Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:16
Static task
static1
Behavioral task
behavioral1
Sample
b4f173e08f561f1abaaf53a105fe38dc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4f173e08f561f1abaaf53a105fe38dc_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
b4f173e08f561f1abaaf53a105fe38dc_JaffaCakes118.html
-
Size
12KB
-
MD5
b4f173e08f561f1abaaf53a105fe38dc
-
SHA1
cbe91219452b943884c5b54e7377e4e31c166c0d
-
SHA256
bc3cead64a87dbf0106ca253f219617d077efc5d3cc3a3d5dd75acfb3e730ed7
-
SHA512
b173bdccc585bc04475180e69fe418ccc3b8da50658c8bd52f877379552ca684e79602fec338da05d3b4c408e1c02d1c04e55fa068e4d65e09b8fb62bd48cb68
-
SSDEEP
384:srlIcbVpjns/gcLBkZcnY1DA70BLOXguLZ:Fgfa0ExLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439105641" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{38566B91-AEDA-11EF-B432-C6DA928D33CD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2016 iexplore.exe 2016 iexplore.exe 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2320 2016 iexplore.exe 31 PID 2016 wrote to memory of 2320 2016 iexplore.exe 31 PID 2016 wrote to memory of 2320 2016 iexplore.exe 31 PID 2016 wrote to memory of 2320 2016 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b4f173e08f561f1abaaf53a105fe38dc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2016 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50642e6741240376f954212772839251f
SHA103ccfbeb37611d521fc84e0fd74388cf1532bc47
SHA2566f2ae60a53db5f535babea93c750e8be4ab1e04c5f86cec7f00a8760f0bc0d85
SHA5127e5a384979bbc900176e2d957e75b555e3a09c703f8fb703c9f3b95653580dca68889a4c9b9ca5bbaefe79d2eb7f64610272c331e3fe9d8de68473c5faff00a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f2b749108ede7acfea395971e5b89c3
SHA12c77a61650aa9f42010543993a68c46c946bfeff
SHA256cd4d520dfa0dc6dcb0582d9e46a6416148051f48a9f980f8376e21c3b59d4cff
SHA512df96a32b9ba68b25a62d0541e06e79a77f793378fd43d4a8d890a699eb182a2516581de8674d21a44d4aa3388f8cf41e538a4e230fc9d13d43912816318d56f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4e5033e62ef35b32edc4ac5cf4bd22c
SHA106f9b703e4ab5f823849d13340841d0eab108a8c
SHA256aec1048c56bc413a4a85f6c3ddd96b5d5641b7b94c0302e3122ecf0841c93113
SHA512c73a06c891d7cf4b6653c9e515627e14745d5e2fa1141d82160c8003e48edba3bd54bb5b1ffdb0735fc8b9b96bc5e01748a1e49b8a002acfd0ec8d6570673f0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552abf37e0a8453f0c6e7ddd77cdd2db0
SHA16af37a9a5d2687e69046657073cd30ab2491756f
SHA256f1f1970c175e9049cf45e6a0e68d0d7251c94c301841ea5393951e24ab7bd691
SHA51217e43dda72590df2cfb9aed351cfa04fa3b3065bbd0afe8d5473ba215ac1b855c2a5c1ec7f8e4234590d7ee566e1a42c2fc1f12a74bf3d328015a156b787ea8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d87db1fd3e427d46e7c20296cc9d12a
SHA144e8255a33ce4580dd1d1eeb3cc89282222182b5
SHA256f135857fb7bcea7f2aabf0aede7e2adf12dc9c79fbd92c8f99a7a805349814c9
SHA512823b3e2e3020ebde0ddbe430d8fcf59b603e481544a1f694fd4a14d447dc6c0e3dfc791dcaecc2e6b6e95051c5271cbc1bc753cf315dbeb580c5e0cdba606adb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc212395990b3a53ec45c6031cb7608a
SHA1bef28c253e7878e7c4b007eb521f494ab084dfad
SHA256bfeafc62bc9915747fa6a522a6d311ccbed117dcc48da6baa95ebca6fdc2b73e
SHA51259c5ae78644e0515afb92097b1ae94b9b1d8a3833579696b6c884bf5842b27132ea7deebccb79481eda9a6e269cf76f8f3a07301528bed2883fdcd9bfdb32740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518c7c98ec103c6f2460b7b6d52beb158
SHA12e016688ff55a0582bd763e051950ee0b27e3880
SHA256bb63aa767d0ca5b4b75641861c4006eba15df881cccd6d8b09a42201222b2204
SHA512b8c842acaec6a70775cb482d590ceb0ea19e880353773b77ef87b8648fb87cd126d922ff8a47365c5e6b21649800e5c9484de6bdad33f816ee0512a934cfa82f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bfa1495688f2135cb1aac305ea8408a
SHA1f5c5ebc210d68c8b18fd3eaf43b7a9341a48e5b1
SHA25648c93f89b2e52c9bdbef680ce90a4b24a99757f2f91885f62eabecbb1bf43fac
SHA512e5afae6b75565ae8079ae392754f5f0c69292a6e25f032b38e42321e911299cde15a15846feaee34ced2a7670db6aadaaa66a4f496b401888193aebdcb402cc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b