Analysis
-
max time kernel
137s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 06:52
Static task
static1
Behavioral task
behavioral1
Sample
04c2a70c10d641ebc5fc85b6f81088f2_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
04c2a70c10d641ebc5fc85b6f81088f2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
04c2a70c10d641ebc5fc85b6f81088f2_JaffaCakes118.html
-
Size
54KB
-
MD5
04c2a70c10d641ebc5fc85b6f81088f2
-
SHA1
87930681e2ebfd8cecdd4d73d0de82c7a0576bf6
-
SHA256
056b44af4de27a11830ac8b03fcc44993461d4b1ee919d8ddabc81961aea786d
-
SHA512
b3ad350f7fea4baec9a1d8f4a605b7887ffd62939b64ffc0a6874f8a48ecea9f81b79feb578ba05de45805368f6f51b2d8a3016c0f04eb196035ffcb9c29aa2f
-
SSDEEP
1536:SEtG+ARMICs2yMOyyAW4mNfnN2FfrjmJxc0aKBGyDGbgPEaH:SEtG+ARMICs2yM2AuMrjux4KB/GbuH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AE63EA31-7FC1-11EF-BCE0-DECC44E0FF92} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433927398" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2244 iexplore.exe 2244 iexplore.exe 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE 2860 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2860 2244 iexplore.exe 30 PID 2244 wrote to memory of 2860 2244 iexplore.exe 30 PID 2244 wrote to memory of 2860 2244 iexplore.exe 30 PID 2244 wrote to memory of 2860 2244 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\04c2a70c10d641ebc5fc85b6f81088f2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD555bd2bcf0bf226ea38f2202ca64b983e
SHA190f52159b0642caa901fcc076acb4954565741ae
SHA256535042f90cd24e04acb4f8cd003b9b4e6ac9d3aeecaeb070b843d1fb84cacb6d
SHA5125ff0bfc5db000f48111cae01096b4c6e0152f78e0c4d081a2fd83c411dcf691064c82beecaa22b3de24d9d22ffb5f923409c8b1119b53cf450a3e4ad028d33df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fe59249905906f54d9290ec48ad815b
SHA1b9c812c5f8db501a9c8a5c18c367986cbcaa956b
SHA2560c83f09f5a00cf9cac5431d5dd565bec4a9ffa5df287b09aa0512625f3b13800
SHA51262040b00e4c8206e43d3ec68f056e15a962a574b21ad4974cd6cf16d414aa3b76aceccc0b36f2f2ecd1201084905f8fa05e6203d994256dd7ce64d9acb6c70bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddb0bce9544e56d37219724f4c0c358e
SHA139b62641c55e0f892fa939982603dc353b463d51
SHA256db3416d257a53ce8f20f5ad55cc6c8fa952176315bd6b0ec7211d8cd64dae5e2
SHA512964e435453e586114d9cc8018f39056bd7111eaba1cb9802b178e41bc2e3b12b83a2c0f15489aa932e51bdfb9d5be323cc33e1190bd4875a18acb333333bc067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5667a82ab15babda02ea6baec7896fa71
SHA1429d1b8f0ee38bec23abcc7c72b37156fd3a6251
SHA2563f25673ea63bf9ec60813c7a1d29a442188e6dbd7ca129b6ccadc9deba2bf53e
SHA5123df9187f32c7300c71bb1452bc288195c126df48f591d2b16abb64485c06200bb3ecceb538766b4cc072fc01513595578c73d5199b5e449d5f8d4e87ea137cdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f848491f4454cc4639d6766abc913790
SHA1ee6761ef81299cc8e517611286bd69e4ba7828af
SHA256e29e9e6800ed2a99a80895297334785184a5f1644eecd2564b69554242a9054a
SHA512a9a388065c3bb54ae54c32c2c100f6930500c3e78ba1b2611d9046d9a3d683da7473f406c20575d872614d84f0e1e92852262d9bca317d812de635013303a6d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5231f9d30be579317fd650aecba7e56e4
SHA101e6682648211155808527ee6ca8b030d23d3273
SHA256027315a70227f467a4d9ac13d8485fa828bfdd572cb8dd7476f6a5c18159edd8
SHA5122e533cae78f5d44478d0aee1f126c443b18510d1f3450252ac0c1da81fd63ea33856272b06e424e0b21bcf146926d25c02d9aa5ad4f634269bf56b8ad633a8a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59efaee88b3fe4de8455cf4a631478fd2
SHA1fd20bd9c5e4a832bbe5967ce7b4e3a62f9537e63
SHA256356d1cf1d81569de1ee6e89690f2c2850407462fe6d3d6f49441918e6555c682
SHA51276dd143e54a8343628f1f563cd3b599b6e0fa7f53c775c839bc843951b793add7490b6ab0e8317fa02d93089067ed8d4bd9d9865c186be0eadde2318ec3ab8dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee9a6c2d30c7a1c2884ea920ca9073ca
SHA1fd2496188ef379b096a014d40553b0a72d3c2026
SHA256c8ac5c561d4998e7c91ed39dd734fbf1e28cfe18ed7e2c80ecec247205119a0f
SHA512d6b956a5d09495a8e8d4daa18ec3cb343b2076e078974a37c162522435e1d2857c1ba5ddc12ca2ba57979ee7c2851a3775269922012add5f391cb448c6da8ec0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a531191cce5dbd859c4878e12a75bb3
SHA140002580a4d6231524a5aace4ca91d9470ec58ea
SHA256dd6763792a42e36e572aa4daeee0f0a70c7567cea12aebecfb4600074aa15580
SHA5123fa1c91630b6e3cd74f9076678e908acf4e04680efaf28971515da1d3ec3f127f678eb2a368491e78c577e72d9ada4e6b4104c71522d2ab58ec078c6832408ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2e320d705c0fea4d5151cebaa677f24
SHA1d3aa3d6688de0738e778728b2e09f73fb3cd6819
SHA256e883d84c95d54e4fb25f9bf76ee6e806c27f410619ec98d973d156812214436e
SHA5126e67bd2e1156127076513d75648b3fd013be8d68e7f7b385e319ff6f8ba11c31454751715383b950a26414575905d9553a6148032364332f76f44aaab9fb0e82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5423a3564f4a65e15191a79a9438ba0bc
SHA17460ee368296664b416c7a5982140f1cadb99283
SHA2561ce1b1d51b49340932326d05d45af2d6ef0e3411682ca5b10b72e3f936a5a8de
SHA512f34731a1e1b90dc3918abbd3843ecb81402fe682e8af8beec1aa7bc39377af2ee1bd97eba607f86a1eed33b7c923c15fe4a80c4d4f4b0849f3acb777b7feb7ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c68977686cf37101b26491f7a709438d
SHA1e59f5aa410f4846d89cb307be646d5b79f934423
SHA2564ee47aea994cb94ff5e8793585cba81d625d0398c8100c9ba0c2c88957f6d33e
SHA512de92285fcaed1ae0599b801c9b3f46f76a1a4f697635487395dc756f9741a69e4649a462f726dc3329f82239dcfaaa55fdca34cdaa39705e268f08ede1bf7de7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b