Analysis
-
max time kernel
132s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:41
Static task
static1
Behavioral task
behavioral1
Sample
eab0c0bcf335d0d8db09fd6a2d4b6c56_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab0c0bcf335d0d8db09fd6a2d4b6c56_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab0c0bcf335d0d8db09fd6a2d4b6c56_JaffaCakes118.html
-
Size
19KB
-
MD5
eab0c0bcf335d0d8db09fd6a2d4b6c56
-
SHA1
001daad4f0871d8fd4e264ebe12babf011ea30e7
-
SHA256
17e5ae8251c51319aedeb72b50b7b210b552ec1b8203b557fbb12f3e4f949056
-
SHA512
5efdb20f3e8da45be495c8b1e02bd04aaf555a14896eeccafb5486a9063b0fe1273dbdff2aac6a980cc9f2cde89a407142126b3ab49b5dbe28cc08ccb2c81b7f
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAId4fzUnjBhJz82qDB8:SIMd0I5nO9HhsvJoxDB8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432886384" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E1B3F461-7649-11EF-9204-FE6EB537C9A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2340 iexplore.exe 2340 iexplore.exe 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE 2472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2472 2340 iexplore.exe 31 PID 2340 wrote to memory of 2472 2340 iexplore.exe 31 PID 2340 wrote to memory of 2472 2340 iexplore.exe 31 PID 2340 wrote to memory of 2472 2340 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab0c0bcf335d0d8db09fd6a2d4b6c56_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2340 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c3c6fa3ce50fda51846c283e199f682
SHA1549750f082ba1d07a79d6fa2422581be99913287
SHA25613ebade3dc54a44954031990edbfdb250c6524b6c14a153d01d9fc38a279c8b1
SHA512dd53e44b605288f6847978bf7cc8cc4d7a7fbf8b0250ca602c1842525a78d76e112da0a98237daae8823c9394d20aafc6c248fdd728bedc34167f34124eb99b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cc8df1fe79000fb633e4b8718f663d2
SHA1ae969fcc5753c94a1da508f2c2847a6e077d5976
SHA256a216f271aa6e934d4e1b88107740c8e4d7c09661b21425eb8b89b15f5e8c4551
SHA51290758c2a465fc6819bada74e4b87f75bd061332f8ba822be4e8ca9b7d00dc8697348d810635fb340c96f1c1c74798d9ac64d90f5b3e4b89b8dedf5d1ac4736ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f65f582aae740d23b834a416a0500c56
SHA10dbcdeadddcd7dd74795c818c95babe3e54fa7ae
SHA256295cd0a252acd5262df22ee9adc027e7d7a9259be0746954f42c9538d28ad468
SHA512ab3d76c139024bf1304bd6d89fac51ad641274135e45176fb59afdbaba2b43f436559c677f65b79f324f436df85711fd5c2a4bd2f53b6b74ba03b0a3d1dd555f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a22a29ccf19f95567118c693001c0ea9
SHA138abdc160323289f8795dbe0c438cb0a08636248
SHA2562a5a91571f813066a34cacfaf106a3c1d388fbd09c905d2a5ffc75899aeea77e
SHA512dab0893959625a05e64b5469942704afb6ceb6368bfc6caa1a15cdae7b39cd9a73033054a8e79508e0b442f51e297eb2f56b37f7479bc0426eb586c449f801ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da1766bd662dca58467e3a52d03a7d2b
SHA13f3c14d2f66005d559f1d25a70be92b0bd9986dc
SHA2569fc91c744d87b260928823d1ab27fd0c3b134dd33ff11a19263793b7831012f6
SHA5123212f8aae176807eb4292574dd4da8a60321db4d51cc88b1cfb4d04ea8278d3d78c5451db6427488267f371e1232399c23c5951ccdd58d75d9f90c51edc3f73f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5861305d9ca2fec44cd2c7ba0a8a7e44d
SHA1a8741b3592e44f314f6be48840a9c96d300286be
SHA256f411c269a6ae81c9a337a85ea9d34a212e8c82783757d50d93fa8a01aeb4879f
SHA51239b3614b1eccd6fd5c7ac16f25230b146be5ec07478c5541f24e7ccc596ea39d926548f25a407ede64cd17880b45b220b532df5c63ed04a7bd09f295fe69d3ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2432fe77d2ab6bcb62beeeaf6f122b6
SHA1d6d57af3769235eaf16937034bdf11b5d7a6558b
SHA256b2a24d3c64114d05b593287229ff5b0fa8136e52cd54b51d5cd16d70be593de9
SHA512a696b293c716b76e92c0f0f3353c8a5fcdb92d287e9a88203b8486e828eaf8aef1afecbaf18cd6cd86ace1e25fd0aac990f8cb93c817cff28fb1fc1cedf06da5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5ffc3d148a9438dd3aa043e560fe0de
SHA1003c9a844edb0c80e82a185a63840ee7f839b576
SHA256c8a3d89990ac291584c67116095666443dafd600f8cc549f07c585ad9904efc9
SHA512c1a881eca428a6f34d21b499a8b2fef0ab5d967668467f921597d4ebf0bf61394cc0a66d98dde7445d051354b30bb1e04887dfbcb492337caa68989a94196fd9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b