Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/09/2024, 22:10
Static task
static1
Behavioral task
behavioral1
Sample
ea0f9126a073bd403881ed3dfe1feb3c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea0f9126a073bd403881ed3dfe1feb3c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea0f9126a073bd403881ed3dfe1feb3c_JaffaCakes118.html
-
Size
461KB
-
MD5
ea0f9126a073bd403881ed3dfe1feb3c
-
SHA1
0095b1bb4026e10bc06a1e7ebefe1d4b65a3541a
-
SHA256
c25f9f208869e6a7c8d3b142209c3d73dff7769ffe49e60db4637309b16ff362
-
SHA512
ea5dd10dab6af4a37bb1780e9122e8d1f9257d32c0e0528fc2c3eb66b84a87cc6c3693ab52b5ee93faef81671a0c133f3f54f42e6c4b8e9a67c1e04c6ec5dfc9
-
SSDEEP
6144:SOsMYod+X3oI+YReqZQ8sMYod+X3oI+Y9sMYod+X3oI+YLsMYod+X3oI+YQ:r5d+X3N5d+X3f5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D1CCB0D1-760A-11EF-B4B0-E62D5E492327} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80e6e9ab170adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432859299" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000004df64b10fc8d3f1080b767c7abf39bf4924a595424c7f31f5ebe4915a2e1a93c000000000e800000000200002000000007733f0e1ed7ecc6a1875b84cf7a992915de7db0f30e2239511831317a42de6c20000000183dcf8cfc1bab6c7dc86ed5e06c59e016b8c29450deaef7068896162e928e4640000000fed65edbfb37aa595c08acd996eb41360d5c4b2c6e166d30fd24bd4474edea3a77652477211d5c44cb3eb2dd7aa0724d65bbf9bfda0f0abfe34892617b59f1ec iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2148 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2148 iexplore.exe 2148 iexplore.exe 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE 2940 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2940 2148 iexplore.exe 31 PID 2148 wrote to memory of 2940 2148 iexplore.exe 31 PID 2148 wrote to memory of 2940 2148 iexplore.exe 31 PID 2148 wrote to memory of 2940 2148 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea0f9126a073bd403881ed3dfe1feb3c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2148 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514ac679e254413d4cc59576936841fe6
SHA1bb656bef6bb3820e04dcfd3ab624f8397d8c8edd
SHA2569371ea620f8c4ae2b45ad102f55309ff77f5c913b2ec79e6e47ecb54c0c27208
SHA512f58bea4f33bc60eb5500c87e4f4a38481bfb1edf8b60cf905a08f2afa26f687faec9e03c3832b43016ceada0b498aeec1d1731e95f7898a5773fb6f70f947375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b6f692f273d0c342a770bda275a9096
SHA199ed81544907485f273624712b1fd311d60d9de2
SHA2562d74c436bb178563c83c9f295d320250bbfe461d06e239e9aeb4b76c768cd841
SHA512dc7b2d12390bf409a71e26f18be88b4c562dce7f8e323f942ea6bc792f92c59e22f12dccec9d259c5d03be9a02a4a41cb31222e6b6a95ebd89908f3cf76b0019
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c9b78e6242a847d4802fad9eaf12c7e
SHA165740b79d976e241ee4f5843527bcfcd568fd272
SHA256806ae84e602d81839fc0250da1e0dfc17e5984a61fc6224d1b67c6e9211ec862
SHA51269e9e7be70e12290b9f2df7dab38115615eb774bb049b737374645daaa340ceaf1eade895e3bd70a569bc20f95b9a97bd10484b73e0cc55dfde1b43f809be488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f585182620d759367944c5c0894e1d0e
SHA1cda8197ff881aec06c731c1c7387b679a086d473
SHA256bd04a030d2b2b83e5f68458dd8548a03e5a8f846f69136c48896bcb18fb98290
SHA512310bb965b159bc06fc95e553529a1f98c8724d8ee31d91b3b6401e236a959386846ec3c82718a5050a35eca2a1ccc1cef26ba66365bf296f8ef862111c59da78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f5490eba70243e9292879303b398206
SHA14815d12342604051d739819f0f8ee98aee50a2d4
SHA25696c2be3de9caf6668884e640df5725d2d53d446a426c236b677827691dd0f811
SHA51282e63ccda1f903a60f9d5d282db6bb71ffe89af3ca9f0dabfa799c10ddf9d1e0de1a88dd3406d92cab328a0e88a65c3b62e28d6fcddcb3e8934561077cb84317
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e906a316675874f13e04cccc71bc1a9
SHA1fe89cd32af7b39fae189ef46265711b48def44e2
SHA25612d430f06ca319a8adf0f24ea6bfd571844234e426d4190e7ecae9b01ef3c45e
SHA5120a6c65a7513d56f4efb7a5e0e87004782e5197fd5fa3d9aa81e20dacdf60794e118fb73d95051c577d3cb49ff9f52918d7aafe95e7124a9df8c6058d3f6dea85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a12f952023a3321e5040c81d23169ce
SHA1491f36c876cc81ed46850792609b5f6f0bb17d02
SHA256ad2e70d0d2001133c737569e5c6e1d0a71ba6ee9f0e68ff68fa91f1230e8460f
SHA512f8b57ee912517d6b09ada2e148ef67f602ad7ec1668b339109643d251a3d17c211df419270362887653449a33737e5519b47c53341f589e730f150bd782dc4c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccc3bf774c3b2dfe9eff7c7bdcadd6a4
SHA17cef47cc9d36ec1e709b8c284cd24f693652f1ee
SHA25602fa8106ae0cee04b4432efb0554b9d03984ddf016f46b8e1b44c578269101d6
SHA5128c7d33b3105ca093fd5674ba3ecb0019cdb00bfd6697fb03f3fed26d2e3732885a8f1f4174b8b831e1243662638ec77ca3da16db35e120ab7223f66cc0db1712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525a2526152cb035e5ce0e860bf2e1079
SHA176eda0b548b730fd9590b425d157e91ee2061701
SHA256ebc3a6c2616f4f2c8564c5104f55d9abe8bf14130825a6016c1b7eb95e3d1fef
SHA512933b503c3e44ffae3a8603c6e6cebd1da95f938a7af7b13f2a13598768859429a785b2d2b2d13c061989ac48f17b901d6740b555b8afe9567b19aec93e9ac581
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57512cbecbc86c70510e1b2e164a1cf84
SHA13580b74b69d55e21af9b36ad01e2b6d2b7a08210
SHA256da5d10c67befd11aaf3b62da7f5e957ae9d8a829f35d1543b6370b106f6c89dc
SHA512f6da57c5626b54d8f97e3b1b6ee4b1f97c10e5aed363455a8829f62adca8ce7df9dd0c3e4983cd7eb8923c7a8654d62970116370805e9bcc4cb0c85f5531a970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56117727f6d7d63d555c5f1e85c0834e9
SHA1f64fd2a1b469e76e8831d910723a126eeecf1b7e
SHA25642cdd55d2782509513cac0b1873e388170f111fbf6f97a4c0260beabc52ce465
SHA5120acafad8765481a00b0789089ca6454d1c881ddfb0854bd391609c2ebf28c68b25fc36b5fe24fbc395926781008a5ace24b3cacb2740b1f5a5df22007d185574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea2efdd60646ec1ba9acf1501e46bcc5
SHA1e72b54c69d903ce4b05fc4208af773480584f541
SHA2561abd6b1c4dece1f6d7e7863f21d08446bfe5c626b0fcc97ded8b295a66361ca0
SHA51263d92ce297edfa64c5cb4d9f844bd7a19a866adfb0fcaad8d5a28a28f6788dc9d2e12cd44cfdd8a795c9847e8ae662e26c81bb7272653a23fd0620b4f3b1b405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f229cc95efc4f464aba40bcae8a79d9
SHA10848866442f48532e4697c3c391f91145072183c
SHA2563a2f2a32a51b7c2609e3858ae143793697fd8cfeaaad1ae2c498147314f68293
SHA5121da6ead219cd2dde7bcd7131f5cb88fff23c6cbaaa33d8c3693d56a8bc4888f884dd78b67262a95923e5159b038bd2e0ed4f405c76ef773b4d47d60f830ac8f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530a8a1ae4cd73dd669a51f731d6e2c82
SHA1b1f9cfa443f1bdcbb1609bbc86413c273917d258
SHA256d2bcd902fc98a508669e5d6fba2ed4cd0c9cc69f7ef078a18a96a600a08fa6d7
SHA512be3a2c348572485ce39bbb28a2eab56476622b25289c0590e08fd7e50d508fb5a766b2e77fde52291455e88b467f188bd694faae0291a619c5be7e31211c8e8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a153d0e235bcc81740a6a6b49c33fdb
SHA1f2d63d82f824ade913e0153b646b9386b910b64b
SHA2567159f48718252a2c02f1ca091e858eaf09fa48034a842b0525dd768860045327
SHA512d3f5d69b00cd8ddfbf4ffeed8ad1dc2ac5677080f31e616e9d73a68e3b1f66dd0ed6be1dfb783e0cdf175f1ffb01017d59a1a04a3ed629f2546d932b9dca82b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543333eebf9fcc3080a2e24cd2dffb74c
SHA188a8adf0fce6d40580905127d491f3e42ef0b3c3
SHA25652a61b8303a1bd36fc2dd6e5d748dbb456d73c94235435b8034e342d7cc8245e
SHA512cc764b5af81d9df033c4300ace0074b76f51b25a9945638c1da1caffe801a36a82b6deb4575479e20cc7d0ab9437d49be0398dcfac2cc0e0e023e6e1ea540f93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7971d16010a2c32ace0b72b09ba4323
SHA1009e8351ea8ad4852325b6f6796bc2196720724a
SHA2569688de90bccc40d25b9c3d83f279cbcfa7b12af66a3a17726154d8756b6f9c97
SHA512eed2ba481e72ae969a71d31f05442d0c6c44a07ed2e895d3c63ffb3d68c86967cda6c49592f5b7ec4e7712adfdaf0b2f7d369dd9d18fa90bc930a640129de998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9895dda4ea26775adb6f67119cd0dda
SHA1603d8c562b8af4552868c4e1ad171ce6a472de56
SHA25624063d69a24b2ac9e5951e4b5e04649ced5850ff68d1fa92dc76520ad88878c5
SHA512627a00ff65bad4b6ed0cbc42d0cac47e9c906bbd10241e7584052388846abab9973c76e6b6b78b60b19eb58317d326612f7872e27811bfbb39e04add23075dd1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b