Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 22:26
Static task
static1
Behavioral task
behavioral1
Sample
fd4368f8154ab721183d146f4e18bdf3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd4368f8154ab721183d146f4e18bdf3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd4368f8154ab721183d146f4e18bdf3_JaffaCakes118.html
-
Size
142KB
-
MD5
fd4368f8154ab721183d146f4e18bdf3
-
SHA1
2643c93aa096e4872e6f62efd95db38548e3287b
-
SHA256
9f8927d81bbe7b60dd0d2d46bb04ac3b71a5e67432e291d63a86125ba5db19d1
-
SHA512
1ab59f8b89e96652697812f1cb8b98f5ac558aa8433de7b6fc9e89023cfa12af0e442b07acb33bc45ba73461df3776d326accf93ce6000c6aa7f54c07e0221a4
-
SSDEEP
1536:zrZydlEbbA99YZHqRHHEExx66++IIddtt77bbSSSSccllbbFFDD998811qquuHHf:zkdlEbbA99YCV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000006464730bc0304f444629c15f50e9ddf1531700c09a2e2b1566b02e154208f604000000000e8000000002000020000000d4a686371544e14dd01b316a36654bd23ca5bb420c34da018059235f1c889da1200000003d19052d603879dcd65ab2d58df4352e598214685c82683425481d5e885a90ee400000005a72a5195b17a34d40cc5f3140c286dfcca5da169c16ffcbe7fbeb055617b45c662fff7bce70290a14b44398c23257b9abb28f0292e5851300e212ed66cd0df6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B1EFCC31-7DE8-11EF-8F55-D60C98DC526F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433724274" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e068c990f511db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2636 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2636 iexplore.exe 2636 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2812 2636 iexplore.exe 31 PID 2636 wrote to memory of 2812 2636 iexplore.exe 31 PID 2636 wrote to memory of 2812 2636 iexplore.exe 31 PID 2636 wrote to memory of 2812 2636 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd4368f8154ab721183d146f4e18bdf3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2636 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f24a11bfe8e8d66bf06b15b9f85a1505
SHA14f31e377f1d065b33b65a336dc6295153357e124
SHA2561a168f3b891c6a9e2f34adc58cb32e906167f85361bdd818928d8cf40d5d7b67
SHA5123c72071d7d9f478da3154f609b2f5e2cada2a665035ae0907d7230da1e7e37cbf04f5f24d8a299b848653ae7e857a014687cabe5e812dbc7b454be6f731182cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1d7aeef7ccf07ae0722a285292429eb
SHA153e7164495af98f798ee285cac92e8fe9791f9f7
SHA25635335ac25718d7a83b234a55797f7691da5d933dfbe954fce793dc8c5bf0eab9
SHA512cfdb105ae7c780cab7d7df89ae8a236ac5b1529887608eefb8bd920cab2b31a8336fdb039303b3b1aa5727c1cdc2dbf8f970d6ea72e239bfcabec4602f71aef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3acd802cda81cb03db026cb24914467
SHA1da1d11736c7c28b7a31e6d38c493f6a89938287b
SHA256becaca81e89c9a82a90deffcc39f8057d5b4022c9f788eaa59d387a287c3d9cc
SHA512a3b39ab516137970f10c9e5dc75faf1e72eea78277030600559a7f6db7bc586b204079484e2afc9694e8ca6039c009ae60d01a5bdff556047b850d96b2e021b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548dee14ea6fb6e76b93e97b4bb05317e
SHA1e9b7285b71d16f5a4670c2117e3ac55dc1f66efb
SHA256fea144fda16b85f877c2caa739bf468f416b154a0401f13d3553ed745ec2c505
SHA512d4251fed6027800fa5e0bf9d4cec317ae051b5840605fd4dd0d33a5d4f81f2f1b27bfe4b4bcff242b61e4e4b7cd4004dcb38583adabbe7efe82baec0a6da79a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5955bc21fb67ee5d68009119bee6ef330
SHA145c19c2a8c862a6ab2ef0644f42b845a49475490
SHA2564d51332a1934375a953256449ad13617864a0e2e38f798d6f9b5ea5e438c0e62
SHA5121c6c71288512c777dc8b01c2b0258756c0f1ac3d8c9eb8430070c73185c9fd0006c795f9a77fa8d9d3f2133b26166faa4269f55d71dc91fd36e0c4e4018186d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff4cde72d1256383fc0df7caaefbd191
SHA1ddcddff555f0e84c8728d31da1d48fe4d46144a4
SHA256ce993ea222ee3fe18b19670572eb91bc15645aac019630be86249b7af450276c
SHA512ffdd0b20b7e3857be5f62b56b59aa947270396644648732485400568395a86e9965e624c2477dd433c1ab96fe35c63a822cf5545903e92edcafba49e713c4db8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a28cc849ee4092c5528662b04be91bb
SHA18e1e26dba5ebba0dcbb39724e18205872bf4c62b
SHA256a6bfbaece3f504616763bd41e9e842261b835f40f27461ff5e316eeb4d333f68
SHA5125aead57780b179d2c15be98a4eba23c3ba571d724f42bae384c2b570c974083bd55e559dc1fc67705411634f3314d387fae4c5491975acbacae3ae9866f1183c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6e93392d8c233c3df076b195330e393
SHA1f68f7e35671b040e882bc674a9699155fb301383
SHA256b845b0d442a4ffdaa02d65af36b12bf401962b64456bda77ec86755f78313cb0
SHA51208995d81b10d02f32b7bc943c9646bbfdf5322d93583738ba765825bb60d2289f68d36a854e10b29d51686933368bb7d688eae64cb38972b20248cd7d24f0b77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547f3f6f4ab96402ca1a1a972c2e49fd6
SHA1b71e3bb2fd878e708abe31fa1fb74a9d16f24067
SHA25668617e429a870efa874868103f373660916df35803e634cd52ca8febd9e5267d
SHA512689362558e73e53b8e9e89942622c2e6ee9a7cf64337af0d2f7ef0d98705a837cd49e22bfee78d934b8a476a4884d739a0da0d228015ba50ba01152e99719797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ef8b3a2871adb0c960797b899abb7aa
SHA1ccf00ce97836eab4103330645bacbcc00ea78b9e
SHA25612c2cbec3541b0a3df621823204baab249cd7666535db2c9134aa95fcd8b09f6
SHA512a1a670edc34149e14a4a6ef4ab96161787d2aca502b450822a4e4e897822b9212a5e62178b96d20b7bc0138b288798545fffb030128f506aa102f718105b8154
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b