Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 10:01
Static task
static1
Behavioral task
behavioral1
Sample
56d1914d48456b7d7c4fc17a5f51d5d2_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
56d1914d48456b7d7c4fc17a5f51d5d2_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
56d1914d48456b7d7c4fc17a5f51d5d2_JaffaCakes118.html
-
Size
11KB
-
MD5
56d1914d48456b7d7c4fc17a5f51d5d2
-
SHA1
984c844579c10128ba2303199cc154df9621c485
-
SHA256
a8ee13db4428a15a608bd0f20c83851e4b47217a823fe7b302f7677cfc7dfbcc
-
SHA512
d1e90f89e062e68eaf6f47a929b76dabba2bd3ad00c881f28be6966ed30f68f88ef5ffb1110da4d6751998495953db902da8703d23f5848ebeecf8feae7813af
-
SSDEEP
192:2VFlIsr03MN8k/w1wvqy/B5AnRvpXkf01fRLOXuBuLbdU8d:sFlIcuMv/gc/B5AnRvpXkf0ZLOXguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435407534" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E25E2891-8D37-11EF-9584-DA9ECB958399} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 iexplore.exe 2180 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2940 2180 iexplore.exe 30 PID 2180 wrote to memory of 2940 2180 iexplore.exe 30 PID 2180 wrote to memory of 2940 2180 iexplore.exe 30 PID 2180 wrote to memory of 2940 2180 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\56d1914d48456b7d7c4fc17a5f51d5d2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa9ad46ded09869cd7e40b4fad32f999
SHA120f94793e7f0aea266761c3030a976d92e7d1d30
SHA256f07a3e13b5db67a4e75807c595252c15e23adcea28039c54f845a128a6240afe
SHA51231d4a138f7535b8b1c258ba7a646bd3f7ae6ebb30d22d16c27a466b72e2eee85f916e473cb4395d5e34c65a9324e20ee0db346aa47e0eda4f16c9617958914a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe668150da7eb1d2741f98d0b49c6724
SHA10a264c9971277dc5498c38d1468191a01e03157a
SHA256778420b714ba89989afdc6ad1ac18ed3f391b9da96014023b90d7ff130b20335
SHA512529edd073459e547aa81455d9a529a678ae290b1911f0eb16e33fc60c066ada8e765ec96d2a95e3f3976e9bc68a431249ebd0ee61bb92cd908320ddb4d73c800
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e8701655393bbe958c25e95be6ab127
SHA14cf5f5f3b84c76d4a82e59f659098e15301111eb
SHA25694f9b88f2520da9d6e4b2d355e8be471cb42e99e932cd41e66aed839566f00c8
SHA51296590df4325cb7a03d6b81df21ae1f18fd28782ac5047fcfdd848fbdbc61e9c103a610d1b7a30dcfd221a3c54274dd41ac7412ec53822e1ce080af6991a4d435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5426691aa05cd719640261c5806daf784
SHA1bb40eaf7f737e1e2165033bbeeef87508b3444ac
SHA256812d04396ffbd04a8a9ba07b641df7d14bef9a02a8a0ba8afb9fd199ea12f6fc
SHA512ac679a3ec703e81a967320456ab51d6c9e94fa0ed3c8b16ae8b4d157a61e60f772c11ea332e81599598a826fb5908653a978e137ebd421e28ab6e325ea9b77fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3103a8caadbe8d31add2a44b04485b5
SHA101a0d8722695c7d8640b5ad01e46b3c724945f95
SHA256eca6d5dbd5a207a6192feb34f8d09664ed9718e18e4c3213cb22dc81ab98359a
SHA5121683b53669ecda02c813324c21895f1e26757b69c3793af57a38e174e26fd1445247ef49ac5a8702456bd8572fc0a4d39299533ef39a58614cce5d2d7ec77fe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5368c0d201bc0ea91d92f425c6b2816ac
SHA187c9cad7d6bb6a4946d8398a7d1adffcbc9ae905
SHA2563df5fdcba74761013eaeb34159cc380e1fcd7a66690962f4a8ce55d5b961b082
SHA512fe3a18b16f3d1c2514a88d36cbefe413b56506dcaae47b471010a6591ce8151d50facf03f79bbd7a71fbea72c4da5b5f3bfac42d814d80d601753b7e4c9e34a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59edc7fb746ce41d4a92ca7af6908f5d3
SHA195b79153742abd41ac69a20003e1f05f297b8801
SHA256bc66d387ea499500d1a3f27cce743f5a7a46b2bb2bda83a762d91d47e471d562
SHA512b89134283bcb867a83c196a09d34e21bc2d5a7aeed3d3da318a75cef35a66d77b97f88d996908a6df977ffa5a1448f3f3217d91caf2c8a185f64c2969bcd75ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5334078bd6dbb1aaefc4a8fc2f9904c22
SHA1a413de15e05b7fc70b0cbf81d02b49a49a229c8a
SHA2560d8ed07fd0589bd25b09c1a6e73f06ef1ea3f958eaffcc4abacb915fb5f20e93
SHA5120df5bac7c43a3ac76c1657785b2f18f9b2d502bae4368af2958001596273687da037e5b64db19a8937fafe6791eac1a6ca572f1169d1a23f0b30547a0e4cac62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f5cab87cae6d7f897137c8a394b363b
SHA1011e915eae8735ecb320d7f586557aef305d1b47
SHA256079889a8f94f50204767693913ae519e4f7de8ebd330f95f61eca3895ed29895
SHA51205b262e584c4edb4ab421cb18d88af869f013f8e4ccd0d8b4f0af08eab0b4542a02b89def7093c5ee9228837a1d93ea07b6cc24f61eaf4d9b887968590e33e46
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b