Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/10/2024, 10:00
Static task
static1
Behavioral task
behavioral1
Sample
17a1f247787509d55400755344fb7d47_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
17a1f247787509d55400755344fb7d47_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
17a1f247787509d55400755344fb7d47_JaffaCakes118.html
-
Size
12KB
-
MD5
17a1f247787509d55400755344fb7d47
-
SHA1
6f259bfa1e57456a4513889a7d4b2ef262b1cd60
-
SHA256
e0a2a7dee0e6000c58d4abfdd3d1e8b2d27e7d459981d50cb6d42719735c4081
-
SHA512
8df02f097487c98ca5e4ccdb9d4fa913cd9283a2384c7f6dc4f8ebc771e3415f4c9336c2f983c45ea06349c9b7a4b45e7e511e0a6bf8ffe21f6eac84fec0e2b6
-
SSDEEP
384:SiOZzpZmvaSl02ogJXqbf0MaJQaa9vu59l4xI:SXZ/SlTMtaa9vI9lN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E09AF6E1-83C9-11EF-B6CD-7E918DD97D05} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434370736" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2232 iexplore.exe 2232 iexplore.exe 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2736 2232 iexplore.exe 30 PID 2232 wrote to memory of 2736 2232 iexplore.exe 30 PID 2232 wrote to memory of 2736 2232 iexplore.exe 30 PID 2232 wrote to memory of 2736 2232 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\17a1f247787509d55400755344fb7d47_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5585511d685c0e00e4c5c8b0638e06497
SHA17c9e71065d2cf7ef4c0e1ae5fd74edb88291762c
SHA256df99659c1c662d3b8cc21653f114fd1c55c72685dfb36f90728c482057d567ff
SHA512997f9610e9ef0f84f12574f5a65ee9fb28cd1b202bb334e7a35c3f420cb74b341fbd3202c36d780125cb710eb3be9ad9cb638453c55157d5af0785b4f2046b47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56adc46340d1345d150a617b8b365d59c
SHA1dbca0d06fe69b97d1398f868215d41017130a112
SHA256d97735bf208b928d3561087cb8bf162b6f554a6fc2f2f0cab89eaaf6cdf8ae82
SHA512d5251a707aaea739d72e13392ab411e4ea46851b621b6bfa1cc6ceec1dd7bfa7086181f220d53a294afce8729dd5c92da95b904e499a5420ae18a0da32464c15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5604be2d5d772bd0a9c138e6ab96afe8e
SHA1b5a1e94008961139a875fbd454f44c40976505ac
SHA25614463a600195ce74075baa396b7a96e75c06b2b9afa6cb0c5b04af9e313e3846
SHA51285aa04816b33d3c480b57bde38c1e0dad99cf7f5c56f7ccb6adcd5f90af4a0de93371fff4b1fe400c94a3c50c9b19fc0805c7a909351431614d8924eb9ae9dbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510e42f0894071a6fcee3a4a8f3f89989
SHA1f7c9f98355e233a25e55ccd0ca4c4203a88d67a4
SHA25613570ec0a315a70d59b6a42f411ad59df3160400a7c697f4f1d731ac33818033
SHA51240d1ef1fcaa0d490e82231dd3f9ccdb0c743a6c1d6ea5a592f93ce056c5025bc839034294114972d0941a21519257e40d7a094eb7ed56cbc6f04fa400872363e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7cb66fc7ea60ea9163eeffa27e92f7c
SHA16c4a0c07978f592aff2fc45deece619465a20522
SHA25654c12c1ae2d5701212d0e1dbbd7a74b40aec200358ade43735d8a31a167952bd
SHA512056427af3c9a885face04141548d5ce7e291e9045259ec399fbe57dd551e1f99bdd478bf3dc84b55134e0b6ed8434b89017a000b2413d4dd97d9ccf9f18bd3d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4c3e0ebb23621ef889b1e022f3d17a7
SHA1637351139ec45c37b70822c7f92166320051db18
SHA25698a01189271d32451a8dc5c988b87f880718904220e1e8e5561d27009d245088
SHA51215a475005a4366e26e76cec9a9e99facaafb9ff04e784a78f2bbef001b40452bff46db953c61783d746ceb09a966eb8235012deded0f7b5c471b0b7a8b2e47c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53309c4cbe82716cc94e58874f467b863
SHA14b5c40e46bb10c61116afcb5a0b0f0951be26877
SHA256c488fe16b59eba73f23249806f21dd329771d034bf86e08301724ef5a46abe4c
SHA5121a0ed87468d266350944cf93d68d052f63ea63f39c947180db02005748dc5a0eed04ced8a8c5746aaee3670d3c6ce14f1f4121be26881dbd3e9607024aa60434
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9b64df3a68415e13bc7a29a8d5e041c
SHA10a746de22ac8a19464e0ecce7912eac9fc317448
SHA256718d22212667adb34bd252aeac80f84edab607ff21443b1e7c83acc382abef98
SHA5126bafe3b951bcd40f9013f3b40ebb17ef82fdf6809cf445cbad5daa033925934530428eb8a608b5221a094de84e693cb3b2b04f53db1233dc3d886cbc9716dd5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fee992eb81e998cdd15515292f8fac2b
SHA10e12922f3f7eae65a64a1fb71ee0fd7fa31f94d0
SHA256fb167359d283540b953b669b68c31ab43432ca9bb492478d2c81797c27171ca1
SHA512eca96b23586f8900edb29b66d7dfec1a2c218d57385cc88a54745134ce5b51a75ada44f8641a7b8bec42bfcd6b00f49a3ab76c73c4c37680117e2a7f32b23e9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c242f242fce57be925cd4fdf4a15e93
SHA1c785559ec7dfeab47a8be2205f01d3fe1bda425b
SHA25686d266557f4cb05f3b633dfa7891204bedc04c693d4257415fb77420ca91bf5f
SHA512fede2ed7e8f2f0c722c917bec3016bfd4e7c130b10bc6b0bea3027baa80b90e04659f48fd69995dc6cf2773db3f378b0cc2244a110aec74bc53104010aae3b27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD550c86bc4923fbb4e2cce11ea60f06b8d
SHA141dee153ae179e9323c193514ed39b375f37ce92
SHA256a010ec197131cb48abafa80c118847e7819e888c3facebc7cf542cdb08e1799e
SHA512343fdccd7d8253a2c0a228e80022da0f4c4c9b8c958f58e5450eed671612e3144600a5a20194991b01fd7a03e49f9dcee5e85561d72893fca69684a77f9b798d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b