Analysis
-
max time kernel
118s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 08:10
Static task
static1
Behavioral task
behavioral1
Sample
826b4486d5dbb131bdba2581f33427c5_JaffaCakes118.html
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
826b4486d5dbb131bdba2581f33427c5_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
826b4486d5dbb131bdba2581f33427c5_JaffaCakes118.html
-
Size
9KB
-
MD5
826b4486d5dbb131bdba2581f33427c5
-
SHA1
63754f4ff03daa602f083d369d6f70415055159f
-
SHA256
ba9ffe7652b692bdd8b01f65b3dbcd76288c4cce349b11fbfd330a6fc7c9b8f4
-
SHA512
b5f041de32a04bec6dc3ead197bb3380ba99f64991512aa1a8b56d35a7c72ca73e22c6d5d9c7eb20de4eb951eea77802dff1154eb9368874033ab6e74c13a9cc
-
SSDEEP
192:SVsEUJRDJyjXIRKDvo/nymbJY/Tm779UzSjN6jT:SiEUDUFI0A9UOo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "436525595" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0DF6B821-9763-11EF-8FB4-EA56C6EC12E8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a907cc1344750743988d8bab481dbfbf000000000200000000001066000000010000200000002fc048beaa129efae6aa1736e86f19e8377a4b37adcd22fb153d354148e325c3000000000e8000000002000020000000ca237d702fc7385d14e0f9d2887efdd5bb998f7f11e3ee98b16c26fece4a3f142000000064f46ac0df95792501ef89fb8dc00eaf41dd2167c0e1f53c6fe4038d3f46d352400000006ec3714597ea57bb88c7c1609cfe8826d1180b0cbc7537f6b29b6cf5689f4355a1edb8afb4715b321531b85c9b41533de3639cf56341eb977ccc08942dbf8463 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a907cc1344750743988d8bab481dbfbf00000000020000000000106600000001000020000000aa62d2b03d260be132f686cbbae807eb7d6ff78f2158d39492a2e815157fe44c000000000e8000000002000020000000032afbd28663fa8362ea5c2edcd129a2787ceaa53bdbe0cc25bc2b88cdbe48d99000000073424316d47b6575bee4342fe879aae19b0704ecce6a77c5ea55f8c8c6a2a489c8cd2997f6b37fd1180476552d049838ccdb339bf954aceaad5934834db661817233f184dd22e22388a6ba17ca7084e399c0bc524d756bd7b514800e67ac8cf399596c4aa471879e8fd48e601b4b2661d10096922f66594ed178f81a5fdbd9235040c53128edab751008bae198b8ae0d4000000020d155ea9838bd746fd417ff2f14e9c700422e0d32f7554fe4e3fdbff86c963875b42d75f3577d38d79b3afc499a98891dfadc1d3e7b395957c5643fe5d8b9aa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b024fbe46f2bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2800 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2800 iexplore.exe 2800 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2800 wrote to memory of 2788 2800 iexplore.exe 30 PID 2800 wrote to memory of 2788 2800 iexplore.exe 30 PID 2800 wrote to memory of 2788 2800 iexplore.exe 30 PID 2800 wrote to memory of 2788 2800 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\826b4486d5dbb131bdba2581f33427c5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2800 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4d21f2d32f21e9eeeee04fee8232e23
SHA1900d63628792809914a2eeef62db7f3370ab3d13
SHA256f7c6ed5c0fb25b1823cc9fbfe7a5ed74abdc9d8e8bee9cea251914fffc42436b
SHA512a9569e37b607fb768b14ff01b14ce9265033e038f6fc1976b3e64214e6b402e3bed3f267556f4a6f50cef9eb4c6cc735581fc50e38480f1b926a699f462caf9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaf187bbc928a606413940dec6fb0815
SHA1c963dfee228d6b9ab66e2b2dea2e81765ee5317e
SHA2560b65f8f52374f890753110e0af16e37c3c9284ec80aac031c47e897ed00651b0
SHA5127158cc25f3f2bfc2e4fafba1e59658678dd5520b54c4760845b60497108fd2a01a28b3afb096f938d12f9c2fc000b6c1cb9fca92cc86ac1e7e2c2f415ffddfe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5102b6aeff9e9f22ce812a43b440e1800
SHA1aef54785c60962fa94b7f5c316311b1ecde160b6
SHA2569178c3c05e433dd09a2f601bdc8db57d7d24b4d194cb7b8c1655bcc61a14ffd3
SHA5122a57196c4324fe6f44af370fb82c436730b8facb1de95fc166f57a505732d2b57f4a744337e6c7fa91c362e5cd5d32aa0cb74f3c84704c390290b334b4d5eb6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8f2e5ad57646830907ec528321eb48f
SHA1b612b44d5ab09d4a73868021bb2ca165d1e8fe65
SHA256c93ae6ddf6409289a59cb917ef0cc67cc39d98fe1f6a3ae32cfbe2e3342e8ebf
SHA5124fafa595cc5944b520423c3f4248f130d1bddf1d2d657d29a86feb83465093e85c5f8839fcfe898037537fe021dfd715e0b1aaf665c41da03ff34d76eefecae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5792754141bdc9b686985108bf4f2f0e2
SHA11ce76b95227c1e26de52a9dd93dcaf6f4200a23a
SHA2566f4c492b9eba28686861f6f177cc099311ae01056f94e660419284c576728b7d
SHA5126dcfc5506e372ebce2efe31015223a85fc6570f0a11f9b747bc578d587029c4d45f16d8e0c085b46bf37f49973e75fdeefc93033a9e2757b504a60f8f1624c51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b30f7aa4a3160c070786b230c9cfe7da
SHA19e94c54a2b75640ec3648056f84a9397cbaa8f09
SHA256eadd448021a428cf0ecf2eacece9e46c415b1ea765dcd23521337f8d0ef331e5
SHA512267ebc49e9fe53f7996d2bebf928f472a97990dda7663bff43cd2feef88996cb87ba1475c7e009fb43a1ac73ccfdac3f35edc00c4f5325facef2820501719bea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fd6c1bfa064b76cd4e94e524e882ab0
SHA1e0fc2d293d4a535d7c02db919e8645024a27ecc0
SHA256ad514f86963c0835eeb4b8b35c2bb9049750d57feac5753ba6fca25035e137f0
SHA512c79b01421e787fb82427553f39751aa2e4231c16aefde6c363501345d663d6d760b6c780c945b800ff5204c43adfbd0089948df71d73f39021dbd949d8e601e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e966bc94463c93a883d51e3fb39c835
SHA1e9c1ff315dcfc1bfd1ede2127492f4ffa658c80b
SHA256d1753a39243a40e42631cde4a250826810d51eb7ee93ba3600f60a7f64318c36
SHA512cf5a707f47b3c7e4639d895c13526854eb7bc5fe65234c8240e273c2e62c909b15299682811389bb001b4660dce68adb9f664edffadccb50287170fcc01885d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5832b2ada3ff5e6a11b6e8ee8016836a5
SHA1cf31cd5c6dfe4431818e4cdfad70652156163de7
SHA25625cc346a6fb61e9f95ee6c4e507981e04b777e389f0e349a6f8a53b007fa9af2
SHA5128dde629f5f389cac57abec02460ea9ec3ca247211c82ce40afde9ee0a96a4e99c9e12de25b1bb6a37800ab18fc1410355ed53c57872ae228b731f54580328016
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b