Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:18
Static task
static1
Behavioral task
behavioral1
Sample
eabf0c3d0999303d40b481e3c2b201a8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabf0c3d0999303d40b481e3c2b201a8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabf0c3d0999303d40b481e3c2b201a8_JaffaCakes118.html
-
Size
840KB
-
MD5
eabf0c3d0999303d40b481e3c2b201a8
-
SHA1
4e893224bdb358b6c51bf7789e84d3e8f2581356
-
SHA256
71f4ddb8e0e08c6ea8b7c3c4218542b0884b1832b5d07b308d017b7c33449d4b
-
SHA512
e8f9c77f62e53ddf13c454e920d9c7837e055af691b141833c63ed854f75b4b1c93ec13e6439d3fb287ab68ba3a45a0a2e435d08e3b9d1afd20efde3b71c4859
-
SSDEEP
12288:/5d+X3ZrscWy9dHn6CD5d+X3ZrscWy9dHt5d+X3ZrscWy9dHv:P+1jz6Cb+1jV+1jb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F89EF3A1-764E-11EF-A96C-C6DA928D33CD} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000081b6f4e0d37ae00390ab76b68d352f5b7fc0422692b5446a77bbe4098228f4f5000000000e8000000002000020000000e1b9a443ee53ba8eef002f5aeae0cbf3a494610078bcd0d072853226d5384550200000009c44fc22d3aa0b419ced3ac2701b193287963ac0e65c08aea35f80bddd95168640000000255c7bc1bd61a7cf68bd5e64e60cbc6220af210ae844a3fd3148b0fefcd0f344a66e5204d1f5e319766de699e37cc66a5431199eeacf8a5725af390c7e32ade0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 506594d75b0adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432888570" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2648 iexplore.exe 2648 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2668 2648 iexplore.exe 31 PID 2648 wrote to memory of 2668 2648 iexplore.exe 31 PID 2648 wrote to memory of 2668 2648 iexplore.exe 31 PID 2648 wrote to memory of 2668 2648 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eabf0c3d0999303d40b481e3c2b201a8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55eb3c2c3176fae1245152c765fd9ebd7
SHA176ec45c9c2fcaa12136f6bdf45915c4bf8b5b80e
SHA256a546e0ccbd52997f51e9bdf71c46c2a5b542a5cd22c2c3207ca0a5ef12607903
SHA5122325a9320dcad7609597f8633b3f2d2fbbed5b600c6e12dd9bafb665556e0a59f74ba3cccf2ab7c7eba2d73c78569d572a6eb48bbb1b7cfb4933d4e1a855c647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531c3d350fc332dc037a3e0c098e3fbbc
SHA16cf138d8bdffd1154fbb084d7d3ccf43a73b687b
SHA256d7464facd90a87c64152e3cf474ce74e29ded3360bf2657d4670d91e9799b6f9
SHA512e151025a80989da93cf773763141d588ab6308d905b1d9c8e24dfacb65c3a6895ed327e36dc010b5c58a1ccefe0a7da9f3b80f87af707c8d940a51d6ad9241f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ebb3109624bfabd67ee0d8329f5cd14
SHA1028946f971391179f73d7844fe88136bfe3a5476
SHA2568181d6246822c3167cde2e39d102103011d3cf93f615e36582d67f246c19b080
SHA512ad899b8da161e1b4306abcbb7e2ee4e30fbcc8dd4bf0a4877968552d2162ea271c1a971661f670e02567bcb310f47ea73d9738c0220d8e0a7e5b89e18cc1757b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec9673e071fdfac6e39bfd1d735c4c75
SHA1f7ee3eb64676247e64b41d4ac62a67f701d15d4b
SHA256552ace80ec5223547aa2499d5dde8bdc3217d6149e53264217e21dabbffac4f5
SHA512fdaf666dc18f6dce770c3c2f1fff8638a101763fdae10d130262ad306a266b01e4dc5f0ad1d08b37d4340a633b591a3701a9e9ef3f1a18163190f836906e6f9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfa9dba1541125e7c68e8b0b33eb2b59
SHA1cdbc74ea27d302372fe660a3959e9a3d7337646c
SHA256ea6de0b43c45fc4b668fca483bd47c05da1daf5990ae56ec4811dc4cd216faf5
SHA5123c660f51e0acb49abd0d64857b0f7ecf35e6a3e6ccc25b2adc551f2a9441720228c3fc04c60468c0b7d453a264c665df4cf4b0263563aa25c3cf3a3545c55b83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1b72706774f8dd1cbafa29eafb78ea3
SHA1739db14e4a850bc095586ea765f41aff71a7dcaa
SHA2568df113aa1565c101f5b7bb78181b5163457a1b50304058df4233e765172a5d1a
SHA512c42d44337a7e90581f85d4466a85df3c6f0aa4048f2eefd8ee475a315f475ecc4ece33c69dbd6f8086280ab5bd92eb5a90aa0e41543ae9ca77df712460101b4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58767bd1fee93eef41ad9127812302dfa
SHA1f6b28988fb25eceddd7a95bb648b031ac2b722bc
SHA256a9ad00b81c160eded5c1dfde56d1a2627c45c4148abefa83e739d4401096c832
SHA5125a8c0717d7f25c568b19f9a15ce89ba8e92ea7029ea5b5fe19fb02a68c64c5fc691abf2880993b5886e10eb90712a24a3b40af8f35f32dd123ca40e17096c1a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fddbdf57107172fd5dfcbd8e850dd93
SHA1caa0f499900d9c4d9de2bf05578699ed56dc35bf
SHA256def305024a0914a1eb4abc957e84e15d07e41cafad9805cd49ed2939c89928ca
SHA5127c17b58a9f062bd03d2ba839b5a22670f00af7809383b96c43d6bf083eef90ac346b7dce5126ed1b6f35e02643d2eb5e112244736981c7549dedd498f6cecbb4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b