Analysis
-
max time kernel
129s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:44
Static task
static1
Behavioral task
behavioral1
Sample
eac899acbaeb4a7308bf35d35db8a821_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac899acbaeb4a7308bf35d35db8a821_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac899acbaeb4a7308bf35d35db8a821_JaffaCakes118.html
-
Size
19KB
-
MD5
eac899acbaeb4a7308bf35d35db8a821
-
SHA1
65d0ec18bdf8606ed6b5d74da7ea089370cf83fa
-
SHA256
91958e53f5727ef5ceef6a744286cc29fec541479c1045f72bc82bc6e65b0a08
-
SHA512
8ef1b4c0d16ddc821bad8daa039d16e2b563a66ba749eafdd61e98a460313aa0a1001da9bdc7970f04b93a9da8bd1f7acde194e50d58913a672388020e98f776
-
SSDEEP
384:SIMd0I5nO9Hio0076wCCCsKz0dzsvkD8mxDB8:SEco002wCCCsKz0dzVAmA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9CDAA791-7652-11EF-91D0-C60424AAF5E1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432890133" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2204 iexplore.exe 2204 iexplore.exe 1880 IEXPLORE.EXE 1880 IEXPLORE.EXE 1880 IEXPLORE.EXE 1880 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 1880 2204 iexplore.exe 28 PID 2204 wrote to memory of 1880 2204 iexplore.exe 28 PID 2204 wrote to memory of 1880 2204 iexplore.exe 28 PID 2204 wrote to memory of 1880 2204 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac899acbaeb4a7308bf35d35db8a821_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2204 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd97ab03be35f8cf40bddda3cfa1a46d
SHA1be729096668980dc9fe9915f1464ef58010ac640
SHA2564c7611c1a5ce3b16475f2ac78f6eb91a6d7bae0c7b537a2ea87423bc4505a789
SHA51213dba363d2859a7bfbed7a9350804e5cea5b0cf1fc6ed286bb31e6a85d8479426425df35ac3e945efd130000ac80ed580377341ebb6d79d290625c44dac5f635
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0a72e6189536c619dfa4f248cf83a82
SHA1e4c83c75faedd8286bac17064669661d20efee80
SHA2568b054955cd19817fc08bc8229b32a5bf3999dcd16fa958a8352c5514c64ee51c
SHA51264cd8572da04eae80e951b3fde83e00b5d4fad20b6b79d20d5526ebcfb5a768f694027128b109ba66c76c9a24410dc3f26587dbf2ae5c58b0d557307431d4d82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cad87b884d836c4c9107b59a1fdf29c
SHA1cc2954afe7159a53fcf7188a59ebd9a6f3a0b070
SHA25607fa61b54fe304b21b75e7ef28adabd65a97a42127e110a062fb6440652b37d1
SHA5125e5412ed02fc10c01f1f2fcb930df125ee00cdf2893bc0faea79fc440b1c9257aa07de1c1e3bc8a3e20fdf2ce680930f215bf0ddfa146589eb33287b109d9ebb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595d2fb442bcf394ff534962be2a39cc7
SHA1154711949d477fdee8fe2bc13b3f37b8d1c68f7f
SHA256cce068c0f8d1ee7510afa40ec3a88bcff6f0ceb79921cc9f47ee47ef31d7683e
SHA5125fbf56507f5ae11cb43774c0c12009a7ec6b1aa6ad5c59fa0abd1e6d0025da3b8f40088803e22ca500727d4a1f2be6ee0ba819e14c9dee2ac1b027316fdb9e5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5017b9b234c73415223c7f1517819e3e5
SHA1fcba93c022da3c07fb1a30471e6d56c130bf6dd3
SHA256ee5c25d1a7c2366d8af9565468331c7d6e9114633caf3aaf7eb2592036b4b373
SHA512d070204b4da70d5d2966465e85d5792dbd8db1f0474d8b59b0bd5ca695f1c1c5e2224816c81e85b91e4ba0c71fe3a18a98f87640af4279476bc575bfa0be473a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a8ed6ae2589a6ac81a3fc2eee1f6806
SHA11f52161d6f003512b2ae2ee9ac76bbc5d71520c5
SHA2560de50db6234702c2342a131efa0f95d4c64b351aaec48f32bc33864b63605408
SHA512a152199c5bf728462f4ea28b272a9f04b7b2c5beb43293f8c76aaef5687844c958fa1d1e25c553519f521f2a46633e529ddfb7775765763f9d2f3420ef54fa23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e051838c0d7d7ae3dc41bf33ebcbab6
SHA1ba3e72bac14788542c6c030071834ac327653a86
SHA256dd10eaa6747391835d50ada05f89c3c1b02a0d812849b378a5510f919be8b259
SHA51215f8721eca8ccab10ece4536734008a7d62d41163781f661a839021f786bc12db2152ff4893d8013493ecbc5ee0509021db8b8130253bb284393cfa3ad6b7125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a60847d3e68436b5992b79432516cf59
SHA141632db1253d0058280e1a02a7e8395da63bf5a7
SHA25628a37af8e79294345917cebb6a1da5c3020e16e2c002d696dbbb13654f0ed519
SHA512b80e1f23987274fb5dfe39ba7eb3c4849e09ad7fb5b74fb2d805a2d021bee460f53b8b431340b9e3d03c53723939507ac238a6919f54963f8535e3bd2db96c2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7eb3cfa33459c8e79b722f4090a86fd
SHA1a3f75ab9f2444342f816f7324e98b96077601691
SHA2564b40cf173e58355896ea39ee22a24590a3f2c7a599e725f7812c96ca107cdd06
SHA5120992e7dde6b1cf714ec6d6f120e5dc775b18077fd58283ba28c44e8868c87d402207dff26dfb58684ffcb253cb8dd590170b231c1b3d788136d293887ed6f49d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b