Analysis
-
max time kernel
130s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 22:50
Static task
static1
Behavioral task
behavioral1
Sample
ff6ef44636e2fac0f8d3e3c18d4b7f96_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ff6ef44636e2fac0f8d3e3c18d4b7f96_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff6ef44636e2fac0f8d3e3c18d4b7f96_JaffaCakes118.html
-
Size
18KB
-
MD5
ff6ef44636e2fac0f8d3e3c18d4b7f96
-
SHA1
7e9abc08fb368467550192cde966364abc231d9e
-
SHA256
b9bac9071fe5ad38f1ecbe734a382ca59e053b6902a578a9ed51442e97dbcc63
-
SHA512
6d256d0782a64f41e79c1738f724184f93cbae38c488f064f8d1919a4be9ca9eea66f23d0097f4e1f932c00d656ea4ef130c151a8f2a181a4d790972c01d6398
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAI14pzUnjBhvB82qDB8:SIMd0I5nO9HJsvvKxDB8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433812093" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{36AAEAF1-7EB5-11EF-BF23-EE33E2B06AA8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2176 2368 iexplore.exe 30 PID 2368 wrote to memory of 2176 2368 iexplore.exe 30 PID 2368 wrote to memory of 2176 2368 iexplore.exe 30 PID 2368 wrote to memory of 2176 2368 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff6ef44636e2fac0f8d3e3c18d4b7f96_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5747de088d66c5b0eaf3037792961a190
SHA187633442e8f5348c026f745871b81e3b52719800
SHA2563dfc29eb5e5a8e91012bd1b8dcb1819c3b78f2bc39e9127272227234d93b8c40
SHA5127b255076c3c4792ddd6a91920f8c434bbc30bb2fc7ae364df9a81bd721a66c572d40096d5fadb3da127b167e8d5f75062dfe09f94223b52e6899aa6575b40f12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aff0f7ab346f84c3705fce14b19d645c
SHA1dda66ae0170b9aa434819bdd877db47f6dd4b8e4
SHA2563c1efac4d4fde8803b84f2991d2d56c45d820492a7937e043a0c617b236963a5
SHA51257255f18717b3d4d8ee7980a53d45a2916bd7ab80eaf589810038592634f3c55b644108c82532f45e261355a7ad4be5435a2e4430499f0f45fada84eef2b17f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca4f2a7e88395166d8b997ab069ae7d2
SHA1a1b10279cf8ff4288ec39fb04b9153fe8702b5a6
SHA256da873ed0a62e4d072ef689f4497a0b1d97b437fe195b3f71f9816c7bc46df5ad
SHA512733e58e286add0931eae25ac79fa39696b00c73a8ccf81e67cc8972387e96248f21868116a8c604650009e48ed634ad79ec95097998fe3552d312da9374598fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed366c638947d9f217b89da20cf259f4
SHA1433ff5d21fb667038da607413455325426caa055
SHA256f9a3bc61f789f17d37f20bdb59abf7870eb3333fc82cac4de8633ddfee8382c1
SHA5127cc904ff842f95a9ac2fb0ed69738ef2cc1ba713be8b7c1967dc5aafff2c7a832a2bc67d0f22bb910933fe9ba30534dc1d634987b437763b01f28de4fcb4a0c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3fc2da5fe82a7b630e0a04c46de804a
SHA14cf913bd4aa4c5a49c01a14cbf9fceafa70ef08f
SHA256d5b7c0136adabc9413e47aaa05e605ca7c13dd5678c2ee2b20da6fdea55a791d
SHA512f5879f0611c72d19a2d9236dcb9252382f16a6d13c65420e584f9e6f4c039fdf0a52265ae020c953bb6b06f9fb8a0944aefc95904e2fb5b89ee64f2a1b6d30df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db26031374186567379c200e190eb83d
SHA1ae267e19230ade70d4e0192ae0cfd9f087cdd9d5
SHA256755da3d082411c87133114e8339f4166bfecd926fc757712ead85ca9b05f2f14
SHA51258f4cfaf73e6b3bfb602fb216ffe5f9b2eb076271828819538d88d282ea4f27b34429dc644f2a954720a8cc4cd9282fd708cddd759695eecb2c7b0c69e1e22cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550edb92c3f8f8b4ea87058dfdfae11ec
SHA19506ea02b50e6d8011afb9ac35a798fd7a0b4bf5
SHA2568ced6ffa1babdc648f8cba78dfa016c20b63560d20ba696540ec38a0f8c45be6
SHA51294373294811bedba5502a6d15b3f53c0d07f52d0a729cbddd1df050a9f822a0ff15633c629e96ee48738614087b95cb85722dc4f056bd66265136767a160750c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571aac1cc5f1e13053a7a46b456e2e584
SHA1703d38137824208c23c1fb1d171ac3f1dc0ddc21
SHA256630611adc509c55197ad18055795d145aba846a7a7b516ed0063d2166b0f68bb
SHA512577c122dd10342bab186649c96b0f631892e8631e1210ad21720f7f28e9860b4100c7c2969535df0b3f04cbf7a9c711c81fa06393e411d14704d32dcc1e970ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548bc013bfc14ead90126fc8111232263
SHA13f2ba2c5cebc5a426e66324173996d1542925313
SHA256ccdcfcc6eeddbce90ff97350236a89000399660c7cfd6ac6e6ce5f882d19c7d9
SHA512831bd99d8399f617c03479d0e5e9ab00d02658182dfefceaf5be9fb348356ca2c9f460132e71ee031790de9ed3ead6a43ceb561b69bd4325e5508c3f8ab589d4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b