Analysis
-
max time kernel
69s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/09/2024, 23:16
Static task
static1
Behavioral task
behavioral1
Sample
ea27cefb655bfc88953824a49754e8e8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea27cefb655bfc88953824a49754e8e8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea27cefb655bfc88953824a49754e8e8_JaffaCakes118.html
-
Size
15KB
-
MD5
ea27cefb655bfc88953824a49754e8e8
-
SHA1
26ec2ddadd41d563e64dd7e2f90940a968c54613
-
SHA256
08319419b39abf8a649261f048d81ea4291c3424752f366b64aa4bc7a990bd09
-
SHA512
cd7f7ae5e69216a2e9f67f3232da0202c0eef9f76d73fc393abbade7eac77ad93982187a1ea7fcc8a13d758dbfe47a078599f4d9d98682893bbf9815d1d87159
-
SSDEEP
384:epUcJ/QkvSgACrruCYRVXUeXWkvrrrqzygBZ7O:epUq/QoSgnryCYLEeXWy6ugBZK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000009f3c76abcb2331ee34251d91b1a1c7b26323bef2f6c4ed4f41c845a6c7078787000000000e8000000002000020000000e5330bd1e4fd9efbaa7b0a388d5f2fe304d6cf007c18e071ea64bbe390630b9a200000003366ec305b6fc9ef152fa87751612045fe6d11f26922b284885f968b52db736940000000559833fe6cdc1d46a5633eaa52124a8829f39bd0129139a436cba5895a56988be06b50ef40f9b259b1acfd6848c57013ebfce413e138a4b1962f950ba6999582 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{14CF34D1-7614-11EF-AD26-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a02f0cea200adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432863279" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1656 iexplore.exe 1656 iexplore.exe 1220 IEXPLORE.EXE 1220 IEXPLORE.EXE 1220 IEXPLORE.EXE 1220 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 1220 1656 iexplore.exe 29 PID 1656 wrote to memory of 1220 1656 iexplore.exe 29 PID 1656 wrote to memory of 1220 1656 iexplore.exe 29 PID 1656 wrote to memory of 1220 1656 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea27cefb655bfc88953824a49754e8e8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c2f63404b2277761c8b8530d4d0945d
SHA1e872bfb429791eb4fc3843e5b6525fc20c85ee68
SHA256bb77aaf6d1a6f1be14ad10bf6adf7cd7de787a68dd842dc8c0b9ae7c83f8572c
SHA512c8e5d963cc9aaa2705af01f90be52949a5f6a5dca327bbc2f654bd3d0c3b6458302b4064e32101bccce0032c9cd70f4fae3464f5d71da2f914a0d2a4c97f8e6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579f8e68dc301ff274a1bcfde65fd78b7
SHA11704cabf5581a09d4990e60c73048555856f6b2d
SHA2569d50c474ddd26066af50aa88230d59aa7cb1853c279c527563e4117a157c9a7d
SHA51280c836aa5d7060e29e9b515fe1d7de8c9c51bf87ef222be712af8e8689f9d5818dc81819a39d1d10362e43d3e1c6fb90dd996b0fe40329ef0b53488d871ad154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0ba8fabc2fe914d3284c9a70192d4f9
SHA14bd0d31d6fab0ba21bead6634d516b6d95f01635
SHA2562834c236303108077a569962b6d0a9b8cd90be57311feff0de1ebce995632c8a
SHA51284c656628d5dd0c4be31e91f0349347fab31546a5d3099a46dba45f04cbf68a12c597751a0d0c623387314a435473f2e9f7a9255f4e163b3dd2a2637496c336a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55839c693cbaf1de2480ee303c8dfa483
SHA1ce15b5e37ab27d40b68a1f7a27e4ab6e5495b2a6
SHA256add65656fd5a122bcd6e73ca8a5cee6dbc8d7418baaf5f5a405b561e91a199bb
SHA512c3c73862ae4ce11176a8153306ba8ae3e813f1ff056690269a328e367a988d127e082ff3075bbacaf62c0a70de10b6c3b3f4d7c86d89551fc6f2e980d4130223
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b811eac7cd2b7758d10004d867910a6b
SHA1b1a1660893158ec7976239cae0be3373e506d307
SHA25664d1a6a00e0c2719278cf92fcdb1860f897115f33cf892475258e8db313489fd
SHA51263259c47b96c805a6082671bcdafd8b35b399f26e795d81aa689e3182796a218b7486bce31516745d6bc5cc01e81338fdc0df292e4b39a69cb1d466838fd465d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556fe36293b0c07260f539a9d45959471
SHA189e37ebbdb75908e4d5b55f27a4b0b1ae0759356
SHA256bb768476d3385dbff5b8ee5b07d80d46dbb77f0993097a3f0b0c003c0a2e2efe
SHA512230e87caf70d74269bdcdff520773f7290bf7d029e76ff43f25bfeb13ef95c5c7b138a63236743963483b9bbb4bab0d81040811dfad428f1bbeb5862bb2917b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c83448ac10ab33664d816cb492d03bfd
SHA15438deb57f419bb5c2de78a84a2d4492b41bd89f
SHA256d4d7cf428013d7aed8cc3aef9e6cd2a62fe322c529d186991cdae5e236894213
SHA512321beb2d5e7355d1a436d459d1ea8db97c7253332a7567d97ac9098fcc45da2ab7d9dcc5f06b37a774e547ae9c1058579ee5581b91113df26d1d1abe3906ba80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530bde2cc7f31b51a851d192ea6d14fb8
SHA1d48bb318545febf08d084c487b876032c059d577
SHA256c6fec26b4d17cc369b5bbabdc2b6016a56894490fa5be1f4010c0afae925f673
SHA51276ec9af97137d00a1afcf7556390469c21cfa7a82c1c4836b3e1bcb563124365b5e6d948299855d2824937725ed11225a80f59d4cce54b541f3d912bf2c15d21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fe6e065c2771016d1b21842d99cf951
SHA12932b99314675193fe4f3c09b028366792be8843
SHA2565e1ba57a22c68999c67afbf075eda1828371690ba1dec0f6703543ff9ff672b4
SHA512c47e963c6e9190cadf953d9b2d67452a94e9fcf6beaab5c50ccc5243bd132a85cfd03e418c682e6764ee7b73446bc9d832cb99a2c25b7fac62d2c402a883912c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcd2fba4cccc0e43a3dd4f4f79217845
SHA179bd1d1814815fa15fefc56a3877a7d3fad2ef8a
SHA256f5e4bed5d5fedea3950a5655c5071b4597b4f8dc0e8bd3fe417cb479abe217f5
SHA51216ce4a348b3ac8335913af39f7611088dd8282ba4df912448cdce89bc479c7565a6a52848776e7ce342ffea2ed89611032abdcfb4eb1362c60c5e9b3b54ed4f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5038c54324df159af0dd7aa03ca7fd89d
SHA105b5caf86c960930a867b27843791f7c8f7c6e0f
SHA2568635eb55f1844a431ba432e746808144e4e707ef615ec3c09c4a56c1a146cf75
SHA512d261c0504f78f97ff903cc858a97f5cf87f5759ffe0d9d59a35d43090bf451294dad9b5384cf9d19b5118d4df58269c92237770f2792af1a3b51bd4ae96a4b21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab875f4c35f9f97786ead81b4bc85650
SHA143b770289d66d7d3c2285876bb17f630d03c88cf
SHA2563e88e831802c5cc61b0f716f7e96575d9fd602cc31f6d84a14983edd1356adf5
SHA5125a63ea7141ed5c4ffb228beacbede7b7034c1bad86162e935f9000d270a0c8cf082c576d6022ecec8a3bd65a4c4f7c351d0dc53b21f7ae58e69b807b18fad88c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4885ab399052d23528d714ba3ae4c99
SHA1b424ef636e28a5b5506e16ac6b52d19f77c0309c
SHA256a15100c9b96303b7ccb1df577b8b336cdefdb0d5d409e0094137062fddc52c18
SHA512a13f1d2fa7ab125fd04d0047d5dbabcdbb8adcd3753d62c5b660e57332033d25e57ca24cf54966e0da88812eeb55fe1b2771f15049ac4dc80de91df9fed13bfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c171ef2e930c5933dfce0d93359aab0
SHA10fc31bedd91b361b197f5e462ca6c98eeb43dad4
SHA2566779eacb93a86aeaa854d5ff24817cf4774b49fbadd09dc755ec47c22354b3af
SHA5123c3f5a3f14b883fb9e4d92536f61640d9a275d6be4b57b2f3815ffcd2938a052f526d462485bd7f49aa3e080985b751fa0d32ae5a6eeb8211147ce35ed34f20b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abcf54fca83154777eaef6ca4ef5bf5b
SHA100e8231e79a6a410227b36c53f7814a18eaf14a9
SHA256e0f2397a5da8da8dafb824f559a0a33455477f97764788286fb4fa3753a3614e
SHA5123d92f4a87679d0e4795e665ef1532ca5162df94277de0199f3c79022f55babe5dbda0d5efcb6b5e24256953394c37337c922b6218d746cc00c4d4d1b4e482fd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0a14b272ae187d4b546b587542f5fd7
SHA1eae688ea5994c1fdee808bcf1eedc8452d88ae28
SHA256787ff6fade9fe40f49fa1a464335001a311b363559e576dea6b5caaf3be69484
SHA512d8c5e837c6a8910dccdddd51f947f0f5be39bac0fce10230cd3753a16d884c26a9fb115dda23905474998e4c8b0632a44cd9b10604c97e1a3045931e8f717ee4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d20d9caf8dec9cc6f3ebba6bcbdd1b7
SHA1bbfb8e825f052b1e5334d9cffa6c0d543a721aed
SHA2564a980f053881e0577d6d2d22f601e4a6f08da04c7547004ab96cce60062641dd
SHA512e6f82a591c2766aba095da1da20691fae6576ac2585036d63416c04ffa58a8d31efc8528eaa8885bff4b40f153a502fb6a7f7782dd72d0fee6b6bfd51b1ff06f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d577961498ec2523a3ad788fc1bdc82
SHA12a09d97f6d1367653f70bc66580578a97ff75847
SHA256982921133471b39c8ac784249bc8ea8bbb49bc2e06fc7cb338fd6e14d624b4b7
SHA512dbbf6e0efda06cc92bfa530422bcee46829fbd437acaa71733046d3b45cac9f8434f6c527eae99dc0415f8545a444821f99edc94e0e87d9ab669a0841eece08d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b