Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 23:58
Static task
static1
Behavioral task
behavioral1
Sample
0cfebcb7f5510bf37d6286c6712b55c7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0cfebcb7f5510bf37d6286c6712b55c7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0cfebcb7f5510bf37d6286c6712b55c7_JaffaCakes118.html
-
Size
11KB
-
MD5
0cfebcb7f5510bf37d6286c6712b55c7
-
SHA1
fe7981b77555073d2474269b7da1d8abea194795
-
SHA256
b765a27fae75dc4868c1dfe3cf13d27b0facdacb014cb6f0046b6ae93b8d74a4
-
SHA512
61dc40d8e77dfb40833bdc49e5c0201ab198623bb2e536a2b7aa67275717275456546b0148811839306a65b7eaacc38abaec685bfb5ad12038f3165a7828e8bd
-
SSDEEP
192:2VmlIsr03Dg8k/w1wvqyuBG6rnrek3A01bAuBuLbdU8d:smlIcuDg/gcuBG6rnrek3A0bAguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434075373" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{36FAB6E1-811A-11EF-B221-F245C6AC432F} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2404 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2404 iexplore.exe 2404 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2764 2404 iexplore.exe 30 PID 2404 wrote to memory of 2764 2404 iexplore.exe 30 PID 2404 wrote to memory of 2764 2404 iexplore.exe 30 PID 2404 wrote to memory of 2764 2404 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0cfebcb7f5510bf37d6286c6712b55c7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2404 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2b3fc4f21d9fcd43254bf4da91f44bb
SHA1b94b05847bb50a3ff3c077b9648fb4ec23554de3
SHA256b5175c25b0c9730b2547c19f0e1e4c48973ef7615d3d80dbe73a3125cd4a4986
SHA512fde1cc04f62e5bfd3949f7f90bfaf73c086f107194efbc9d952a07b184b00a08d732e4525363af04b772f6f94becb317ffd40081b65c2ed6feb76c4d4e69652d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edc3a57b38fc0353538e038b2e30ac21
SHA1717d77d3442d9efb104fe6e6c92a0e05ac5ac2c1
SHA2560d868db8bc6d85043c02c1c7a561773c9f483fc7a3abf52c78466ba12b2387b3
SHA512b9fde9d7a34ac7bf92a16712061e3221fa06667d9f65525078b169f7dda0ae8b8353beaa47f54e272504f76e9ce5deaffb07debbb678ee74a453b2f74f66839a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593dc5a72c95390ca419cc83ad6286de5
SHA16f799b1f48c00ac7af64ac54901f0122c4a740c7
SHA2567f331ef82a755f40344218943ec8d0de2f59f26a983889bbad2424beef855035
SHA512196c69b426cfef7c1a825351e7657888ea92dd3210d75641620d081400eccdfcebee7538facd6feda6d7f330c3aad0212ca9082f8ad69af4fff993932795ee48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573e486c7c44e4a2a4fe2b6fa568452f1
SHA1c34df84474dd802874b1b756b6b60ebcf1c444f3
SHA2565ea1026182b16bc7e558552b86b58ed42cb5a267f4a4a9b175b2122efd812835
SHA5126b82fdc4176cdd2aad00cf0c9167316654c928b22831ad9bdb6645dc67d109799dd02f7d050cf1db1aae3d3d8b064cef3fdf704f26eb9c8ffb5425f710f6468c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511b2312b32537755205b0a589057e20e
SHA1b2f38d692de62d340f373a53e60a2fa41b878ca9
SHA25612799c1c3fd79713ae454d1a7fb7faa42ad7d9dff41d7640067cbba88607a35d
SHA5124b4f420be8bb090e2f0b603752bfa03e795f14ea180bd0f1dd4b07244a771de91ea50ecbe98fc28c6d774837c9f670ce6848e25fee57aaa6b0ec9eccdd3fa2ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a31ef7bdcc86a3659639a6949a27e52
SHA140f7c4e691d2251eeacc13ed6596e3b0c7910011
SHA256a04f1e6d74b002add2b7dd2e98f3eb492aefbb11fa449ca6f4b5202864bb58a8
SHA512978f5e0ef4b96afc3c4649798450e4aba02ecd5e9e627c3b8e379cb8a8be5ccf4b138348c2b06c70ef9313cac90424e520c493d779c7e248958c1b120af8b48b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b892550911d69b1391e7786781157071
SHA10bdd3962b3fd3216059d6a6c3e6b18dcf4ba4722
SHA256c1ff27c98644ec48e896c5034ea5b025aa6105681829bd4027726ab2c236029a
SHA512ceed74c4d4e03f6c6661baf9eda731931b7dd6eab31cf4a55ace3ee70608c394ad41110785ec767d4121656faeab45494a148142cc0d5e2efe950cb3cee1371b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56de7a147236476ea0c984552077e0632
SHA19bd67de134eb823ed8f052f52d68a26209e408f4
SHA256053729ee85b85e2ea9cd8234f462e71896ebeb755a1ca276952e149a3302e2f3
SHA5124e894fb9670a6af2e3a5a68449192b5fa17f252bb849708a5b68ec1d3105714828872133b2872904c5c7ddd4751ff345ecfa59cc3e3ab9b8fb8e4fc27268617e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8c05983daf9b631e59b8c08940b1893
SHA10a5ba63468a7e6b27d1b42a50c1e233e274d3a8a
SHA25675d669dae604c189bbb359ce8fb30ef3a09aedcb60c0aabda228f29e497355b4
SHA512e3b2a396e1c6a9b1f45ac0ec761fb90afb6c57107af03905441633b3c87cc7a67d9513679f2167213bdf77a13d7f7993051ded15fe77728f2475eb75310d877b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b