Analysis
-
max time kernel
131s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:51
Static task
static1
Behavioral task
behavioral1
Sample
eab426196ddb0c16f0b89a15de06cbdf_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eab426196ddb0c16f0b89a15de06cbdf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab426196ddb0c16f0b89a15de06cbdf_JaffaCakes118.html
-
Size
18KB
-
MD5
eab426196ddb0c16f0b89a15de06cbdf
-
SHA1
b53df9e83e9e59284c0cdc330a57a8b7f5160fc8
-
SHA256
6579c0e5efc132818946274a5d9da60c8af9d77c7fbd41100df190b4a1d34b5d
-
SHA512
fba50cce36d6130e5716c0646c0f9227d344d841b067e6f5b5424bca2386115bc4e54b0bb2a7cc5e133a69484b8d2a5953be65ee74b3f1cf35eed284c3fbdb15
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAI147zUnjBhF/82qDB8:SIMd0I5nvHxsvFExDB8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432886974" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{41644DA1-764B-11EF-BB30-566676D6F1CF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2948 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2948 iexplore.exe 2948 iexplore.exe 1916 IEXPLORE.EXE 1916 IEXPLORE.EXE 1916 IEXPLORE.EXE 1916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2948 wrote to memory of 1916 2948 iexplore.exe 28 PID 2948 wrote to memory of 1916 2948 iexplore.exe 28 PID 2948 wrote to memory of 1916 2948 iexplore.exe 28 PID 2948 wrote to memory of 1916 2948 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab426196ddb0c16f0b89a15de06cbdf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2948 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52997b83358c9fd9106e8aef3935cbf37
SHA1b01e1b2dfdb86a3020f4098db0f88cf4e83d82cd
SHA2565c68a71b67e72f0cd5cfe755bea1eb621e0e613793633ea147881f942fcedecc
SHA5128b924276fe150fbf3534641b46312d8bc39ee96c576372216ac1cccbb0683ad4e83cacd3852199cbe8e71e06c6dd55543994d721b7fc96a4c61194df86ffce1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db35ecf1e8ccba9c8564b1707f396446
SHA1c49afc2e38265b611c191973d83a628622b2983f
SHA256e9c0103de3a0f3c532722e09a811b5ac69ff5e652bafc10f5e7003baed001697
SHA51220e8e5f1975e454d467376d2b2cee9286f9b651cb38c5ec2d5c03c01da36225bf9b50177000fa21d5b4cde4a310a57d273bf5c8f76b35446f70ba511cc7fb988
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594b7f31b7bf77487341777c5c787af6e
SHA1dc901223391d11e48880a55fbd84609b885e1529
SHA256aa1b6216dfb4db759ec25ae6ad26b90356288064df575c2040315e297be1950a
SHA512aa80068ca2e6c317fe650192549fe01742d7be80c1328a86a643a3d660e020c643b0cd87b27dcc5359dc6d7ac6b4c0f3fc2892a335db89964a14d4e003c56bff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ba9a484dfb5ebdee9d67b3ccfff8ffb
SHA1598bfdc4b859e2e00273ff7025bdee7a19288548
SHA2568265bfd09719be4f93aef68959bf97ab79fe51a41ffab47ee9ff23003338944e
SHA5121a568716c785b355fef369ff5ef4c26dee680515bcc6eaa792b3ff7738e180964389fdf2eac06ab07bfd2990379fd820acae3896cb930cfa1ee098ff61888740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d62c21f41b9b5ad247845b5fae28138
SHA1bf7fb4ac1f8ba2a730de05d2dea4007e06a034ea
SHA2561aeca14fbff14aae8b29d19006c9bd906e676f09ec78ce2daa35194ed07f1f0a
SHA512c892f000a2bbc1ec351a7af5b3fdedeb53ac376330f5fcfab1e647f74bbba42391eb27d5f9773b6855605809585d1d3ed9772c8215ba57f5766262beb0ea8e58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b3b594fe916221ec38825ed4f6d5d23
SHA11c4abfe5be368b00ea1461865cf1ae5302fea950
SHA256cfcdb2459bf37b7f63344474a0d0d39b70246eac83c174c4028f8250796a841c
SHA512e82299d7626487f9c15715240b270efa240400c593015be0865099855860cccbf8e558342cc76b7f4f47d8731f44111abe3a936022d65b03993f9745ff0317f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0324419f5a9a039b08f2ef272d5ca05
SHA19695992a13c27a7c792d6a56b90babec826712b3
SHA25657dbe2dce50f2bd88884eb4dbe9c30896df93f55f7a320c67994e57f97588746
SHA51216d6ee90e3d16258c00a8fbbe721350ba8ca635e8dbde55c6581153d5842c062389d94ac44b690a73331e44aaaaaa0b6c528435f493edbf3ecf29392b934dcf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a2ba2742da24e86e240f6fb9c9f9b92
SHA12ae2af67e57fc2b0705c690264b3bb3288724662
SHA256904093fc414688aa62dc73efdceacfab72eef15f1f525607654e30d8756f8920
SHA512f53ce2a2b2799b689a1fca3653486e348f3ba1ed02d557460b50125eafde7f1aef8d7123cabfd74f5081c8541f206df925309f3cf0d0955f721be07eae22aa71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5493a8dd8b666ccbd53e68c79de670c3c
SHA1634465ccecda7e7c53df33e4842cbf2d77def24f
SHA256f9fe97348950460c3d1e81fbc9facd90be0e85e2b405d018284ed2d0acfcec32
SHA512f0f553d44e44d676cb839b4405224f34ca7958b5714b8afd90a7dced5973e332e6667bc453109b71595ba2a5157227176631d7d5d42f8ba4d338c7b5a98e927e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b