Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/09/2024, 22:10
Static task
static1
Behavioral task
behavioral1
Sample
ea0facfe3255c7f83ea01e3b59b28e58_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea0facfe3255c7f83ea01e3b59b28e58_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea0facfe3255c7f83ea01e3b59b28e58_JaffaCakes118.html
-
Size
37KB
-
MD5
ea0facfe3255c7f83ea01e3b59b28e58
-
SHA1
d4eae2bbb562e89867cb9d7aced4c1d98eb8e97f
-
SHA256
c21dc87e371654141fafa78d27d30f9c4690cfebbdb19b61ed3eed59f19f1b0f
-
SHA512
366d701b57dfc7ad653feef9aab7d31d7e3e80a65fc0454c0ebfbc1e7aa40bafcbcc84dfd19caf7718e06cdc51b9bfadaa05e4e721470a310d655624d5496ab4
-
SSDEEP
768:Zcd9QZBC7mOdMwipC5I9nC4PhEOZXDYEJBAd0wowNw8GBPPd:gQZBCCOdy0IxCMhcOwowNwbBPPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DD163791-760A-11EF-8AE4-465533733A50} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b099f7b5170adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432859317" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000261d5b02f8e633f875300804e6a6cceed17111001260891b0cee3739c2b0eb30000000000e80000000020000200000008f6e0036252b353240a528a88220c82d5d0cf413b2046d5bbb1aea3f0f0264fd20000000a618d3470c875f3a2fe4bf07a4a391276f8a2b5c80da3c49df9a81844718f63b4000000098bb928615e54857acebba7d6c9769fed6b58ab57e53e6853e26385f6e0c1953c3c21ad045fb3f904fb8ece3e43b9bae602afa81a7e4a024d8f742b59a5eaee9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1732 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1732 iexplore.exe 1732 iexplore.exe 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE 3060 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 3060 1732 iexplore.exe 30 PID 1732 wrote to memory of 3060 1732 iexplore.exe 30 PID 1732 wrote to memory of 3060 1732 iexplore.exe 30 PID 1732 wrote to memory of 3060 1732 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea0facfe3255c7f83ea01e3b59b28e58_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1732 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfd5a5db4ea135d6f2f8b3bb9daaff3f
SHA14e1cd81c6f877888c806dac682013ea348fd304c
SHA25699825293f9a4ee9264d26f7154eb3bed3095f6ed5bd22fbc4978b32a2fb16b43
SHA5122dc2f6ad3d9ae005fda718af1d407589ad6e5e99b03276147a6871cdb79b424ff9ba29560cdddaf0bbf09c63107b181f87a2c79a232cc0b6b1cf8334b7fa70ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f0ccdb870ba9ebcb60178df38a70631
SHA1f1bfc94d79740d983d8f1edeebcf52fa340fefb0
SHA2566b3365ac2ca7cc240226f63c94a53438b288e22dd04e12076b8bc42020063cf5
SHA512e76e20d50f95f0d0690a2bb2e2cae41df1e743e92f29f914c1d001ed74b44ea44966cde862d01d5be6985733a5560c19a0ba598d8513c2548bf8a72987230920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dc5d7b0627ffef46a45dc222ed4199c
SHA118f9871fbe2890685bd214cb36b6b49d9bb81bb9
SHA25613e31035e426b34c56ecb4c1c01605379b39a00fc2295a2e8f1c40e2c66ace43
SHA5128e68795d3a606bc6ad7aa3abc3c91263b3153dca44b84b7266cf64f906d2be4101325512ed3f9ceb5c81d8547c354e5fce6edf786a4ce8c58e1e5d60edbc58a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5018b4699a7081dd3ade470a2c133f548
SHA16c9e9b95702a361c796a1472850662fd10003617
SHA2561c46d16ddaa1eba02620a367ab845d3019306f7192f02544b38c6523a2313b06
SHA512dcc5c55937f6f4fbed5a22464773743870d06f59a434a2fc3214628f347fdc0c43aa98c4d6dcb644f5ee714be889d982feba64d8217ba2c8a983400d6740020d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc8c56b71609d2e0393c08d0367ffca5
SHA1bc2de641fd0b3cb71c86431205737a37a51bb987
SHA256cadec9ec09b3377b7ff16a1cc25ec1c7626e138712021b6ddfbf4a8dff29884a
SHA5124b2aaee4889f2961498c20fb53acc3fc0509e150c4c93c098faf7dc016039ac8c9c174e493164af67d0414b49f0d0a50d4e94bb7a82e1ea9f8830c002c4bd121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e9d43914792ed1ce1bc2f8a9f736e99
SHA158066cc5d50062bed61b60e1ef70eae57705371d
SHA256f161bdf8d4b776f21a45867a07e737e9b212818209572511e9805d46f9dba5f8
SHA512878856f97a5c83b652d129d3ed4bef359e80a349d2b7ac2b839e3539212bab880ac35abc6c34304fed5d99c9fa9626d060af5dccac8de093f167291e028c25d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef1af8ce9398d55697e9dcce5fa3cd74
SHA1296b267b1fa9d947d67fc903a316842dbc99495f
SHA25647d4650be45c5c074c47dff0c68fe2f8dbd76cae710cb82b7f61041ea500f174
SHA51202547fa0f6f2a276392e095210666e36c861dd792cfadb064e6cd966af40b4afe957ce7745f40e08b46368fb329a33965b54695a9c52d70f6b7950df6f5405be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dc92df7a6fe0a392a56c83a59909837
SHA157fa9165391f8abbbfa7e2856291a46e197957cf
SHA2569590bd537e968c0aa767a827ad6696f374dc3eaae3222080d4a8f8688a3dc65d
SHA5121abb36586dab826ec232f3707ab294fbb26bcba38020209c8eea4423305a1b96ed4f1ce2e2960ab6ce2db1eb37a4f42c78ba85b1b406d67c6dd02eca82b15bef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594e93f5843cd5aec72381b57b378a210
SHA1e9fdff9813202d1e11f5a966312b67774f988397
SHA256a5ec55e74cd7bd9d259f437426d36d1f80e1dd70f5d942bf7d679b0a4288a036
SHA51285bbbe01e5c41c22ae68a7fbd314ed3f1cf7098fb2c84fb2d45520a1ddca4acb37aec3bec152eb27895ce20c5f2bf8f1fcb0ea4f9c766b70ece90c4af6702540
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3b7a6064003587c27bcc8fd0ee67f70
SHA17196d069afa6ffa29eb87bcdc51d13dcb44a809a
SHA256779a24c272af216f2d4fd5cf1ba6ed88977fb77f74c5586ff1587d8a9bda63cf
SHA51245eb0bca0ebac37feba34144e72b96650402bfcf777746d3beb14ba6cf3862f7d8840ff9865c6a258f583c1ca1cf6e54aa6bc8e35c4e4742b52689fd7b64c634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c916e0c30e5af14f4614906fd9339fa8
SHA1935dd55f524f1f42553c05a6f9e97f0460552afe
SHA2565869332e7ea017cc70926992871482373c684f5b6c0eb0d15ac54d4b66367ea0
SHA51237aad1aa8409e870c8b1f120d3de4de0a53574b3a5da37f26baac2a223fc319f297e6719d1600dcd105e7c39ba91656e1368b36cdc560d876d820a58838dae0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50577aecc444a86e9d7e84a998e73ab6a
SHA15dc02d3d4821f8197068e4c3ef81d6b99bba4dde
SHA2568ab43474771fe3a3fa542e1f18938481e29b286baf36965e9b58cc1e16d128cc
SHA512c0f22abd03809136c0e80822dc2916a49632a68e2fc38f8a460fd8fc7092c1d1c205565d57d00dd5b8633fec24b03f1e0a53528fe758ec1ff846ab2def509a44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df739f3e317635f1d69c0be8dcd634c8
SHA125f0f12bf2c3d3fc7274c0467d2fea5fb36a935e
SHA2560f500aff9c67b6ba5851e6056cb00918a54d4f069fdb1336fcea29edcbaaba56
SHA5123419e66032a9d1b58fc5424c6c17af18528e1913883130e4d795a87160cc7b6f5aea0622b886a0c837d0f5664b0a02012edee418771d4860aeea402b95adc5ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c446e9906a892819aff3a2fe8217e16d
SHA1bc6f683120a7d4d6832713c0604c85a19f3406d7
SHA256bbc635761df7fc4c644f32dfc07340429d559e1622f845075db83e68df424888
SHA5121dc806caa99753f33fe58a5545208cc3c217818426d8f27db5f4684fece9318609f67d292caebbd01cc5a4bd5c6b597ef5e234df52cf34bece9122d9dd7c2b20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5829953915ec69c083614a80341acd9a0
SHA1c80b7bfcd65f4c18d4d19a218df66130d8bba316
SHA256dc88ace86aafe0f4d9847a9100c8175e7c9a3c1055d257ccc9aec5277283dd49
SHA51216fb12cfc3c5a25f90fb8a85d6f60333e595a4bd56f7cb34d790af0ca3a4d385335a12b290955479971a496724aefa21da1081955f5d3b7b59257f25e2c40ecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e3b6f0cefe0058735c2ae6b203f414e
SHA187af7a9f9b5681cc74c70c74af950d667825b6d8
SHA2560e651dcb485e220a6caa4fbf92dea75fb406737f52b6636a5031ba333d343806
SHA5126c4c7a0a154d66cba3547b7bb982be66d62dd62f3adea37265c515e8ce80193f903f59fbd20b3f14c56f86a5d4547b8232312550cef80bf4b4c90409bad624ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9ad27241bc3af032170c5ef19725a1a
SHA177367ae1c756b1c8f85e7c47d5f1436fb62485b1
SHA256b649c7a0affacc6494ff6a3ac4dd71adea79c5c662e1b26d1e2a775a39f865de
SHA51209532018cf0aac17867e2e35b9d399315b30dd81dbf0bc35155b73dda45d49b3bc19554b92793570af4806101e4cb9287efe2ea90b6c595ad2f307089d401db8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bd1a92b26fbec3002fdaa92e7a8a1f7
SHA1312ddc64773b167f3772fbda3703581cdb38298d
SHA256396dded78b44f4724e6e61348575ef9ed64b99f6e825d80d1a62fc979306c716
SHA512ab108605a37d36ba6d1f028b824b6090ea02cd33fabed2199df30ad5861d0f45df90e4633c115d5d04c07b36a4f50dffdb72bf5e6963363e7064008c82602760
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b