Analysis
-
max time kernel
131s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/10/2024, 12:58
Static task
static1
Behavioral task
behavioral1
Sample
182e6fa6e2f257e7db6c875b72c93e7b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
182e6fa6e2f257e7db6c875b72c93e7b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
182e6fa6e2f257e7db6c875b72c93e7b_JaffaCakes118.html
-
Size
143KB
-
MD5
182e6fa6e2f257e7db6c875b72c93e7b
-
SHA1
2841d5952652452618b26addbbf9646cab93d435
-
SHA256
7ff7a616b6a4595c3461f58d14b8483099f2f36b3c9e9b85a057ae6f7f78a966
-
SHA512
dc629e145f1b56d653e9794d154667ee22799fb0965a0d8c312674edfcca689d010cb39f0e31a962638bd02a695c1bc5803b49f89a6b7d27da04b9e37d824b75
-
SSDEEP
1536:S1JimL9Ru0+O7Pix76vuyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wee:SNeZx7dyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434381356" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A26F2801-83E2-11EF-AC61-4E0B11BE40FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2980 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2980 iexplore.exe 2980 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2696 2980 iexplore.exe 30 PID 2980 wrote to memory of 2696 2980 iexplore.exe 30 PID 2980 wrote to memory of 2696 2980 iexplore.exe 30 PID 2980 wrote to memory of 2696 2980 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\182e6fa6e2f257e7db6c875b72c93e7b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f38c2f668db23d1569ebce7ba8a9722
SHA1c074701b679e14501604ddd14741a531265fa4ae
SHA2566e910903b21419252f5b89b604d2d4e860803ae33a924f0582e967d629373e9e
SHA51270f81f15cd5f62deaf86dc63bb298ba863143aeafe8b2f0bcddd3a3e44d17b01fb8b2ed0f78d7c7c296ee9f63130f9a9b7a00fee7689b56fa6f4c8f0a9d9cbfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e02252f089478ec7c974caa4c1ca317f
SHA1fc75eb7922f7c484be92b471ec04df73ac2fd59e
SHA2563733ec6699362903cee09cf68a415fea6b80518cc04b09b15aeb14c75363e10a
SHA512f8492aacd546731a68303b000bfe4b510ed92ebfa6d487fcf9ce8ab752bb7718900edf37bcc071820f0545f9ad1d80f16003e88c2e0000ad90c78145ef876b1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd5f7630bcc2c43c2df9b2e647ca6deb
SHA1786e0b34b1afa84563be988c36d8c068a5a7db78
SHA2566b686de3cc4f6e45051189ef26a1d0438330b1243314200966780aad136c5f97
SHA512f1b135b474c7a9da023860c2100b62fbaf16b9eb12bfb18f21ddacc80e611f320682cbea118812c9caf4e4901188c65ab446848636e2f150af036d08f966b8c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50846fd7466796e0e84a51a51f71207d7
SHA11fd3a7b6c9cb17d34928eed03b7ce3be440ea45f
SHA2567240cc08eb822d4920789a0fc982beb536847f28b869ca465356f5da01774cc6
SHA5121d7a5e4f992fcfeea8be0da253d1aff6a3ff3f54c81eb860567aa41e22f4c855a5b6e469d76142d4bc472d0c2a6b18eee60e4bd3d172a37b25789294a3d2b9c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598fe303a469aa2070bc981cb051c0f1e
SHA1891771225832a30e6c91bc4705a189c139136dd1
SHA256a90d5310f774f83b48d3fc4701eecddda00f4f7faa29f42e3d939d1ffcd0214f
SHA512f6d4c4d6543a41c5769cbd806dec0b4bf8052028b8174682512f977fefd95b7d6b2592bb0c887f27ff268770d0ebe3f2931b2b8c4e75df9f743843248466dd7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512220cbf898eae0b1728b520c11c5f3f
SHA19a2509e8d9e9fe2a624f1e022548ff9f1368310c
SHA256346c3d1d214962bd7cc9f715c69739b9ec15bb71bde00f6421281b4beda5e437
SHA5120f3c57db2a3c2b34c7d1340cc3b388c7ce8ba3446e0c9ca7b5acacf7758ff43f3139b2a1c98f7383eeabbeaa0e12fa48ebf11e60ac10472f003968b97bfa0956
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5830fb4728e5f7d6aee13965c100ee041
SHA181c25e69ac4c629d2f1d818cd4b41b9ab762e29f
SHA256365a2bfb85054993d891143ce15ce441a0fa56dc6739c0633a2cc9e73894a334
SHA512344f4a3845de25bb5a4199769e4203287a43e7ca773326db85854f51e4dce3eaf78b18b621ec04473c00e357dd0855b79b2f0f52dd0d5c94bff51f0493036246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b39b657698e49878d9ba6e5df09556c0
SHA1f32536b4d864f8742bc7ac884bbb049f9690c5ad
SHA256b7411f81f4a0bee180dfee996cb507a010265f6e20bb00aa31d281d23055903a
SHA512626ebd3562cc39c9b958a442f2c7e481243c282f1b9d8eb4a29c6608bf686365e25a6dee0195343c799a126a0371d094fd02a84b5172d1637f8b03809023d9b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d50b91e2873acaa7e176dc5aee0bd528
SHA131d05fa3fd6c482adcebb393ddc35603eb9c95c3
SHA2563421b9905ed0d6a6146d784d32f797fc8cde91cf33af10e7a7332124bcdc6b75
SHA512ada6a44bd776c1126e7aa7a45041a45b3b023e1e11b5f9e3a0219e00b0752f66acfd3db56d3b31ff71ce41fde6b10300a0f440a046ad33af35d0ba97ae380ed9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b