Analysis
-
max time kernel
133s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 22:54
Static task
static1
Behavioral task
behavioral1
Sample
ea2009e0522f11327ed517b9aeb2cd5e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea2009e0522f11327ed517b9aeb2cd5e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea2009e0522f11327ed517b9aeb2cd5e_JaffaCakes118.html
-
Size
9KB
-
MD5
ea2009e0522f11327ed517b9aeb2cd5e
-
SHA1
dfd225fa0a3a403fa89062d9fb92f1611e29334b
-
SHA256
14838523f3f0ed79187addc470eb76afef9a9489f80b55c568ddaac9b0a6c5f0
-
SHA512
6453774c7ec80f01bb4c21f3411a067a7abceb9cef86fb2441433ea8620324265f0503c23cf1693cfb7585d2fb9202f4646d300efc6fd6b70f0f2e0cca5a3297
-
SSDEEP
96:uzVs+ux7i6LLY1k9o84d12ef7CSTUSGT/krYPp1abkvfzllVHcEZ7ru7f:csz7i6AYS/zsBwboLlPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432861961" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0513DC61-7611-11EF-8F55-D60C98DC526F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00fa0dda1d0adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000008cc656b2fbc94ff07c976ba028f60e66ae42a369d4c5d83f54e62e309fb6f49a000000000e8000000002000020000000bcfcee5f39077f3bc1f30f1d49500ac2444cc3497fdad5f4f669303b1b23d87920000000b1ad24d77bbc4c5618892ae409ea8b7b9f1e860f0c4fe71ef78f0e850fa585df40000000baf77717b5ce212de407c315214d68c812f3f95b1b29ef846a84ca5f59164108d35d8f3252ba47c66dcbe97971692b90fe25848c79756c4f1c7f58d5fe5fc8ec iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2016 iexplore.exe 2016 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2768 2016 iexplore.exe 31 PID 2016 wrote to memory of 2768 2016 iexplore.exe 31 PID 2016 wrote to memory of 2768 2016 iexplore.exe 31 PID 2016 wrote to memory of 2768 2016 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea2009e0522f11327ed517b9aeb2cd5e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2016 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb8472ce11c477cb7f705753d18a64f6
SHA1b4c127e1d1c5ddbcbc16e0caaa6c453c5acc6ec8
SHA256268a5a630c62b04760fe768457d9ce09cbabd4182846a0c5c1cd778ca6a4d6c9
SHA512741a6385e2ae8ca4d15b0bbdc670999ca4e85435af33e5b98690b586076c50d2f719c9efce56d0ceeb2debfc114a80f07825b15bf73b8799bfd95e1bf045f074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558e48472234ca0cb837df50fad5d5fc0
SHA1369b3be3562b5813fac176060433104ec2603504
SHA2560516bf7f99d7233b8e77fd6a7560455c2f792ff1cb0de924150b92471a08bf37
SHA51285d5ffb266610b5fc3c4e90e9492e4eed1e27c54a91f62d99ca3a47ae8e0ce41567b419c64f62a5b53d123331a7818f3415af3260e2cf8af09c12ec125316a8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb4d1498e40d581d4900a773661a3d13
SHA1a650fd63889d5d7c158a80107046252044559e9e
SHA2560ab0990363a4f32eb4794f2174d08e807cd8261f342fac911c5fd38e9091858f
SHA5124ce3a52d30599271266b3bbe8a68c559684bcb34694effedf1e31ebcfd57dd932b401561951e616406b393e13dfcf4ec119dd0a002d8282430d774b388423c8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f255230a4f71dcbfc03e1f368eea4a92
SHA107427abc3f9ca461b90c2fafd6040cae20e75ff2
SHA25666671f380c648b104a278baf3a74e5a6c32dfd13cd18b975265f0f5c1a01f022
SHA512a8683f73054005cce2a30787ed4e02f96a9ce067c7989acc34ee716bef554b98a5206613a59f95ca82bd167d0f81a45ba2a44bc9e93fc5269f8f228381028bcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f8fd00786b8f3dcb2609d122625a537
SHA13181a8fce13ef8d9dd0ef411cb7620ce4c6dae3c
SHA25669363ac5639e87ce92dc81d80f532a60ec66d5da76bd83b06f65c9287bfd70c2
SHA5122d9e17029f9dee44e35687c42b20ad038d76e2a79791e2b11b0ebcf30a8b2fcef10013c06ff0a06f098f0d1b5dd364c1917eb5319a015b9115637e01862693a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ed8866175115b4ab488fd098c90ebcf
SHA1b36e49aa741940611c608a3260198640a5747387
SHA25690aef512c672b948cd07f7670403265ecd27c1f76502839eab2836da0fd43d71
SHA51273dfd6644131bde8075836e124174c5cd2906a248b969010ad404cdbe4df190a3a48cb10d92928701f119246b2d9daca41cb383057849f4d95f7f8b215ee8917
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590a59ee675ae11558f7f00b43eaf0052
SHA1af9a1594e85ec3b6bdfd2611e7efcda2aea4f73a
SHA25626a8ee901686dbf27f3ac1223e817a17dcf9bcb6541b3bbd4c59b1eef7edca86
SHA5124eda47e33b0dff3ba1a212615d811a229a49dddf491b319c4c4bdcb6c0ed727df367ed20bf4c21de3507414a92f30f1aa0d17c151cf747505fd224888026a20e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f148c7ff55eb420bde50c790ec6fd74
SHA1bacbc309196fd2d9aeffff57049c41fb97fcef6b
SHA256182f2343152e90c7f9e586ad71f109dd9b4492ccf0e5ab5c8ac3c9c7256cbaba
SHA5126ad433ef4537a9931e6f3629f3856d6e8f64a14dab6a026e658b4c932e7daab781dc56272f8ba6c068d62f591912552d168d4d1b3c895656910a53c02142519c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efdb2cb3ab064ca7447f096dcd275733
SHA11fca2c57b05c197caaa88ea8c83b82599ada0581
SHA25600eddd39656493bcdd2760cc59edb944b374756add0a4e7d83d95c7870e43648
SHA51249e0a81e7a0270597a6812c2867a16b87cfeda203dde3b5aee57454ab2f8b30bfee23cec6c2d07d060b1326e5685ea54af7eba5325fb9a97d4ee29bab4109ce5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522962a6145c1a0e1d0f8c9786f135818
SHA1eaf8b1653b0fed1af4fb79bd0a9fef5675f8ce97
SHA256059c9f7ba64820d80773adae79fe154b30a3ee0b12837c6c986b2daec2c7a47d
SHA51293bd73b377ae9804096110a61d96f7184f924d2211cf52427194adb376c5c697e9dedcdacf4e85969cd9aa773ba34b5b1111edbf9abcfe943ce1a6de3f9f9622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591accfb77cff2ea0946765aeba3cc4bd
SHA17171289789bbcbcc1df5de9ac036c38549c5377f
SHA2563c055920600d4cbec649fd76174278f01de57cc9557772895b815717fc80d3de
SHA5125b73cefe59597ae6665a7bfa000ab6bdcb6ecb5f57d1dbd593336a5161cd0b4d100e50ba0aff95dc59c519fd0ba8969029826f926860624232be0ef9941bbefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5234d2e8a7df670c0f5b11eb8e9a9f971
SHA152c8ffcb019a5054d977d0dc80f26819faf07c41
SHA256c68add83850e01d45b641c99e97a1d596a6be1352b8430f5210adc94a212baf6
SHA512d750f46fa3ad69bd522bdf41e7263277a84e58b166d6b9261a1a0bc90d889f42e9cc85b6764eabe7c311f4629278356ec23366f262283e1ec9b8338ea2080b3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db9732b228f4d0113a1e779d6df73209
SHA151b44faa97589a75dae80728b5ba712226135760
SHA256eef904e70706be0b7ee1a7940025033aa7708575277f100b74fd0ed082e1bd6e
SHA512371f7fe9e65a6be6851ab17058aeb3c985cd3cfbfee150e93968e1a7f3bf871818345a87af91a38ecd155ca56baa8b5fbc7e556152724958ef1f001708b6ff46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554907cc3b5ba94a329bec3646b2b87b6
SHA10b96fb7e75c342a09993de8cf1d80f74e1161b10
SHA256aa1726ddf0827a8bb1d91dc95b2f34511b1206130074a415c5318be6c0309bdc
SHA51246e6200bd83b3074f2082cb731a3979c9a3eeea2dab9ca79e1db488dbf90e0ebd84e66a0f5e9975ca17b4544cbc26443232295f2f595365a11976f0f0c66df64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519cf553da2d1d9b11c8925c423154e4a
SHA12638290f4fd45f4fe4e02a355a1740197aec869c
SHA2567beae977ddb5162c89042eadd970a6c27dff086c60ece4bfa1abdbc74dcbd7e1
SHA5127fca29dd9e23f0d1358073e060d8eaba4d529679de6cca280c71c780680324e53f35e3b70c92a1f67bc5a65053270d90e083899b68decb21cce6a7b07245db12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c6a577bad1336c6b24f918d833c7c8d
SHA1340b90bd46ffc90a2d03faf47cbe5e2f6794f1fe
SHA2563585e89b9eb130caaffb0081645ecf987a66bc86aec8805ef743f0017f1433ba
SHA512185cf3f68f8fc93f61565a071c33b2a6fe44c9af9d2d188a386a3870825d6a6b770bcc489a3bdfbf2d0ad5902f844d5a8d16d413d7a4cf1fec441738adf2d74b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506ced67a7747a4bf1f2119cfd9b1b430
SHA19b5ba998af5ba45894258877badc3c12055aa62d
SHA2561e09a43340a7825d3de3652111229ccb22ebd26777eea365b493fb82505a476d
SHA51206835ba09a5b5729bd623e1b6db43a309dd4eb7a5688b2bf62ab777eb22f952acdfdcc3d1612c3b1df9cffc3d547186f49a820391bb9b0b4b54364de4ddfaac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5775dd2eb1634f6c5b39fcb35caeffc26
SHA1e1808818ebe839875401671f5ff0c3454ac9ccac
SHA256b33da7291c06292a0a2c6809bb47fe7dd220547c996b5ff177cbb78610d788dd
SHA51294beff1a5f6c08a84fb920472355f3249087f7decf56e6714b0adf24491d36898f21368217cac201daa2501a89159d9c1cacc0b777b30a0c207bf5446a355530
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f86d5a60fd42af506ec7f7890ba4aca1
SHA1715c1dfd989bed2cb76ad2fe448fa9246f12d55b
SHA2560f21514b8c697ae23f36b6bb06102796f545db5afacb5e37b13fc25203b1a4e7
SHA512e385effd55a8ff31a427bbd865cf5f3cef9030d99852b3e8e228ad445f83d777a0ec9ef92cabc5a5218c447e300bd55b7c1ad2ea086915b9d6574fa8613a7784
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b