Analysis
-
max time kernel
138s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 18:31
Static task
static1
Behavioral task
behavioral1
Sample
147b1b956bc2d0852261bc95aa4ff644_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
147b1b956bc2d0852261bc95aa4ff644_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
147b1b956bc2d0852261bc95aa4ff644_JaffaCakes118.html
-
Size
27KB
-
MD5
147b1b956bc2d0852261bc95aa4ff644
-
SHA1
bd3432fca7be0ba0bfdbfba735fc74ad509ed3e3
-
SHA256
7bbccd5901d285faae327edd1f6148777100b6697c60fcc611a8d6f8fcfefca6
-
SHA512
ea44aac51e05b25fd17676c7803d54d16a704daedc5e8784b016c00101a89f697e73c48fad2e3c8f1329a7f9ec14b62500990a8dab240a08132e0ab4231be092
-
SSDEEP
384:IpUaSzQk5BMbAMp6oL6gZ0vqtW13zXhrJWG37qSy0WHB51bHGc/MO:IpULzQDbAYjq3rmGLqS/U7GI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 109067b58b16db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434228564" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000081391b911af5750eae2b47e2e28e0efcf823e29ba9eb99b253530a6eaee4e4ec000000000e80000000020000200000007541ae0a2310a1ef26b1f660088319d2c0fe0f74b7936132c72dfa0f4cf97cf390000000e9bca5f219caa2ef4cea9ef852de78bb597a513f594feecddec3519bc2ad15de6c11cb6b1e8c7e4ef8caf9fd7f4d54f0ceac9a6cbec4f4998f77014aac019ed74687c1491349eb1f22c992d6ff41fb0d3bc55296e662c785282ba7567cc8421971ab9c14e1aff08a700c80a4ae64c6715acadd2bbbb56cdca4f206d90d413d6e3c1d2760439a12d6404526c02a619d3a400000008299057e4e4bb412c34f2cf8cfe8414bb9af064568d6a6653b461cfae075c3010cedf90bca66cdb5dfaa70830c3cb18d087c08192c21ac0bfe4064619b4faf70 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000094925e7b3e1432a6e20cf5f033a68baa98956e05d4c5d4bb33b8f725b0d018b6000000000e8000000002000020000000ede138bbf3b7e9ea567df381795ac898e64349a1afd0c7a8e7b9e3fe5800451220000000ff0b564535f953d5f91c9d2676c6db082cbaacb24add3e72989a1ed126e97d50400000000d0187a50d7e59f40b9829605b76f737a1817657cdf019315383fe59ab53415160904306095c37966071e0a2a729e85d44f6502edcc65e1ab393d5530e1ba2a2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E0ED6841-827E-11EF-ADF2-46BBF83CD43C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2104 iexplore.exe 2104 iexplore.exe 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 3056 2104 iexplore.exe 30 PID 2104 wrote to memory of 3056 2104 iexplore.exe 30 PID 2104 wrote to memory of 3056 2104 iexplore.exe 30 PID 2104 wrote to memory of 3056 2104 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\147b1b956bc2d0852261bc95aa4ff644_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565a5eb1c555582084ca7857f34cc0268
SHA182707a1f312a46e0eb994fac550dbcb3f055c737
SHA256e4bc9f196b9ec45d776b2f0b4997bfd950b07b4389024eb9462002b1e2817ea2
SHA5126ec07671a8bbc65945f1a8e0409af0f542cb8a61ced8eb69e1885a14cdab5d0e607c8134215632f52f3362fd3e8624c95177c462c6e8218c74361b9b1870ad55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57646cc76da2c348816391953cb229a0c
SHA16b5571e1bc6dcdbe6ca06b3f32798c91fc99d3a0
SHA256c778c2ff50b1d07c8c50fad8648fcb7c2f30712c210780f961451040df20af08
SHA512c3ad2d173462d30b414ebc6297d0f1b1da363df94874438b826727950582f41e4645cff2025ea8d1a4f7f1b5781301145a3a6a0ac12d739c883d336691737a32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a278a804739fe06057ad330eae751700
SHA1fc1cb5638b66efa3c90c3d76d8b85aa2a76bd455
SHA25650436fcdbffb5d912141e5096e821670a18802c43830c38223f007cc4d3eccfd
SHA512f33f22d8b92f15fc22b21bc9439108257b8045f722b341425e581722bae50a30c7da3f6c8336adacff74d5c989c4fc827c00b7ce4b1bc0d505fd0de4b347d650
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5525d12b8fc8e1b3a404c9349bf903cd8
SHA1b99cd9ddb661745cba2097cd407d5e66e0441e68
SHA256115c83315b8e5f2264d0b009f0a8647b614266f4f8c14a93231b45a04e143597
SHA512925a469076431683b81cff9ce967f2028456feec754ca03d8ae77de1b035c61bd5391d527f4930b2d8290630458a6d701369e986b93ef8ddc5179fef5d4e5fb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59283bdbcd6a93df0bef501cbe8e60f30
SHA10da03dc0177b669229916330e3299d9cbb0b78d0
SHA256a23afea1bfb88c67187277792c856f20f856e4485e6ea8e9c061c130428f8f4c
SHA51225b3a287d1e9679b45553104ae9078ecef263fcb98fc393f5fb6903f81a648060e25cc5af61cdd8b25d5900be9d893a351ce2c91f7964746779d75a61f433aa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3933b08fc24868b6cba8f80169fdf42
SHA11ff953aa9511a20430271c59814309fb17df3f36
SHA256013cfd97d1333f8dd8cf457f89b2f4721246869883aa4d07cbdd27d1ce12cd8b
SHA51287250e6e4da5e99b8154297fc946fc5e2b7da6b845d946e7abb5487aab911c36c3dba888418f6c609443c6031d8db55e80aa94b8efe8ebb7811bf23cf37804e4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b