Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:54
Static task
static1
Behavioral task
behavioral1
Sample
eab52e8f25eaae6470a1bb57685c81ec_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab52e8f25eaae6470a1bb57685c81ec_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eab52e8f25eaae6470a1bb57685c81ec_JaffaCakes118.html
-
Size
19KB
-
MD5
eab52e8f25eaae6470a1bb57685c81ec
-
SHA1
ace472553c039beaf57878b32697d285b95d081d
-
SHA256
5dc9ee76dd53e52b1d30ea7d668f800043f4ab065f81d1d9a2c034f7f340a4ab
-
SHA512
9ad0ba130f7a707722a0f0f10501cb1baa85f4f2c850ac5683505f577a294b9b0d770f461c46e4300708c38cb108c9da59b9c5509132324208081bc27178cbcc
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAI03TTTTTTTxF3TTTTTTTxB3TTTTTTTxB3TTT4:SIMd0I5nvHdsv/qxDB8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432887152" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AACB7521-764B-11EF-9B59-D60C98DC526F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1140 iexplore.exe 1140 iexplore.exe 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1140 wrote to memory of 2172 1140 iexplore.exe 29 PID 1140 wrote to memory of 2172 1140 iexplore.exe 29 PID 1140 wrote to memory of 2172 1140 iexplore.exe 29 PID 1140 wrote to memory of 2172 1140 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eab52e8f25eaae6470a1bb57685c81ec_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1140 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58794bf30de0293c20a7e36f14a8fd339
SHA1aa505820a95263bc4b296b4cc8348959af1ea517
SHA2565fb5eb3a4dacfd994fcb6534d98f7b4c9047c4cce9d3bde0c43d41978e8d7fe0
SHA5122bc30b9ff77e3d441d18b4ecab54f2dbac42e7bb27168423ea3bd0961c52fed11e32b331bb2d5c64402d930823d026b7e0aebd13979e5cdc0493bbbdce5577ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1ea0cd3e9f0acda4636d03b3400ee53
SHA13a60d2cf6c1cfcc479e8754c954483b373102c14
SHA256ea15e241679ec672c1795c0d211fece082ea6ddea25624f80116be9839910178
SHA512c44c471dca3c827d49ec60e05273c7fc44b8472731d4abeaca91a255d0ad6846a0128c6fa316de0154ffa031b717c70ed2c1e1c598ea4afd6053c9845fc91b88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfba79d0ac0ad70515ffd4935b86650a
SHA1d50a7b763221f680b33fe531848c8200eb682829
SHA256b8778e28669881c05bffafb92f940a91c060d797f4ccabca6c21610c6446b665
SHA5122f07bcfcabd6fa5118e369504722f576d4698c9d85a191fb4f774f5bffac08f448d0884cf47b9c4d0333d343d88c273a733238571d789201f0ed6cb167d38554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517cf85f719779b4e401a0f7876897a0f
SHA1dbd5a56303bcef5097d3ff7a86de9867b078629e
SHA25655c9a2303b5a1aa5e491c91dc3b25b358c73da19b24902ea84b9bdc4b69bee28
SHA51257d6cee874397ca4c8358dc5a87c819031ccea88321fc02105266bdd68a9d54619aefbdf58c71b8f1ee0919d49d32469528625563752fa9948081915892eaa74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598da0f462c861ddeb2410f20b9799877
SHA1efd075083c4c0b1ecca803f89023d53f221344e2
SHA2567d39951fe7e8201f4a51457f935d606f09489615f141b60bbc2b26eb045508ee
SHA512f02fd5fac6788c21ed622577c0ad9ae5e13a345bd1ce74561dea863652879604290bbaf066e14abbeb621e12001a96882a505cd48c1a4bc9e14c9cf248d9b7b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d8fb670d95c917cfcb8c9b3e076fe91
SHA12ed0ad0e96d29d3fc656a28c6a607c1c34b2bfc7
SHA25617f042fd44dccd359217a3c8115872e1b56bf2a8bf2825ea3fa6d5fb5b818d69
SHA51269276ec0f0ad8ae90b4ce45e6c792b78fc983921caf521a57f555e4977332b0e0890f2fcd4b76ed5ea121f89b1af30fcbc4d7c16a43f879a147061ce74f8c55a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ae32a29324a4e669a658ad518186536
SHA154b4073fc9732f5e8341e50177c83153e44f9e40
SHA2568b8f1ec90d99279d7b992508a1281f151b3e1729ec9e036f87213674ae1c6ca6
SHA512a505150c94de5ab546dee92948c3df10f5cd98f5adad5e1a965ab80eb4475c2491f2fe9db6f3550fb55fa5e19b04e4253f30dfde92b615f1fbcdd861102449cf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b