Analysis
-
max time kernel
133s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/09/2024, 23:15
Static task
static1
Behavioral task
behavioral1
Sample
ea2765663708bdd1c42fc8f00b4fd22a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea2765663708bdd1c42fc8f00b4fd22a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea2765663708bdd1c42fc8f00b4fd22a_JaffaCakes118.html
-
Size
460KB
-
MD5
ea2765663708bdd1c42fc8f00b4fd22a
-
SHA1
0026451edefa081fd6a5859ba3791d602f878281
-
SHA256
8ea7117f0750574f3b3da21f9fc0aa472cbb23a1ab328457f79751ddc31a8fb4
-
SHA512
e831c8a0acb45ca9136fd51b625be5709d2baa4a71bf8f916a5f9cda9dafe90bb437afbe7ca4505c99a15fd93a9f7d93bddd2a76c51fe5d1609baff594bf9e99
-
SSDEEP
6144:SpsMYod+X3oI+YvpsMYod+X3oI+YpsMYod+X3oI+YLsMYod+X3oI+YQ:+5d+X3T5d+X3/5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000db6d2e2897a8a49924e5025727ebba854a4976f9dc9055dbff76224fc80d6531000000000e800000000200002000000071da1933e27cd07dd283d714b00e2f2e07b81c80bee3fd9dc4e4195e8ca832dd20000000aa81ce93b03ba7fc2b150270e5ab7e2998ab5e98bd83128905d70558d75a2fb34000000026b610d5369c26bcd3b4911ecc79bb7873497d615df67554cac9f5d258af2bf295540fcbe595c7a4c468f078da131b46950f2455d33a9e2d97d4fcff1263efee iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0592ab3200adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DDD36E61-7613-11EF-86DF-7A9F8CACAEA3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432863185" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1976 iexplore.exe 1976 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2052 1976 iexplore.exe 29 PID 1976 wrote to memory of 2052 1976 iexplore.exe 29 PID 1976 wrote to memory of 2052 1976 iexplore.exe 29 PID 1976 wrote to memory of 2052 1976 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea2765663708bdd1c42fc8f00b4fd22a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1976 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589d7c7942130a48d7a2d945bd37eb8a1
SHA1dd5760fc12462be89aa7d806526994f6263fe4dc
SHA256c42fa6c6742ef411f346d2a6c9e2ae72b2e98478229fb430a16baa05215b3ae6
SHA5129cc26530b90c822fd3d58ede33d4496a0d71871e2cdb25a9428db73abea86542760ab331982718bb5df607eb5a19a2e9ffc0c1f67d506d01911c9de995435d37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a5f6211d07c0f527cb94be1f653d9bb
SHA182d5ce838a4dd431e4c7d31ad9ee20f6d5c2e5fe
SHA25679e80a60cc98a14a1eca6eea1d57e84d11df18df3ff69ec1259cafb146dc0ea1
SHA512cb37596c575b2cd991e19504dde560d8940bd60311c777a8d1e8a3db5ac2edcaab852efd0145395ecbdbf4e3b28b902c0914b6cefaae01dee4f80d28484ad950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9eaefe76d78b2e44a6e3fb476923e0c
SHA16c71bbac864d8c4330905a8cc0581ef3ceaef87a
SHA2567255b298d47a28dd5cde398b69ef0e13db3c3219bc6c8c46b620580033b96867
SHA512e10dc1247fee4a5daa543d4eacb0a683ea4d7c85c2c5aaa55ef17f755d9d7b95e7ecc32f487c26ac81dd9d18bd59376f218b5b8ecbd9995bb411db69c405f871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0b2f6f3185753b62ba7794b53accece
SHA1ea8aeba3c4250c2609f78057e88ed53a7c71bbd5
SHA2569c8df72d79b26aa2aff51322573e3cfef0422d26096f98bd1c7ae6d923a7cd56
SHA51247cfb4f85c8b5a86159aae1f93c5d751fdc6709ff270ac974d0eed31366320e6aac360ffc14eade7a84545f08b7be7ed175ec24430d06017e96ad7eb18facffa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570b361ca05394be7d0fbf99312766934
SHA17a722cdf7874135775709ee08885da23bc222fc8
SHA2561b4c691f8649e306372ddfb70a992eab43a3cb6e3a612d496e6a20920c4012f3
SHA51285fa5a6b26bf2a143b492f6c639c11b9697937916b0c5585a2d47d015e37d712c0094480ff238c8042ddbace5a2d325424d672497fcce977a89c672dbcfd4a92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5755f3d29f4c6a27173c4960561a851b0
SHA1e7fe9ddfe4305d073b21991a835dd8b61b38a66b
SHA256aa5e34df5f4d696d14c97ffd5a035e2a5e02575f3955e6d56d39645dd2d0e0ad
SHA512a6994de4e59c573d161b5125f9abcaec038367495025f43fdb1d7dcaf86b82b6cacdc5d72dacc4eedb6e092f258b646a026c5b9b03317fe9f43edb2f7eabcc7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5910f969806a6f43d83c2732edbff4ac8
SHA1b21305453f462b231c726a7cac37cfd453ffabeb
SHA25690499717cb65cd8367af6f1bc503c9db57132aa0248658d96a0b0a289f190337
SHA5128db1e6ace3b7f395b57620619456d08be7ebe03870c4fb563d40b96b1b38586b3fb648868b698c91a15b11e993ca43687ab38f8a67faa1c8b79d1d9535419f6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548932d9cc44d03ad5edc5f2d10fd6af5
SHA1ece8e6a6fca3b1700913a0e556df9e062e785000
SHA256b0c6e3594a203ebaf42c5b2fe7ab3ba858b06be844952dec69dd97de3578e54b
SHA512d90182e278efc4718b410f2d67de0b2d819f00ce6bd8481864c50c7958125050991b9d70aa91a6190166c2527acf16e387dd1db97d189f96960ee18697559dfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c759938eef43edd1a91bcb41d6fba1ef
SHA12a2a7f50e64c71a902f6acb649caa67f1cba70bc
SHA2564bc64f92b4bc665893af37fcbdfe190c685f104230d16942ebfaa53dff8e6edd
SHA51218255ead3a7ff153fdaca768b66e006fa6893ccb226ee6b5ae07e8609a182473692a913521e75a010f9a2129aad959f0b84b46cf7295ef4ca4317d67827af0e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b1de472539d0f607c4ca2efd696ed67
SHA156c1083ca04abb8eae91c738bcff852a08692df8
SHA256749f1f17e771513067a6e8e4c5a4cbd67fe4c4467b5e82e7eb9f8d70026dee1c
SHA5121f6651e63a0702648cc94f3e87f3289396194eaa8b2629866dca1ae274cce08020dc2aa3ddf3a4be55789a58d74de12fbae6d1567c219e3c4722c603145f8476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52550eb72a6b1b09810737ca1de80a3ff
SHA1ed69f6a1dda8a2b21c4606451f7f09d3bf16e46c
SHA256d3675bcc1ef14b0160f4a6dc5c1e2f6eb0d82e225fc2f0ed1d726cfca5cdfb6b
SHA512551c66c444d3841fcb6202443ff3746f62d6875e608a1b6ba7977280269e03a5865b13bc16873ec3ce6b13c19dbda535288ffdd9e00af3b92a02857a549b4431
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eea06a41a3995014aeb5d3d9c8eb42c
SHA165c8eeade4eb28f6c1c6db7c73f1dfaebd8f4641
SHA2569e8fbed63d4a8e295c502bdd88ac025e596b7c93f20b49358a41cee565c49ae8
SHA512038f5a28957fefce99cdd0e0b605d22b997b3196bc53608223d65828c3a2c95e547d02d23041879d3c14e0b920560d4ca87e4e748102a02c09490ab9b7c8023a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59924aef162c1595149f9d6b50dfd401a
SHA1f085e6895e2105e920de96982202a5f810170cfa
SHA256e53f06c7cdcbeb667a6db3425c5489bab439492015355b9921f983d111500217
SHA512b6b0e2e229fbac639ca2a5d765ef7173d3033142f261619a517ce2b00e21cc9edab29bdb3c0c63f60110516719b79c3e73a74d96997de1dc560813e4ecb3b56a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5047895c35f4416a5350a9e7f31a5c7e3
SHA17638241bdf5328bafd6087daf31d963cacbe314e
SHA2565ecb9cb9bc1def62cfcc963924069f0185c9e6724e273f2c71dcc52f3ccf4eb2
SHA51259b2d0fe2c7a91eaae6824fe87ca07973e9d2e12a90d024f5355fd484bab6352fa407f041a58d6804e49439f2e3a62ece80de5d540653ad19adf644b6932ad07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52117be85e74cc5997e021f01a55f2bb4
SHA18728336d51472d47d1fdcd9a9fb450e5c7484776
SHA2561ae3bba9b80189bc967ca16ecacd83e0517e91916d828ed1be7c0dd170042e87
SHA5123a0b534d725de6141730a9215ef056cc8b51cdf01238bc48ac81bc3e9e7b61599f5e025239c8999ba7a872cf3d3c3bbe0d1839cf2b25c3179580ef1419aa5536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f7aac6b293158b2a364003094fb2f52
SHA105ff71e57cc4e771bf33265a3e13735f0afaa8f2
SHA256913b01f8ff6b250c4d517427f79c1393f2bc4ef62ec7c7130c51edf68c017691
SHA512b73d656afca1f169dc36744aa792acd260bf707ddfb184ba9e614d77808762037f03c28b6540cac5df64506606a873f2d66a08d6c3d7d3b6c1cd2cc2bdd68a62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8a2e104b12f14e751df6574f96fb506
SHA19e52fdac88e524b2c8c8db744b25e7ec290e814d
SHA256fb82f86c5e6d76b92c73f1ef3388a3742f72ec16b737508c97ef9b5b8f8e6947
SHA512077dea5180f49c11eb44a6e944a29383b770f3bc0395edea838ef6b49292f7516681f66f00a6e79bb86cf50d0391d6a76e3785fd4f4bbdc7a08ccaef27f2d1a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b11a781ee73ac5a7d6ca58685129cbb
SHA1fe64460df120c22f04f84e8ed2202e6410cbc73b
SHA2561bd2572b0a1af0d6d5cefc9c3d8ea70f632a70ac1ec15d1daeb6cf6d808cdfab
SHA5123aaa939ecaff28443a4414e2897d87e10119a60915c5d56425dd0b8fcba07372da64700d294068a785929950cbfd82b2f6588ac478b4f080f2bfbccdd9215205
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551fbb514b6a593499efb79def4dcc292
SHA13d30ba6d05522f0c6af450d63fa42a2ceb3cb962
SHA2563f9f55fa57558ffc53490e687af4df4b1a4d3dff3468a4eef821d774d6f42f87
SHA512ea45808d954358b35563b19048017cc5e9ab3f356f2a41d6a40ddc6b12ab1b666711358c3ed3e8a6b56a143a735dfefb4ea83a7dc766655ddcd945586ee71780
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b