f8072de25036b158374cb00188a6bff282b40e067e5e9dff8e8952498842d0a3ca18d523e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50963fcfd71d632481697c2ee5b4c8aac
SHA1eeecca3439ee3e99470f6b6a4080dddfc39873ec
SHA256aeda77ff207a9595f7f68ce2882eb273454bb590c97e789aa10a07cf93a9ef3d
SHA5127178ddc6297caae39537cc110d4cff69acb8c64830c38b109e8da324f523aa601c0372fa12f39b80f65bef4488d0fbb4782f09c0709363e4c12c1b4b6efdc36c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53301ffe83fb78226e9a0148552635009
SHA1ae6010584695950cee8ac51f728c1261ace1f4b6
SHA256ba2ee97dbf1223f83528bf5dc556ac3b3ca2ca14d4f79a0d8427945d8c04ebb4
SHA512bbca56e98476a5f3b027a4302c3757dd0811c5400cd153fc47a4e64f0ae4809763abdd28d2e5f997dc898f7d5f0c78883683c253da4d64b91214e838fd35b842
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5189b9735a539481197748b11aa4581f9
SHA1eda4b144b2ac12196fafbba15090c53b3aaa2a6c
SHA256f1253b3685f2427116cc3f74cec805e59ddfd46d107f44e2cc90be21d4751680
SHA5125de3c0d12f96d4b1a16fbe72af4903e3422d506b7655773428397a6f4ab87d66ba4f4c9310bb6b4f1ea404e682c034a6793429d6df73bc3a794589c0896e09df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a211c54d2bef59f3b03d9513b23e4a10
SHA1249c148f440936d04f8a53f95a9b7ff7be5c8df9
SHA2569a589110ae795787bf35a9143bce660ed1cc1e28dadd0885a4574d2470aaaeb8
SHA5123ec29384722523a52ffae59774f9de547bce73299f3615e5570ea2423ed26f5a0d600efb6502896fe779491d38d9bb73b324b7ea6f687f18b9acd97834f83ddf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b