Analysis
-
max time kernel
122s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/10/2024, 09:56
Static task
static1
Behavioral task
behavioral1
Sample
179d7f1b6c5f9bbb45c36446f1109cdb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
179d7f1b6c5f9bbb45c36446f1109cdb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
179d7f1b6c5f9bbb45c36446f1109cdb_JaffaCakes118.html
-
Size
37KB
-
MD5
179d7f1b6c5f9bbb45c36446f1109cdb
-
SHA1
d50aaf85401d3c4ea7a2540646fcd812ae4cfbdd
-
SHA256
f0252459da8e422ab0440d2069fe38c80f57fc07e5a749c44fc0e5a60d7a0ef3
-
SHA512
265de7af2d66fdf71429d897c14e818c6899d59177e119865ab06096a61adc949b1843c7c6c9ed7b2fbd62bda6550a900af8b8ddad6543b1b20b2ac0d84ebffc
-
SSDEEP
192:uwHW1b5nj58nQjxn5Q/XnQieGNnSnQOkEntJpnQTbndnQOgWVcwqY8scwqY7WcwN:qpxQ/ZMnIpQYV3O+Qr4SZf35
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434370443" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6052e50bd617db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000001554f0abe698f4694afe8cbb77351f536b62f9c7ab2c223579ad0ae0a1beaa0000000000e8000000002000020000000db953f0e08a2db3ab238a395e05c22ac699708ea06b56373c75673fb0dbbda8c20000000f0ccfe5c9ddbc386d7e3143cc3572c397b4576ad33a9255978314afecb15ac6540000000729f5869b27b02ff0eb8968ea47d947cab1eaed725d82a7124d00d1b092ecffa1fbd52f4038dd855c985dc99555e64ea12564f5e7d8fafc02041c12405b00b98 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3466ACC1-83C9-11EF-A0E3-4E0B11BE40FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2692 iexplore.exe 2692 iexplore.exe 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2688 2692 iexplore.exe 30 PID 2692 wrote to memory of 2688 2692 iexplore.exe 30 PID 2692 wrote to memory of 2688 2692 iexplore.exe 30 PID 2692 wrote to memory of 2688 2692 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\179d7f1b6c5f9bbb45c36446f1109cdb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2692 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511fbe9f4a22ba4ff1ae9ad40e131ef6f
SHA16a17840b3df04956de1b375c7d6b8a060062a3d7
SHA25633656b8309f44b2bb15e7b96ca69f415e19c79ef94e7a9b486690861de0d1be0
SHA51261fe1f6b36960bb86c855204eb65d484bd59385016e26894f07092c66565cd9f6f73a000ab179521a904aeaae27b5ac04b18f6e00d3ae60a1549912da91db2c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3c3557af92b0ff173c7348bb0a2f82e
SHA113fb3dbc82d83765c98f69a936bbc03f2cfa90a8
SHA2568fe9856e29f20f0905977480960d0a35219c858abc3dec602da2b4618f74df74
SHA5122807e93ac8c913d17e0d53e1e7d121b786af231606ae75117902e7273bf3228e19d4d570ef02d118ce6f25ca038a289ebe206516ff925debc0ac6535ef84666d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504310ca2ae1725faff2945c4c343fb15
SHA1978ac5569e64dd65a41d83546444ab9081dacb66
SHA2566a58962db30834243abd709d21be23c70e5abb5d32d198ef216cbad3451b0af6
SHA512ebe7331db46939b7463f3d1846f24f8d39e4b5ef74d76b419a1edbc79207da9d9603ccae50a347e94a81f939a1b33b810b8621be64601ffbe08bee9ce28c3e2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515ca188dce663dc30d7fcf8cdb2ebfdf
SHA155cb2f360766f24ee5bbc81da9de23b07e03e431
SHA256a9d31462c0d5d2683f3e64cdb9d356ea60bc171ab1d048c82b11273f7940f4d0
SHA512acd3f1ed36bef095eba5b87f600838f1364aa7c849b1f1445b77a77695ac1bec898a909200b073b9d132c6df28c4a2afe6fcf01a999f9be585dbee0db312cbbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd5ab0739b71f92171cda5317569cbac
SHA1b98bf2cfd64800679e7f7368b5cd6bcbac47a430
SHA25644889f68de9da44b3ab066325b72b6bbae0fabd550f0245d9c4036468cf262ea
SHA512c8708e7c6d065b864aac2b0e825f1dad0b9f1bda5a5b8a881b46cec0a2cc4704a9215fcfc8575c09947732fb372508060fa9aecd5d1f04ed509189a5e45e453c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529ad221fc50c23a2224e4989ee6ccb6d
SHA18b48be5e9ca84f6b3145a3a138555deca1a78009
SHA256ed7f55dc37d358eacf9054c0320b965783e56619e99b0ce945b9db0559d469a6
SHA51206394ecb21383b278444fbfdbb5a1bb2166c94573cdf3d07ab7f3d199aa3ef28844df34c98e384e8e4fdb4db67fb06cfa2be0244f8f503363df0a52755050e64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5149fbaecfc0a3e9e4498b2597aca0a55
SHA1395995aef2778bb353cd6e22b1b34b8939fab996
SHA256ce414a1ddbad7d74bbe07ee935d1bf1ffca7178b803736d2e2e3a1f9f823e2a7
SHA512d944bf0793b828addebc1557e4b3bc16702f59dfdc24025f7b20ceacff74b5a379657849f433f9dd6ea77afa9f60ca4e059f82ee8c57355ec5132e4be45baf9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c02bec1b7d71dbb01cedc412be9e7fc
SHA1e1b167eedbfdd43011575b104501498b8e668be5
SHA256b0688d857bd45189a7986e22234eb6b8da1d7480b26e3532c1cbc050eeb60a44
SHA512483bc20d2c8ebea0387f50d81363071beeb7e13f364b337ec621dffeb1e21b3acabfff4a778f2dd6a74f72b8d2db147a88050eb4656ad19a578a9251a62b4fe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e7672fcf2649119e3b775f6b64a57a9
SHA1e3b4e560e076b294e4237a06a7f1a9125004d84c
SHA2563b60491a7aafdec7e9b4ae6f78fd93237e7ae527fbf1ed59ba22a10b31ef2c66
SHA5121f29ac595fcc8bdc196c1f7133bd620411049f27fa464f2170b31bb075638d71d84bdc6f2dd8c6c59010fdc649a6f9917d84e7c5102a8e917e1a987f9d620919
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b