Analysis
-
max time kernel
133s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 08:17
Static task
static1
Behavioral task
behavioral1
Sample
826c19d18de31edace291c8d8c0fc68c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
826c19d18de31edace291c8d8c0fc68c_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
826c19d18de31edace291c8d8c0fc68c_JaffaCakes118.html
-
Size
85KB
-
MD5
826c19d18de31edace291c8d8c0fc68c
-
SHA1
90ee0ccff720fc6c85df39b769ff6a60ef470ca6
-
SHA256
9439b67798be51b12fd76de77da2cc50513b036d2ef44e0393359eb5fe07ea92
-
SHA512
70a3b458d7b39fbb52acc21f244c64991abf3990c768db8a3ff4c35da1d857f67ad9813786c1e2942d22883d9de0beebdc77093f9e9d3f8f5a5536ce55e1313b
-
SSDEEP
1536:w+ipVn1BUNqvLKvr7R/7nVOWCUMSo0mjiMpbqqvmznhKv++nPLB1VI:wBvLKvr7RpaiyuznhKv++nTB1y
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A822D151-9762-11EF-AA3C-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "436525414" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2644 iexplore.exe 2644 iexplore.exe 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2316 2644 iexplore.exe 31 PID 2644 wrote to memory of 2316 2644 iexplore.exe 31 PID 2644 wrote to memory of 2316 2644 iexplore.exe 31 PID 2644 wrote to memory of 2316 2644 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\826c19d18de31edace291c8d8c0fc68c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb730f0589d7c729da1b7636d8539a46
SHA1d47c7472da24711c27a17b1ed66e1d5b22fc59cf
SHA2566cb77c04e4c1f600d5c3c8f520b9126d8371155e6c0127662f0074c6c6a90599
SHA512924e584fec3b1f293443619cddf41137a99b61b94023ecef62f67fb2dd8cbde9b01f88ac8d1f1682638950c11b87bd27ee283401e9a2dee159616b4cd90a816e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58efcf38d3e8acfaf4a946ee29bf195af
SHA13c80eb26dcbe6eb60a52a93bd979053b6c6571fa
SHA256d7124be4ef652be7a808309dc734f9790e22a44aaee175d4b939f25db4e4f226
SHA512e26f5616a40f503149e6a71af74e3e2bfdc3cd93fdab5263769d2c12f921d16146603435764b35b807d4c3f420bf27c5aff6245b44975f94c562f79595330e95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b09c83f390fb004a1264591abd8fbf14
SHA10eb45b7b841db9b2f64bdd959c0364a3c98c7b79
SHA25697bca687cfeb32ead45b993ebd0c136d62890d786e2b9cc21de82307c8ccac96
SHA51208c0aa2c6eae10a2078949a2c71189faa8256ee80fb113fd5ff43ed423511aa49bc1c89046e24a9d43f2d603fe470906c9b70c320614d206b0b320b1915f4193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fa3daf7b09cda6c1582a63a7504fd1f
SHA117463eb73b765265219ce26dd59be5fa8b2ec93d
SHA2568b94a1d2e654bd0b78f9e350b8635a653e0cdd130dfbc0acfabc025552e380ba
SHA5126df4223b7fed15cb336b18aaa344102b2e77720f4be924088b3d7b734c11fd9076c14592c0f2d621e50112796e64ae09a212220c86bcdd70824b674d161fdad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e0478cd4c69c236e9b40841a4dd6ee0
SHA1fc33287ea8db2dc2d2d278203cc13e066ab08308
SHA2560b2e84c8089e4fb2cb5e010305886078e74a4c70c3dcf0e9836fbbc0aa279bac
SHA5122a9f10f4c6dc82e9086a2daba157621aebae585c4d17400d5141e5c0cfbb4434304346ddd315578601c01e8c733f46806bda588d37b4b19ea73843fa6e167a20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba40e8ed48eeb4d5d5ee25825ca5f4df
SHA1f7fe7ca36cf4803d359a8869cbf968f8a9b8acbe
SHA25627349740b77917751264bf3ca7797de4160abd5626f60ce8778743f60b3a3287
SHA51244356281ed5026003a93a5cedae8b6c65badf89c916229150df55f2f0d29469d9f7ba4356fdc5cdc55c36301806dea349ef8e67a171d07767f81a398ccdcab1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c37b9fa975b11061a00f56f64b19a1b
SHA1ea0311670f76bea44b05252f2b2e888290184c71
SHA2565f0cd497b6960fa2f0e440e08248b21b4b95345f0c656c32a117761cfccd4c16
SHA512131933d6fd9d1e8a10938cc86234fbb51d20202595053a521aa7fe62e1c34e4241b42e5acd5dccb0544e43d768f6dc9375d7b840344184873916852f1f45053a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc567dc045ff2fec3336076936c4acda
SHA1ba629e92f80c01fee0a07ee348055934c03f36dc
SHA256a62f1fb263d0d67bd6e359bc54ca019ad105d0e9e349ea62e2c3d2a509bdb301
SHA5129906852c4db3ab7d04fedb9e06757bd4965e209d55b79227b065e023882021d4e91c52f566c45be3aea0391f25f2dd0c48f0d86f12876f144fe517c6c60a3cab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faa8e1f0fa7f0f434e56732a0e66202a
SHA17276ae703d2bd19321126b214a039b999996e39f
SHA2560031718509395330d43dd44fed899636897164a06321ff1d98d99b2c47c8af4f
SHA5124dbd70c873b796101d405576e8374a78d079346d9221fc7b021f458b2e21b66c021dc26ddbe8229ba621571e539da001d77b6b2aa9c6de0f21aca1b80217a16c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b