Analysis
-
max time kernel
136s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 08:57
Static task
static1
Behavioral task
behavioral1
Sample
2e4d1591d935ae6ec26b0acf68d2c989_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2e4d1591d935ae6ec26b0acf68d2c989_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2e4d1591d935ae6ec26b0acf68d2c989_JaffaCakes118.html
-
Size
11KB
-
MD5
2e4d1591d935ae6ec26b0acf68d2c989
-
SHA1
d3bba11c65bd6fe52a12623aa38d786804f6e74f
-
SHA256
69579f5f9cd42798247a3df3f64b7d92a8df84c9173e81ceb5771093234c800e
-
SHA512
c0901602367db05d884002ab0ebd11802c39e3b832d1be153396be73a999e38726cabc0adfdd056ad5d345e57bf8a48990397cd512abb172026a4556906617db
-
SSDEEP
192:2ValIsr0r57MqxhT8i/w1wvqa1fRLOXuBuLbdU8d:salIcIQqxt/ggZLOXguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{973C2B21-8682-11EF-BBA4-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434669976" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50b8deaa8f1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000003da1b28b9199786d43b58ae04c325609b5f306c070a1c7a30d316ca7568ea90b000000000e8000000002000020000000f6e8ef0c8707036aa96684051e7d97474af696bfb2a0de7493455c3e88ac704720000000126b43ccb1882a166195b98d24b993fea7df850ed1befacf261d20f6854d03164000000011418b1f47b7013229ea17c75ede859ed1f394e46b158404970264389016f393d9a6eedf92ad25e173334e9dc8faadfd4e97a8987e843a112d71adebf3f986ac iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2188 iexplore.exe 2188 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2804 2188 iexplore.exe 30 PID 2188 wrote to memory of 2804 2188 iexplore.exe 30 PID 2188 wrote to memory of 2804 2188 iexplore.exe 30 PID 2188 wrote to memory of 2804 2188 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2e4d1591d935ae6ec26b0acf68d2c989_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50599abd92482fb10678e41e57dd0d6bd
SHA14337422fd08d14b295f3087c83ea5f674d2407ab
SHA25607ffff4d0fca544b7c716933a7ae63c23d19c510eb84ea86d6528a5d1449e79d
SHA5120014d4691db4b48e67e605bf4d73f186444fa5b1cb6ca52ef276fe83dc07444a81c1f6012419e24c3dd8a5404e0ee27f907f640000dadc9e54d668d70a5f7576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5203599c48affd2a25ceecd01d46ae27c
SHA16ac1a1908282df4b13fa6342c680de9c6c6a1eb2
SHA256243c7a02aae0060486b7cf88d495e3d4cea5dc3638fcdedc4282bd9fcbe2a7b7
SHA51202cc47835710aaf24f2712291329eab3153b6b1e3be749e6251083d01dbdc450def7eeab4bfe8fc0fd64f55e5737b1348c8ded9d5b72b81f7072b5433780a97e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558ef8a99ab6a29a0566cd28d8a58494e
SHA1927c5ba5d0a34f966d5fdc3d2182a00c881d07fe
SHA256572d2d6229e37a95d589eb3c9a5d1c772fa871a260b8ea4768c7f5bec8381d16
SHA512eace808f1bc451a222219be7946e4a6861c634b0fef0bcefcf79bc98c63b4b9d1d0e6d9be6d793add8ec811a25d2ef31000860e181479a1b48a0d3aafac81ca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53db606d4d04d21973622938c6510a26a
SHA1e293656b0b0c9f71a6ae846fabd021788f56f126
SHA25634de523a83470c2f43a356b63c05481e3a4454a379941b27a685455559ea2116
SHA512ecf52cdef7c7cc6bfef04e58bd89e8f5333e40357f3dc5a4f029c25c1de24202b59d24591befee95de11fcc43a196b221ccf781b3fdfd90790c1eefc534e6029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1009db50cefd9f4b1fba58bf075f665
SHA10d9cc6810c3d6daa1e4d47b618980c37a731c99c
SHA256bdbdb479d3808078950e3a093890c416e9e8058a9460b92b4f9e9fbab5f5f97d
SHA51229425d5809344f41b64e406985512fbca63cb9d6f46471838c2e95b5ddeb7631de34d4790bb38f4b3b308818eaa5b332e5efbe4ca2c4382cb356a9470420b96f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5353446739c01c514d7766825c6dfa0f5
SHA1141da70cf3cd5fe65fb3dc6bfb5d0888001a1a0a
SHA2566e7bd188fdd0a92e0aebf159ec82b32a12fac9e31ade27f1e50207e35a6e963e
SHA512d3fb101ce4b4d67c05dd6cd65da034a4e17c5f092898fc71161962ae32a920a276e91aea19486e53161d4808c986aab1697e8d796b6817e5bdba545621b5eb45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab15bfde47bb72c75b591fd1aa647c0f
SHA1992c2fb04913805b334923a38872f7b72d614d1c
SHA25666d22665b15989957bf370cd3b058e23a0004f4a8aaff47b3e8ba190e9f3e921
SHA51232e65e6f5bb8c0c17a39240ffa86046713866712e38430eb4b8c609fdd9413b1ad5913237ad7cee3db6c8693268450da780c801f2d47fbeb364994e6e8967b5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e94c73e34e47a205487a00beaaa1c46
SHA1974215f4dfd5be1a14a3f71e2801938a4d2d8993
SHA25632dbd3b00b25defa52671e368002b6f51535196c55659e582f643c6b58008f2f
SHA5127cb6a15b6324e8670fd3605ca0c64265447dce3807c81468dbe4d589552c146f082a8011b035da71bb0f0524f53cc94f4fe4fa52d14e91d37ef629f2149559f1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b