Analysis
-
max time kernel
137s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:07
Static task
static1
Behavioral task
behavioral1
Sample
eabab13d1edec90dff9f199b9c11bee4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabab13d1edec90dff9f199b9c11bee4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eabab13d1edec90dff9f199b9c11bee4_JaffaCakes118.html
-
Size
128KB
-
MD5
eabab13d1edec90dff9f199b9c11bee4
-
SHA1
8f10c5c906ce303b29e3cdf18c239ba1fc56aea8
-
SHA256
67443664d1e2adbb45ec28b2a77f8a289e528242aa6094c14f0dc0dbc2d165d9
-
SHA512
d48c5908666917f92b57dc9885dc1f41e84209f0abf1e56cd5e7b3f1b03bc540968f82d6c63d6b0de4e5ccd112addf2c2d42fbc31290491dc697f60f118f9d45
-
SSDEEP
1536:SuJFhyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGL:SwFhyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432887928" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{79F816E1-764D-11EF-B954-F2DF7204BD4F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2688 iexplore.exe 2688 iexplore.exe 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2972 2688 iexplore.exe 31 PID 2688 wrote to memory of 2972 2688 iexplore.exe 31 PID 2688 wrote to memory of 2972 2688 iexplore.exe 31 PID 2688 wrote to memory of 2972 2688 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eabab13d1edec90dff9f199b9c11bee4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5710967883e621a0b36cc226305605372
SHA185326242d02e95b39e81ecb7a7c6d1af752be10e
SHA256af70b679f88229fb7b620648f9857610bce860140e2e4212cdef90d22f1a0554
SHA512448e7c76af865750a66efea5059cad93ad113e07e7f5dbe69614d4391037e7c5f50d9319b27448f8b76b144f9a4affe8cedad93dd11ff5a856cac642124a43a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0c3061a9685ee5db57ebdbdb156ba64
SHA13f097ac5c0e3fbf99fa77724c50c06d7e751b5c8
SHA2568b44b22d9f9f20988c31f18c0149c7b8f236b7f2c5b77a3856ba1319a7d41120
SHA512de22417b1b0ce2786b54457d8089a04303fbbafbd8a2f573e6371b3b63e071bebbef83c0728b7306a586665bf4861061138735cf6c02b8e17a1046f8656ec1dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfc853c9abecc94e2419fa9af03a2196
SHA10e5714fc31fa2c96a074945ef6f5bd02be3e9324
SHA256c7eaa3622ff3699990e986a29bed3da4c47cef0d06902670eca91bb0de1685b0
SHA512afef48d334b1385c9bb78bebe96b889503426640246f6a098a25873edb47c70e6da0f66868e854c6bf29bab42b5b940d1886be4ba47023a72232742cdddbcea7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dbba3bc75c3279d3623db4464ba0d60
SHA19c6b3cf0133fb3ab5761b3d151060b5ebd7f6c13
SHA25625561dee1280fc44bf130f3f62ead10ec097efe45ddeff583443399fc06049a1
SHA5123a175b6ee41189c463e9774d102e3436d1c50dc68e16daaaeda88df2b43ebce7570e916519a88c1d6d343c709cbfd02da8da01f0e494bdb8de7123e41c294a87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58943232ae2f1585eea313ce9f7b9a558
SHA126a0f6f8834e4ac906f60e7d6c88bdd52c347d23
SHA256a2d652b2ee7b7ad858571fcd7623dab595c1dc80c65c76c92f0d9b669566fbad
SHA512ac7346ea61459fc5ef1bdad89cc32dfa70eec1fdfceb42f64c4eeca5fe3348ae43688702b8b50a88a2fefc33326096cc230c58d68fe5418824d9302c46737166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597d1538353c2afda632613c7980ea4a4
SHA18d1d4885cfc14f685545183f247bb9df843fe3ca
SHA2563f8aaa01a7cc81d5f0639246a0f8205a60df8898e2e4009ce9d8c5ad25e84629
SHA512ecde05bbe2c4738242c72a31a73a0fa6b39744289e0588bbcbe51a7fc54393e329081c6f94397a20a8aa007063f187dc5a9c5c0ac286983567cbed232e7b370a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1a6192c2741c912d158e80d00e9dcd7
SHA12f7807c286416e23880094844228b9c36ae1dfe5
SHA2567cfc28a9e67c683df25deb1670fc4047adb914508c9415592215d14c0d3c0916
SHA5125579c8e01adb6f80428af376ee774cfd49d820c75c723b5c486eeffb95da8bff26c458204ac7ff6ada1c629894b0bee975550d5a602d7515d95f01d667e005c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579ef6536a8868d46bf9ca1682116b875
SHA1c1d872883cfe03ed15a649b31a4a209180037665
SHA256bcd548774e43df6f414ed2d9d4f6482c98d04b1fcf6bab47d23f6245275b1c4c
SHA51200ad727af967f3e696ab35c8efc07c447e8a0fa6740988edc672f6f812b6ba00d2149dd0d560a2d2a8a5b1fabe98c85ab456f7a501a2d21a66bd7f7c531fc4ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e67b001e1544a518f9e2e5e325327ad
SHA13dd9c48d458099eefbf22ce46776bccce994152d
SHA2561a08b88f3af65d345fa6c886a86f1d4ff371c6be72024600b5ff07f9ae6840f8
SHA5120c3a0c2d10ee9a68d9be79351204ae25b1e81148bb3380e8b8a681f6affa6660b537169559f24f4860656374f7297b74e68a7f595a275bf6600ec8429dfe7cd5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b