Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-10-2024 14:04
Static task
static1
Behavioral task
behavioral1
Sample
303f29b51d58ca48461d2279a04808ab_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
303f29b51d58ca48461d2279a04808ab_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
303f29b51d58ca48461d2279a04808ab_JaffaCakes118.html
-
Size
772B
-
MD5
303f29b51d58ca48461d2279a04808ab
-
SHA1
04dcba0a030f4d606a7cbedea643ceb526d2937b
-
SHA256
ebfc66a42ce23c12a59604631fb706aa3b29d3932bd2ba79f4c28bb4a116363c
-
SHA512
cdae851d36620c6c7bdeee9d423abed1716bd872263fdc7f3ab1e114bdbcc3229a1b69c29b297757cf94a460495ded037ce22c6515220cbb7730f92ba7c23716
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434730982" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9E26AD01-8710-11EF-BD41-DEC97E11E4FF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50608c621d1bdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a57fc1cbaa4bc94291b8aae4cb8d208a000000000200000000001066000000010000200000008e0de2739dc9bb07d50148490296895f438580486f89188cee0ede4538c17cbd000000000e8000000002000020000000c441534136600b788b2a70b02d4ea0f45e6af00a6f8a1224d8921c959f920b8d20000000e706673f12c31055069277b04667d5b81a80a6dcd44a6569f800f12212a58f1a400000004d917d55cdb804c30a099c526976653fb63ee46daf1b7546f13210f41bd61f37355f9bed8fe54ff298e478454b83e0c02379b9a71dbfcf3a803e598829fe922d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2772 2220 iexplore.exe 30 PID 2220 wrote to memory of 2772 2220 iexplore.exe 30 PID 2220 wrote to memory of 2772 2220 iexplore.exe 30 PID 2220 wrote to memory of 2772 2220 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\303f29b51d58ca48461d2279a04808ab_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58db1b742ee4082325cd4c0dd09828ae3
SHA16b143a056058c7654c2d4106b6ee80a7ae70fc67
SHA256b7638e1283e673f2e3661c5f65aaa45e869090726b35d24d5b7ff98165f38efe
SHA5124b894f0b436137b61e19333378d344c6a43f1871bc9d6f557ae37e1cc94f0795923943104aa2540f8af1f15b4ca414aea6a85b51ac92c10b96a64c3f964ce246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5924f929fc27c4934c006a2a9617afcf5
SHA1e9f32279adf972e6c284d77acd1be139fcc1e80f
SHA256416d7b9a5ca03ebbbe4f79f29729cd3f143031dc718c9712bdc66ac3c7645b48
SHA51293e2c4b838242ce250323f4dcef4bc8b8725c919c4a01ac667f98027a9faee7e40ba7bc7c790d94d239771c2f127eec1ef08eb956953cd3680b8dfc28f6db6ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd17833781743c1334060448096c63ab
SHA165b738f1c0d45663d20cd29e96b81f6e0287f279
SHA2563f6dedfbc871c0d30eae782fb1a6b1ced93e15389429cbeca3f7bd39c70829ab
SHA512112c77a4cf55de0489c5b7db458b9651c6f9ca820cb3fd50d3ef0b5af5466abc9860eac3246b838a4d00960dea032cb0d7a7c5220366059bba88ee081ec8099c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fa072101d108cf364ea2cd1c55b7f56
SHA182095b52f859c3a1084cd2929349fd6dbcee2c66
SHA2564dbd3a4078683cca63a593efae6099c8c22a474a2aa6dd027af5467e2e07e89d
SHA5126f5c46e7d01ccb754fb8ca6b6034b15ce6ccd1a4225b6e934bbbbb6a7bf77c2d7f40d8b5ff1ccab236116e1b2f776e6f4b903a2c580746307afe93cabf03a87c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1a0470689b2e66aec2b2c1c5fdae827
SHA16c914c8b3567ae3eef66c62df47c715a80b047ad
SHA256739a5204417f86936111986d748d75d35135416d2b95dd88f5d1d10bee0ac2c8
SHA512b41ccfd52615b20035adf831b2556a9b4d60fc510893ff1dd80a692b9bdb836c12ed947dba47727e57292a7ee09b81aae41bc3135713c1caa31e25400bddf09b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b