Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 00:50
Static task
static1
Behavioral task
behavioral1
Sample
27fde0a30c957bef841d4a70c3a5a99a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
27fde0a30c957bef841d4a70c3a5a99a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
27fde0a30c957bef841d4a70c3a5a99a_JaffaCakes118.html
-
Size
45KB
-
MD5
27fde0a30c957bef841d4a70c3a5a99a
-
SHA1
ce3b7e66c193931884ac79896333b801550e9da7
-
SHA256
e0284e30d5beb11f77645263d8611d87abe7b5b6debe0d35ddb243af837d5eed
-
SHA512
63c217278dcbbda294c70c0378b11f1107c5a0ae93039c0bc7cba0035ccc0cf69f1ec091dc14f96093543aa4ffe63158984145eb407275ce6db672ebb89296e9
-
SSDEEP
768:ShPlkzcXJ/6+tljZITgZoeRWT6hwI5cWbI9IVbIT3If2caPB4r:ShtkzcXJ/6+tljiPxT6hwI5cWbI0bITA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434622741" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A718E831-8614-11EF-9D9B-465533733A50} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3048 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3048 iexplore.exe 3048 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2348 3048 iexplore.exe 30 PID 3048 wrote to memory of 2348 3048 iexplore.exe 30 PID 3048 wrote to memory of 2348 3048 iexplore.exe 30 PID 3048 wrote to memory of 2348 3048 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\27fde0a30c957bef841d4a70c3a5a99a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3048 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0597fc0246cfdeb6fb94863358020a9
SHA153bb601ae6b3ab17578c75662e1152cfa23e0684
SHA2562d1a6b70d366dfd0789c6913ba50b0cbcc6baf8b4738886afb2fddb80dfad220
SHA5125271c669a46aa90d43d004288cd7bc481ac890312a0b23440771a59fcb938f1e1875888090a2e671a8bfb3700ae1029695ee7e297ee6096eebf6f86ff2d1e632
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592aa73defa86adc352e64a8b861a75f7
SHA1a2d64841638c06010b682a311bdd940d27820535
SHA256665fff4c8631ecfa12ca9127ae46a68ad0d54af2fb32e1a2677feafdf60c8536
SHA5123a39433cef0808c5f99d707331fcb0cd7225e3a20c6becbf929f9990a84df226ce4e577f064393e1f8620fddc9426ee7d73920201ca6c0315f819e0c1eada4b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c0e3c3869167339d2c47c30ed7df47a
SHA13dae67460f4d3527c428fb55b0d5fc210a871001
SHA25670698c552d67840e4b3191f7b065077880167aad382fa026357c1126a4b7944d
SHA512cadc6bdfc0f0ed4a38a2c0f43be3ee135cda55e03b6fd49b14f586e0f8a856f54716728831c2a8b767f86c5d6223fe3eebd76399ee1ed27ee1fa98b87f0ff1c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6da8b4ae570f4d51407a65b3f0a9279
SHA141c95683bc738c2b1e3ad846bdd5348d5fc357ab
SHA256df5dfb6d5c853cad7cf8b73bcc8259fb11630be081d72b7743aa12f34f35bfdc
SHA512ecb07261a742d785acec21bd061a10b102c783e49d6577d8e9a68686b6cc3dc390631231a11c6dce06788ae45215d17cfa493e046a65dad4d303341da37b43cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae09d26167bf7899bc00f6ebb6e98c10
SHA166cf269ba5a376d6b678e39b4d21e72b1aabb32c
SHA25617de48bf3412c8dd2963c70af89bafc9807cea519ba121fcb00ee931fa2a18fc
SHA512a45904b0a03d6a75fd283858f9b12930c0c1ae445ea45c0be4612a818fe549d0f7c7efb4aa7bdde689865aae0bc9da1759e986bae1504851cec1a5610712ffb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53905cf20f597397464601a9a1bd5d36d
SHA10740c45f6a9de4ad3c0a591cda0aeee7b18cf6b8
SHA256244460460eb2cc93531200fbafdd0e0f16d2cc80ad56d473710db57976643d12
SHA51232c0122b9dd0fe1b80741f9f36b5484112547686805000d3845db1d39e64d30e7df724a360b39b7733dc5d68a6f2b3aa96720d9a995abd0fd90251e592951fea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c69acf693022592503d35d239443202c
SHA19836b7df6aae2cc168adee0ceafe2dbf191fb394
SHA256cbe3b6755ae39cbddb9512e34c6ded13bd6b3e5587d6ddabf8b74a8b6c319ed0
SHA51237ef323624f3b509ffd4e8bc5a589307aa35f703adbe10ed755b11b62e3af361f180d85706da17fdda8c15c76920d35b90e2a6e3978478c34f1fffc01c5ed0cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b29bef625aca56a0745e04388a173e7
SHA16fd93caa9b8e69cdf08524c9543f58e54bad63d6
SHA2568d147e275c3fd51ffd8438533b060ac0ed8551b2c1ed32c5dbcff50dce828600
SHA5124f23442bc14a7721acd00afadda9a93000a1855187ffa02aec41498109968b3d63dedb942c8c0ffbd711ff52a7c4a1251908b397ca58138548505b7f16f36d63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597678a82c5d4e35b10de91633b1b6a70
SHA122249144ae584f8cd908afc9a752c54f91d9186c
SHA25664888c34ce3f6db0a604b67710359bd4b9a28d41dc7fb011d9f499cc2c760b31
SHA512ca6c76a716a4a17c5f97da085681b2ddd9216fa896d9631330041aa170da9cf45d3bd7b4c91311a7ed26fd8dd62d91fc2265bb539850fd8f389ea4e9693efeee
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b