Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:44
Static task
static1
Behavioral task
behavioral1
Sample
eac87aa7f45e65050c397251eefd5c98_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac87aa7f45e65050c397251eefd5c98_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac87aa7f45e65050c397251eefd5c98_JaffaCakes118.html
-
Size
25KB
-
MD5
eac87aa7f45e65050c397251eefd5c98
-
SHA1
f9d15bb8785efa5687637dc2e2ae03a0adede116
-
SHA256
eea64c29ffa011921cf04cd96b1c16dfe612c3a425b000a9367e8446b6540cfd
-
SHA512
50416f9e16fee4be8011549ff21f909d7f893d9840b3cbc224f18e2c7a426929e3cea224e75c0ef998e948a6a5c4c2fa05c6c53add87929c4c025aada63571d0
-
SSDEEP
768:SCVsvD/wlFlPNVNxNee9eW8D2rqPqjnEFLZ8F8m:SHvDcZjjYeV8m
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432890111" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8F25BE51-7652-11EF-93CA-E62D5E492327} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1860 iexplore.exe 1860 iexplore.exe 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE 2692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1860 wrote to memory of 2692 1860 iexplore.exe 28 PID 1860 wrote to memory of 2692 1860 iexplore.exe 28 PID 1860 wrote to memory of 2692 1860 iexplore.exe 28 PID 1860 wrote to memory of 2692 1860 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac87aa7f45e65050c397251eefd5c98_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1860 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585cf3b92853f77411032f153ca8d64df
SHA1c2eeba437f7a4ccaf91567b6fae646cf13fe99a7
SHA2566b638e5b0abfacb7f37bf515e4e3d9a42a74ca5a0d37057f477132114022419f
SHA512e07d8c7538220e48220fc3709264097cb040455660995d36e482183323775e08b87f0292bbebd32e7aaa72463c7d4f6e15d1d152c47e211f43aeb0d6d1161d6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ed5c49f4dfdb5ae134ada496bba702a
SHA1b15f99e650d308ff8ec499f774f45e0033928448
SHA2567c8bdff066a0d98aadd407c1b13a1a5bf2b1975be490ef9b3952c5fba794106d
SHA51288354df9c1f0a580388a2ba1da727539938bad306b6af82fb1b40a006389931f6b3e74ea2a6d75c7682acb6dfaedf7bf17fbcb9cb0a7ad633e923d068dc44993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daf84dcd4a3828f1f4f806c411439a67
SHA1c2a0a43908e50c84678d4e7f2e281daacb803b1b
SHA25634491a44365c203937e95ea3ee5fc1d01f789769ef8904269c6b888dde2fae7a
SHA512e04722cf03c68aa26c69527e13a2e9bde7b95f408958240c93cf277618060c7ce36e44554aa82badbca63ac63a9c2f9060f83bf6518137074f59b172a0aaebed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab7b509bfc70b697abef6beb572506ab
SHA15a6f9ca473236a6607458d3c36685be7de5f9376
SHA2562bfb9bd40baad283d3cc2d8a3618ab6c3299ad6ebaa3574e703c6925eb785079
SHA512eb22cd6d72e44fd6ba4e9f0993807947a83a6b3bc41237325cd5943ff73e388d5800d11ab693e6cddb4e34992f064ea0c39e666d52196df2a906e611b18f3412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529f1ae03bde6272e9d145b018ae3c898
SHA1721d445ef491345989c4216d6b63ce0b8d606eaa
SHA25660c7675a022e90314924ebb9ec3e260d66cc47ae546033f151af1d6465c1a13b
SHA512294bf63f45fb4eec386a28ff890dee6d14f06fa6d33ba619c1444c1db6539f25a8112e21f5b01ce3f9a91c93ca9de186a80bdd93745f7727ee576eac2378ecca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b3d246c6a01978a44fe5432840f65e4
SHA1d83d9374e1a5702ac83bb7d25e60106c4a7d0e14
SHA256fe905d479c23096ca713aea68ef653fdfacf91fc8f4e0b510bf7cac322c5c0b7
SHA51263b42ee96c2b327230a14e7d5a3e0de9f7bd1350926719a7f86640b3b648619b56e10314f14f764bcd25653550c5f9c4a00580c1ba35cbad973a6dc6f263d38e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b45c02c39fdab1b80cf998a2fe889891
SHA16eb94adb8339dbd6f8b92f0fcb408c776f5b6098
SHA256b47d417478c1dfcc716fefc60e4e70bf6445343accda6baa5978526b27a2b266
SHA512be0edb012d292ea3fc28d0f7b70cb2585b05e11659c57d8590db2f765557234fb25fd36e56cda2543d2993e1381f682ffefe377683dce42ae4cf7b261d7d81bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548631612c1acf0104c14d51258ebb596
SHA18106677284031758e4586637825b781bbb3d928c
SHA256e11303e88e9363a9243a630a5336340845d583cde388009ca664cc10195c35c0
SHA5122dd15302e03c0520418c1b37df188536d4efc8f39a34e9db662080d2ef4671d96518dcd0ca2beb8be6f0309303cc2ca6a0a20806f3145a2289e222871a851d39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e669528948bca4d2c4f8cd8eb089acc
SHA15a988dd202dd1d174ff6bc08a1f51668c00b7a89
SHA256ea5b5216a4f7acc858e3116d126aa5646011f013debdb65a4a6746765ebf0a80
SHA51233b12125b5b6f194ea4770453ebe0ba50ca0d7434ba6102488bc12a4d61f9c2a9f70661b0bf3256ffc5329001aee02d9c6bbd3659e738a4d5267fbdd3cb2f515
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b