Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 07:18
Static task
static1
Behavioral task
behavioral1
Sample
ef4e62d12b8564c36293ff001b992978_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef4e62d12b8564c36293ff001b992978_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ef4e62d12b8564c36293ff001b992978_JaffaCakes118.html
-
Size
19KB
-
MD5
ef4e62d12b8564c36293ff001b992978
-
SHA1
62a7ccbc940667ca219e51b58439488124cdfb7f
-
SHA256
742e812c5634ec169d85c9ae57c1e43401c6ea500e4ac719912c1499842ff4c6
-
SHA512
63cdb02ef6b3c8d87afc17f013bda2f4caaaae9ba292d2f905cf18da1073188974b228f9c8c1a72373697181ac5dc1ffed0792b40f5f6fbd33be826e6a0ae72b
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAIf4BzUnjBhjV82qDB8:SIMd0I5nO9HFsvjuxDB8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433064994" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BE250831-77E9-11EF-9A25-6E295C7D81A3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2828 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2828 iexplore.exe 2828 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2828 wrote to memory of 2768 2828 iexplore.exe 30 PID 2828 wrote to memory of 2768 2828 iexplore.exe 30 PID 2828 wrote to memory of 2768 2828 iexplore.exe 30 PID 2828 wrote to memory of 2768 2828 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ef4e62d12b8564c36293ff001b992978_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2828 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e22593086e40852db29f2e7fe8e2dd98
SHA1a32803e28df011d9336defb2481cad8755f9f4a6
SHA256a9a8d46b3684feebccd2a2638cae13da0f21da81fff8bde754abdc06cde1a2c5
SHA51279bb1b224891ca4b66581df2a8ad4d5ddc4c4371df3e8b198b206e0773f6b942ff8480d6280ee0fadc2c686b65182a2deb6206e7ca7a2f61d1e24296068097c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54151dac8d8395162e0498d97a591a77e
SHA1cb4320ebb6e39adee479b5abd07019671648a5cd
SHA2566b8ba9f90f9a4d6c9e36e8e49b2f0bb36cc588d3d82bbee024207898effaba09
SHA512e4039a68cc32d8c2220e0b54f71900475e0f6b2f0de0594d1d2a9eb844a23260e710f18d4a348c83bbc427bd4d556e56f822f8c84361e4590f85ed9d7f727652
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53672fbd884030be6f452c922a6b581f1
SHA14aab6c94d7c8643283b940d2bfef52333170bcfe
SHA25682d08b81e29ae5453bff5f05484edc7c5cded9db4037227685d687128e9315fd
SHA5123159adafa9868e48f62a9b314617a8f760b3ee18740dec83e4da1c9f7a50483ce29fa48c36acb9c74ddd6d8112c06b53c9b328830c7cfb468b1c30ec811b2dd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506e2f55ee08ace92f1af13c9002bc02c
SHA1caa79c8385d2b0245eac208fc67cd86736b6470a
SHA256fd9b462bb779993badb6a3092375363e94319f987cf9f2c7b2f8880e1d8129d3
SHA51284d3867f0c7133918c2a909ea05e310ea40f47a6ddd97eae21762feb4ab9ba6893a861a39a4332319aae5f4a50edd1fd81a03e2525dd05b0a9fad6c8419c19d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cbc0dcc3ce48c2d7665af3664bc1721
SHA1d9886907c4180559a63417a163815c27fd1293db
SHA256735617ff9d00d9e4748b95f5508401517af9f2dcad746016303a4815f900b594
SHA51285f8adee6f40947c2fccc84b8a3ee212bd7bcd3f838bfcedbeba41bd57d16098b708dfafdf3d0c3a15f68a1f93bd41d837fa6eb9c15dc34020351ce8272d1e0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2fe1a716037018814066f033edd1d3d
SHA1431d0df184966714ae48fb4c81ac99061862acae
SHA256f8071968a2dc8483153901dc3b8bf08beaa0f948537f7103d2f2a8cf0abccc83
SHA512daa9c63907d9306c70805cdbfee31c1ebf48d371d136479812062bb79cf923406353f43ae733cdae8e506b7f546085b533f5a5110254906d70536c2b57ea6e85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf35093f3c40fe92fe2074535096ce50
SHA10b33394884f1e24c88d941d81fcc1444882acabb
SHA256fe6ac8669f6a439a4597704a875bc0e47cf626a692d0f96017a0de1811708038
SHA5127467d1ff20d9765c3782d559859e8e54788e8134f6ad6545a5902792a4a310c023f623dcd60f48953207d6c75e5cc333f40688d44a9dbf9a33c60f98394c1a9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec8e5e78b1b4e82b2e9297f446cee3dc
SHA1ccbb2ca64b61a02640a0e9f549783f6035688014
SHA256ffd2704f892182e03b75843f7a846d55e70f39e65c6f7c60076c7e4e49408c14
SHA51286b96ca7d8f1913568fa31de7fae1edef31b1b6f1326685135576c5a95567743b1cd2a291f7f706e12b5b86a23851db9fba74abea42184c22127d142ab070611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567644f2f29e96a237a917fa3126d1f37
SHA15959c2853320971dd2ac9bfa929d9130705f0511
SHA2564274eb9725f53ca037e893bb445176a4b6987179c428c192cd4832318fa30cc0
SHA51280cf9d25488a65129145731ad8eab6474e7c326501d3866b2ba5919ff4852b9abac85e8063342064ac120f99d8d771816fd61928de13fd32406f33cc691c9429
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b