Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 06:03
Static task
static1
Behavioral task
behavioral1
Sample
ef323de602e0ad1d924df4f8338ecb76_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef323de602e0ad1d924df4f8338ecb76_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ef323de602e0ad1d924df4f8338ecb76_JaffaCakes118.html
-
Size
20KB
-
MD5
ef323de602e0ad1d924df4f8338ecb76
-
SHA1
55b0c7e0b8bcdd7ae20dc5f20ca523501e6db669
-
SHA256
e51910297cfbfd7d686c5a523b4645453aa9b23914dc3d4a9938d65dad73b8b2
-
SHA512
09bee5e106e078d7e692964a3c82a4e9eacd5586925e0ca49b384b4c60d3697ce928fc04b0e1883b35f855f107073b73b27de832ef9267588ac8a72fdcae5614
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIq4SzUnjBhSU82qDB8:SIMd0I5nvHFsvSXxDB8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433060483" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3CCA6C31-77DF-11EF-B30A-EAF82BEC9AF0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2792 iexplore.exe 2792 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2740 2792 iexplore.exe 28 PID 2792 wrote to memory of 2740 2792 iexplore.exe 28 PID 2792 wrote to memory of 2740 2792 iexplore.exe 28 PID 2792 wrote to memory of 2740 2792 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ef323de602e0ad1d924df4f8338ecb76_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f6d33ea00a86efce07d4c0a00f9d65b
SHA1df858d4db646cc49136294a66098934f33bcfc64
SHA256392bd36fdf8dccf5abdf786e5db41fd8b9fa02fe860f0e903f14b52e09c333db
SHA5121a3b5633991d84072badbd3a95b7f8aee139d1ffede9f8f02b02c11bf1615b990ed7ff2b53d93b9430ebc23f0978ec1200deab6dd0b36b3021a90771a72dde7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3bbafa7cb6e4c254e2afd465168e536
SHA1a2571d4e5b4c9334b01a65c0e0e3c03d5587f9e4
SHA2564e35f843ef7085cfcac887f0e052a5f88621050ace36d86c45e7dd58f8117e81
SHA5121c562160a8917450c5290ee7c173a4f91d79e8b074e50f2f30509de1d24eed91dd20496839755ea0fddc26d5195274b41b22a917bc3ad98a2fb3eb353666a194
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b147ba66ac01406f13f3e02ebbd75ba7
SHA1d972e32e44f674d37348976607c6f760f87f5bf1
SHA25671b3acd9738a5bc545d4c1bbc3feed31a2a2c8abcb8b50781bfc7c870d83ab4d
SHA512d2ddc6fd9cde8020d11c4c703120670934d27471b59bba9d97429b04f8483374641e9b215eea5412dba8ec3b678b0afc5887be5c7c9542f08ca38cb16f90ce6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4f2552fb59408b1033ebb0b7ee8f042
SHA14dfc8ca203b4a07208a121b2316b930cb866094f
SHA256fba8600fa2252f8182c9358902600b8d47759d51e3b2708b1a79b66a7a2a8b58
SHA51282d2831fb4c180dc298154c36381fa066ed0454fb301655d0c2a3b49e015619fcfa56b6dc5702cff2da972008e0377ccdfec0321d8ff8ce40ebb7cf7def5cc04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555874f80fbee004ec908f8b09b72c834
SHA1b3bd0d7a2c28ce1e9d50ff4fe1152c8f0dd045ef
SHA25683df1f1a41cdc48ebb989a1e6d1548b627de4f55092fafcfcdf246af87947048
SHA51233e4ce8368278f019af0cc6ceb3c4ce68155af7d7e1ac24c3b079a2c7a8a4f83c25c37987aa50cd54bc20f787065aaa43f8818ece1d82c0a17b86704ba0ef833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce3a5a05d8a84d98887e49f85c4d57c2
SHA199669ddca7e853d8f18ca1180ac324136b86ec0b
SHA2564f9e70ad5ae14ce08859e56476618344074bd826a9d9192c95465de85a283d17
SHA512f971f9b5e4b407eb5796e54b706d73fccd3a3fe356eebec09ccb9546466708b08db203f3cb17d22f7f4c7bb864ece3d11b6620aa4842c5c991c761928c94948e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5c725b124e14e11b858f9304adca896
SHA1f3d6f0b34f5b218f8b019c67ce5728abdbc0b3ee
SHA2568b8751559616420eafac1030e06050e563855af823cdfbaab99a95e5157a886a
SHA5128a037087eb0853e2832513e2bde7858a137fa744fbbffde5c8944532cfc6839dfb966c734755fbb16307e796d1d3dd28211f3e46c4e81bf4a30ff1fbd84e0e24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fad07aa1f99b70502530b95f128177e
SHA1cd9a5845b2b2e6581244136aab7bea61c640d9cb
SHA2560f659702db4137bddbaa3ed69ba959ea15b5e2755baee1c216342024988c7176
SHA512e9aea2eaa469163c41502cee1fb2b5c1854d4b459115f8e83b3b225c4064c21fc4b2d80920cf12897dfed833aee5d40c0ce8347fa8a51c674d18bab31f54b9a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d5eff87a4daa19cde9f1634859f5e6d
SHA1c49c622bc83fd5654e570b8d82f0b5a9a623a7f3
SHA25687b79d9164b3a1a9ab7dc3d03c36244edf6b77b87ac9bf914d3888996041379d
SHA512b701694fb053dc7ab5ba6a6be79d7e224da6a9efe9613bc25d740daceaa08bf0c987fafdab70586a9068ac9d7690d789d311635661a23bd25dfac3f9a3367445
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b