Analysis
-
max time kernel
130s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 02:09
Static task
static1
Behavioral task
behavioral1
Sample
fd97e9de8624e9940c9f48b9ed130d45_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd97e9de8624e9940c9f48b9ed130d45_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
fd97e9de8624e9940c9f48b9ed130d45_JaffaCakes118.html
-
Size
19KB
-
MD5
fd97e9de8624e9940c9f48b9ed130d45
-
SHA1
79a4acc0c5c352bbe4c4515469e3329682ceec7d
-
SHA256
2587c279db00a0205e95cc5c7b89e887a64a1f16edabf7277f8e04d7446101d8
-
SHA512
6c5b432b066875fe8a766e9adfbe9dfe9abc90309391ebfc935dee8d2a7dada9a7c6d4182943a1bd80dbebaa9b0581d63e950fbf0361daacf76f9bab899d9640
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIm4yzUnjBhWo82qDB8:SIMd0I5nvHRsvW7xDB8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D4451A01-7E07-11EF-AA3C-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433737624" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2248 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2248 iexplore.exe 2248 iexplore.exe 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE 2312 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2312 2248 iexplore.exe 31 PID 2248 wrote to memory of 2312 2248 iexplore.exe 31 PID 2248 wrote to memory of 2312 2248 iexplore.exe 31 PID 2248 wrote to memory of 2312 2248 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd97e9de8624e9940c9f48b9ed130d45_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2248 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5471d28266b3bdabf324dd18b4c8f3048
SHA1dd0623c7c1f064a2a6fb17f26bf7ffee14593b41
SHA25669e50f6549322ac69ca550e1c45eb260ddec76a2a6d68b4f516aaaf3f6fa60f2
SHA512edd08fd7098b820b37033d521c18621c89eea441b9f9877a9326a0641bd63c2e5ccf8c9cc82eb8e4ae64a55d8869d6d801e00ecaf0da7f05208e0302caa7bc77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbebc25ea6d06462970e83372a413cd5
SHA1b732b9ac813fd2c657a6a60cde50eb722a52d2e2
SHA256b2d4e07259918bcfb9ec16791d39f3f787eecd3ab3f0a12e8e40ee16637ef3dc
SHA51240f82eb53363272019f79285b4998708431daf15cbd51505aad48c39952586b966bb30359249573fb502d21e6087ea0194375733b45bd4b9b1abd9ce7041e2c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c39d57052ea2cbbbcb96a51cecef773
SHA196b1212c8b511d913b513f59f25b410a2fa4a4cc
SHA256f2ca9e5b9bf588f20055f53aaecef5d43f7c697c55aeebb276bafd2990462574
SHA512a2b3cb8b4c47aa0a593a97cdac5840e2129356a02b5fdc860dd3be55b483a623af4e8edcadf8656b73c2efba5f94c6d36a9940886456885db6a89fd0301126a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e167beabba852e3a005d5fc14f75ded
SHA19795615c9ce814b9ed81a1b0cc4ac71f35741703
SHA2569ca0fc95641a732ca6671a0e16c7060ee7e8d597149c41a23edd3f634b776464
SHA512896d00293a4b5a9f37bdc2ebf03d54d2d98d13bd3a69a6a9143582cc5466287a8a0c21fa418b87d035d828c429575c111595bd06abe4b659f6b5ef52105fc31b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50948f518083ddaba96bd0f80b0a105f7
SHA170dc37c73d6ca8804952ee1c0d6fe78b2792e056
SHA256de95f0eb89d2b373d12b34dae7fb68b619f3c34eba48e3666229d60e07f4b569
SHA512fcfd3b484a050ab282c59793f74dc0f09e7961a23df10f99d384101f233214d8f668265d872fb43233ea92d160063f1fdfb7102b24cffbff9891f2e9205cef30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c932fa6cd602a1892da66dda39b432d
SHA1014146d2b421cbfc087f16f5efd3e20c6682a633
SHA25658c53d337bc479a8e44cc0b2437e61dabc1a6f6e9f25b917feb628e8e6cd3b4e
SHA5129f79a543441372d690b7317557217a07b3771f38b4114378a2bf0f7d7ae8a870b64b6e9152d302ed9a7676625e65958c3d1ad345ecabd642e77274795dd8f0e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f00a1ec115527d28c5930cbdaff9f34f
SHA10c6d82220629e72e8e9d3ef5354de8fe96d438b0
SHA2563dd2b7d45c1c5c2f65cf59bb39f3bff0ed587fe6afcb3b995bfa1591180b61ae
SHA5120437308ad9341d9aab5f9e0f8036ea497d03abb52a3cfc324bbfe10a0945c2e0740302ba327705853c6a030e7f36ba9afef30c451289304224b8e418759a91a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cd59591a2c3c60502a7c0472e80c1ab
SHA12a3fcd9be628f79e1225d89c34ef16ad9b41b870
SHA2569fd83f5a0a35fb8cd2becf041ee7abe84c76c4fb9e7425e6775ba4d7e53e6667
SHA512f99c5d8c1b699b1fd62746f31c10701c3a716603c4b29aa99000735a5ee43a565a724c4f2c5a96f52de2f50f80fba0fd07dca08913dbb0a70eb870700d30ce7b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b