Analysis
-
max time kernel
134s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:17
Static task
static1
Behavioral task
behavioral1
Sample
b4f3037f41013de29b1045de33df6686_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b4f3037f41013de29b1045de33df6686_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
b4f3037f41013de29b1045de33df6686_JaffaCakes118.html
-
Size
85KB
-
MD5
b4f3037f41013de29b1045de33df6686
-
SHA1
f95a9f088224ee923f9ee0ad73829ba06f1d3e74
-
SHA256
311d4c8036d84dd47f55a031bab447d52e7786e3696617bbc1e4c35885d1eef9
-
SHA512
80d309a721d58c63da017320a9d139db13e60a1e878c92619d35d8ff2f8a81d187f42ade7af461d81135a6117bc4101b53598abd3dc4d0f649431aa0b6de2d61
-
SSDEEP
1536:X+ipVn1BUNqvLKvr7R/wnVRWCUlSo0mjiMpbqqvmznhKv++nPLB1Vy:XBvLKvr7RMgiyuznhKv++nTB10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439105738" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{70FB9471-AEDA-11EF-98DB-E29800E22076} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2096 iexplore.exe 2096 iexplore.exe 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2344 2096 iexplore.exe 30 PID 2096 wrote to memory of 2344 2096 iexplore.exe 30 PID 2096 wrote to memory of 2344 2096 iexplore.exe 30 PID 2096 wrote to memory of 2344 2096 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b4f3037f41013de29b1045de33df6686_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5bb54d2a802ec8db234362d860a912ade
SHA1930024f05a700325cef8999d39237e62ad7aa8c1
SHA2560c1f99fad57fe120b21d8f4d1e5df2699b7fafcb7269e6e8b294d28b22d783b7
SHA51292e3981838d86e45c4b2b68d833c7c69ddb250780ad1b598f671a33eb7ac48367f5f35504dba2be216b62e68be6908c014819d776625a111ce438c336ec9f848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e9531f34c256bf0a88e8f9408673658
SHA1d1481839b02a88442645df502ecb6a9a24989a7d
SHA256466b43789a829704d705d43657b6806712bc802caf2849563dc602288dcede8d
SHA512d5ec373bd1467f87ad9b9da780c2b32dc16e8b88fd0b406f6e188b968771b27d7f5d9ce9c1b54f6d1d7dbc23f8943f6135e38b671b5d932a1f124d6a7609c17a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7acbe730bc44fda93487c9936f89967
SHA1be8f8db35c16137e9adb467202f9ef19d3c5dcfd
SHA256da9e597799bebd9e42608a0196f68126b255f133c8cfe2ca6cd62f1b07adebc7
SHA512aa6f545b4454b6dd9a74c9ad2ae79fcef31a33b44ae2d870c6292ff1755089f81d3342181f3021ff4bef3ad3cfc64c4d5133360d3de54a35a8ac0e6beefc88cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a62527177b461e1a822e252e19f2cc89
SHA16f1ddc2332b11a4178e2b2f8346cfa595dd2ef44
SHA256cb5561d4064eadb9e06a13f9fc0bd1ed019e5ae2d12af490fdc267ce11643c78
SHA512a3a33b932dc80d540521ca787077f4c30bc4d96206f6397564d9b2a46a071e3559891433b4537a6fda3230e48af2c229d9490133b5b3b492a71ed42287107688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3ee06ad52eaf92b23e96a76cca017a7
SHA1f4660c77b481c0c55ecb731504fee68f3ef732e7
SHA25680252fe68b3b247b53ee4862ee9996b1ee79a3dfccfd9bdc3e8c506144f7359c
SHA51270e982ee9863c2b4d34ddf9ac4471977e5f9e77b45bbe9808b467fc99fb782845512591c4e79d3d7864d56c977fde19ed1ab96d3c0e7b216486639ec39830e2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557a5ab981ba4ed48fe4cf9f3dc2fe7e8
SHA14aff726b0359e0a0f097691d38b11aeb3cf3bf20
SHA2564105b32972d4765d5ad16916bfb81e418ac5f07906dc5c16ab88cf6f262f150d
SHA512184806016f3610d86d25847f1ed1c6ad95119cfe5ef640b112fa5c9518cd734d05e1ebd53e3eb8a3172a3bc85f95ec2d738bae0284763b470dec74ba725c71cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5691f1dd7d0f92f96f2dc20c4d8622b93
SHA119f6e49c319c37987b1ee77e3bf5ac2f3ee35fad
SHA2565773655d2b22b0ffe0c900f9b012966af0021ef8e9bd904c9e269123299f68f9
SHA5123b898a723aa5b5ce80a7c71666e683cd674a2ad05c3a4143de5d4c0dc7090e507b06c7178be6f8ba1274ee15ad8d372695c5e0e9aa665141ef0e5cf56daca197
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57522fcc8ac9e5049f7a4bb71a801c07f
SHA1d93cc62c899d05486127c54fc1cc1d0465a42334
SHA256ad348ef61e95a52881bbdd6bf5081ac7d0f4546b1ed1519589447f145a162808
SHA5128d680083ca73310fa716fb05ce585028733b675a4981929ee6149445e9150a6c94c01d45ae0eae161a1eb6753a976c6bb15c809f5ac452502bceac0948679114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5b9a6660fb2995d3d5e111287e5a644
SHA172c5ae6d2e1ecbbdb15ef843d20efdb8a4967e95
SHA256ef511f8fb910d8ae324f2978cc8648e9bd362e6c3f194bd407291f92d354f62d
SHA5127aef8ffacfe4f2097c2762aff8db3f31a544b83c086792b57c07b9e637a33e6a358db3265949fd772f1c7fc802d2d0812b82cee55fdcf7437b0208f5da7eb86c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c44ee1249ee65b0f718b9b48dc05baf4
SHA13c43764159ca1c1fc1f3e2558091707c32a6f707
SHA25630d2256a5daea0ce1f240539a4a191762d68d5ebac1fbccce4e59f96003fa29a
SHA5127ccb61b229d89d99e9220b01a634474f9e09b548c7a5b260aab07cfa1f866e252c6e44b62da5e4d3ae2e29119c56eba8ec7195102b6f40fc49ddccad00058dc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD549922a293a943b8c59fa119f061186e8
SHA1876b6f8258a80cb458d8dc517d1742df0dfbbd49
SHA256239dad0134bc02d955b1e4b3f0b1b5eb8a90611b4d6a80303060c2e6f0e22ae9
SHA512c48add5ba7d1804840317a47a40da4fce6e56f7f622cf80ac02c6e5e7df0e513acc3d16a6d2158b884adb2de0e62f88ed4f487e596594feedf2737372ff6ae06
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b