Analysis
-
max time kernel
129s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 04:31
Static task
static1
Behavioral task
behavioral1
Sample
f9b6022070ec5b8a701904460c9373a3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9b6022070ec5b8a701904460c9373a3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f9b6022070ec5b8a701904460c9373a3_JaffaCakes118.html
-
Size
21KB
-
MD5
f9b6022070ec5b8a701904460c9373a3
-
SHA1
f3366579da335c542f4052a67bdf7ce62d1d0917
-
SHA256
6e325fdaf9bb05938df50cb4e1982c6ce1bf6ed909beb46b2013537effb8ef98
-
SHA512
cce679164d37dfb74a478c634ff2d98b322b57ed890608916ec065368b25ce97003b68e6b281fcd05f467895c28e21e357aa66673de8d2cd97cf363a7797b779
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIn4XzUnjBhd382qDB8:SIMd0I5nvH5svdMxDB8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433573334" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4FCB5C51-7C89-11EF-B788-5A85C185DB3E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 iexplore.exe 2336 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 3000 2336 iexplore.exe 31 PID 2336 wrote to memory of 3000 2336 iexplore.exe 31 PID 2336 wrote to memory of 3000 2336 iexplore.exe 31 PID 2336 wrote to memory of 3000 2336 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f9b6022070ec5b8a701904460c9373a3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582e42b052123b2ff0f7ffd449a9e9819
SHA1ca0b0162c7fbc17c7733fb677aa07c7319a62b72
SHA256a9e43b1ec7e3221fbb67c5fc9a897dfa7cc6ec5f0937cebc6f87ff310b8f9345
SHA512e8224a47e8d98a109d94eb2c432e5415d80ddb74a20ab40b2bb1d3d4d29989c0f65856011426b049785bcf569e3817c81bd8f918d9a3491d3c71e0996263733c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517c363beacb0093eabcc9ab65f48d628
SHA186459e0c825e68b881f6b7b01dec415655968b9c
SHA256f9a4da294e7be1a313f0772be30f174956e9ddb03452ad8008b54bc4be981dfb
SHA512d49c2350d1a8e26911c25f8fc525202e8fa86567ebc267c095e78aeac55e2fb24dfd3ab44172498366c1b31e5b2a75765f7436e667490c49e7ef72f44f5f85b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5812ea4ee9f3e179d7bb16fd7855411b3
SHA1cddeaabc2b873ce1a2750b4486ee55fca635abc3
SHA256dcb14f28712227c365383d958a07190adbfcd2fdf41369df897dd25996cf6188
SHA512b99c59bd60de71ce0ae489ac09e3c24d8b745d8111d9cf3615afeb72aba025b0ec90e121d7e6bebb2278ade391de60bf516fd9c4665e9b7770b431855d0568c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2fe4a256db5103db5f87f6ad3782ba6
SHA13e7de9c2d21b7ad50d86dbe7c7b48dd9ee151344
SHA256b7c3e367ac7d34ccd43d7f84c231b9a34e49aec09e37124e683267c6205ec021
SHA512c2a372eb58f903b3bca5d41d7d7458c949ce1c20a81df22a08b27eea2f8ba16eda718ed923c825f22d64890e3bc09698011bf611fd119d1842dad1a3c3e75f53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501d5ff3a4b32d16355714fb0240fb6c0
SHA18986f4ba0430b5e88d0f2647315f01154713f945
SHA2564826fdac57aefca57db7143c51a56255c1631092a6a5d89109ac7a5d3fba7430
SHA512afdb0fff18b1ad3faaf8f0873645c36b06cbc97b8166c0b7f28a446b90bb95b3e4243231cce135a4a8a2b1307ca6745a4874cf8ef3e113a6844b70a0805e2ca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bca59aa5f41f4971305526166f15b0c6
SHA185967afd6dcec990a79ee0c9105dbefc394b0a45
SHA256fe5518e28d51218d7a5e4c0ff9f98e196833c9b1cd7448d81ec62474af29e191
SHA51229ddd2dcf5e22875edf1d0de50c60153ba0af8b3061753b982f9087157d177f5b45ebb97721708eda1499e29b4e127cf730fd1dde50279bd7ebd7b5869966661
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceccb91f04ae9d155c2a82d1c4e70e9f
SHA16ee48ab797525648fdad1f50c183f76cd5bc845d
SHA25624525bdd2ad671087615c73c09e63593f91620cc29b8c34238882f8c97b7b30e
SHA5122a4410534d759ffc1c67cc74b14107549cfd6202bdb35f54bb19142c055e5c92bd972457b9a1d6775e555e4aaae65ea82d16f19e249006c17cd453218e11a18d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e311fc9f17ad8b5f28744d8d0376675
SHA1c8f20929189a9cdd4a5ec4828ce7c1d5ada7cc6a
SHA2561f0eaad1ec19782f64caca6b4b8b817ede60899afd2bd4a6d145650ddb708630
SHA512b2b99ac07fd983a96aa70f11b5085774da889b76179c9c6faf0586a1222369c2d8390c25134360790e8218d2a870a3bc82fa424801866d274122c05d628774f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3f4f2c9676e6750626ace3921838d24
SHA15f9a65a4b8134c37b06c34d274915d5ae21fe4e7
SHA256b947bbe28001f6d3c3dce997dd225bdd3a7565c50ffde3671b9a86b54b0b7032
SHA512ce58ab02f33b4a098e0f29cc6a391cfabf4488e25e7e969abb57c6820702b85babd587ba890afb5c7433e496d411b01afa6bc9362c52c55e5f3508aaedffc66e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b