Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/09/2024, 23:58
Static task
static1
Behavioral task
behavioral1
Sample
ea36737e406836264bce31cb6801e261_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea36737e406836264bce31cb6801e261_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea36737e406836264bce31cb6801e261_JaffaCakes118.html
-
Size
3KB
-
MD5
ea36737e406836264bce31cb6801e261
-
SHA1
cc7de8856629fcfab86737ef999446d0428c312b
-
SHA256
8502e8962f4a51960fd3ab45464ab770fa6cf61cfa44ce0086631c284351c36b
-
SHA512
3aacf4fedb58edd3d53616d0059cb3239f7041946cecba7ed4e29561aab28d6440727b2e93b16046a5d7de9035f3aa9796cb66f7dd99b0a391451f55ecb11a3b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 007422c0260adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432865781" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000b23228b53b80ff580156c3395435dfc2a0c359450d7ac12869250af912a5406c000000000e8000000002000020000000436d6fb3d2e0045ea84a4452db6b6f4f62b8aa8980a733de625fca68d31d2dc620000000979ee2bd2ec3b2915ffb4dc393cc61ad3d94d0036de13eefe709c83ebbb08ed44000000031ac172e9c720d9771efc21d3cb75ce033c40af8fb4ed40a8f6284a61cfadedcb4f4770c13c0b4e5c3739730b0f23550d8b7888b2eab7ac66b9b2d81e5707041 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E9F52D91-7619-11EF-9107-E62D5E492327} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2916 iexplore.exe 2916 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2852 2916 iexplore.exe 30 PID 2916 wrote to memory of 2852 2916 iexplore.exe 30 PID 2916 wrote to memory of 2852 2916 iexplore.exe 30 PID 2916 wrote to memory of 2852 2916 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea36737e406836264bce31cb6801e261_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f3f514aa8e244060cf0e4832b6ba1b5
SHA12212f33bedfa635cffd5107b1bc8f3410423357d
SHA2566b6c0540d87abcc60e9aa6dfd5f88699a5ddfa6fcfdc082c80b0df4e456ba90c
SHA51295ae0eb22cfaf2079deb734a6816a191e29ca054d8dbed4ffd4aae593661379ded7ac02b674860f0c48254c82660cd6a458d26ed54f93bedd6fe460622125a8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55881ee88ebdad7ff1b75bcadd80d3a9c
SHA111fe11d810e33e3c627e38b25e222863422bf94a
SHA25683a0ce0116e0da9d08fb7091d2f57e29004278970dcde4c47078a9abaee97d80
SHA5127f2db9fbbdc24a3d44823d37e1c3589630913fa21081b88d4cd00ee55fa6cb8bcef2514406e1dafae639e6185ab25af61089ed4b0b239851467d3f6e1f47fd4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cee7fcb6a9e1e99549fa01a3f059c383
SHA15187b579ae464c7e7ea6365fcf6ba6d47018ef88
SHA25624e0fdb7f3edfd7e5a9f24811bb6cb0aa82a473ad3287b93a6e4f22bc445a200
SHA5125d61a183cfae93b360aa9b5a9ec5e4037982cb1548133ac572fd01c9061517ffb3f1ce573e2fea7ff17a7a8fd0eefc5b2f1ed9707c334054ad56bc7ee888c81a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d18b3250a4bcab1c75e97a47ede904f
SHA1abaf4d3c79e675bc78b8ec0b7b793978599f6924
SHA256c730aaa242ccd78ea8f3af6b16b41daaad3c1279c1c1fcd7e91d7a73aeec4035
SHA512257d3854b35d2ccabb696f716b5ae9fb7901950a555c2a191c702a049273a84f0bd5ee19ea3dd654e0cdf8ed792ece8d7a22d63d13279d960bcb630a74ce8500
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6305123a2ffcda12abb329bac644036
SHA1616ae4e6bee67f42b13d04f42c694b59af08a54d
SHA256291722ae1965aae7f16e387c8e38fd700df265f1ec6b04cd5ca25338a5370e3d
SHA512f9a3090aab3eadabe4281dd0ee6deb7a6bd0f214616c0b504771e1ed7c15ebfff58bda21274a55d04d608f9aa59094027e9bc8b7efd7ce44e5e1885f65ce2dbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b31d3341051c0fae62cf7da33cc67f55
SHA1f5cf57b4f7404420cf123a7a7a9cf28f5292f0e4
SHA2565d1d9dcb648918f8b52d8942623654d999a7a9fd136a0b32e31c6029e0fcfe31
SHA51288057034c3936882ad65cf08ce1d0a234a4401cf60d3ab944324211acc39ca1828d6cb33b1025e96189101bda4ae434725c20467342149f6d921f7318ca8bd47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521572aaa679a1af2d28daa6cce5b54b6
SHA1a273b78dc070d28aee12dc936b46bb4ee89ee804
SHA256358a032ce58c21f0cebb2cba734c9750a71022d53a61c8fc4607c1ecffcdffc8
SHA512f1d4b95318c6ab851a1f092554bb1b70a7ca95cf403970c06f6eccf7393c5a28adcb4a22731195b821af9fd75d35721dcec92facaaf3ce355ec0f3b44cfb2a50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598a217ec5facf6f5350d9ce1de87d7fd
SHA138037a71d1b8ec11c5bc296055da4dbf4e356346
SHA256a9480ef9b7bd7b7bd7b164cd1d75c8218958794e5a709bd107c9b31b3c91b5d9
SHA512036950a830aeaa3fd951fea8aea61f88b9e9384e6aa15342c93b8ad3d3bf6eddd19cc8c863b29809f1344108ac85837a6efcf9bca101fb850ee2c35c52a91127
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d1b7994dadf016a7978167c83abb9a2
SHA1b6c954317b6bead130337aa577789451fbdcfd87
SHA256aa4ba614f38ff1508c363b46cf144099c822d775c442216791fc9ba44ec6f2d9
SHA5125ea1baa09bd62ffdda41ff2a9c8d2d33040e33113e43ed94ccccc1c2663da90bcf5648877c9930559a1cf1d69abcfb7658a81be519cba5af34d43a74ae6f14d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d2087f2d893b15375575155505d9a4b
SHA13ede495b77fc04b4d38cd0ad156a51bd1830b524
SHA2565db36a8875091101a9016f7adf8e7b749f0a9dff08478986ab4a0e3543247eb5
SHA512c951e462668abb2b33fb72bc468ce43dc01fc95c36b991b6d42625ba257d75ebb2f2c996d596da4fa960fb098c12db1fcdd5267e381e593e48b269111c07b851
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7a38079e2154c0b041b7f81dd3c556d
SHA1cb22897ee918df0e3206fd853935d0f4ca381c2d
SHA256b9c76a04dfea9e7e159e6e55f637628af0f4ab5e31e79be64d16193a84d8f350
SHA512b27d5bce8a3bc71381790ce321539cb9f1770e9fb98df0e4efd8c3a121275a68a755d3039a98e50fb07b84550b764be8c90fc41b582eed6baf8e05bfa1787e0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597153e8cc8168e8d73e8a43f2e4dc788
SHA1f1bcd13367d48e5b630c008abacdf48475ea95d4
SHA256fc481856494ae91ddb620628bfc09dd1d0e76aba1d62c97f19689207f292cbdb
SHA512f5a4b43a7e546b47cee755a7fe25c8bbca179161a561f1386da85844f6fe72bf66a1f173be3576a325ecc4fb9376f81c5b8ea45834d81598c2e4333a0a915af9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba8359b0abbcbeb075abf1837fbae1d6
SHA1ee692307d1602420d83622882c8f547d0a5893be
SHA2561977173f35aff7d82cc5d31963fd4145602e2d84252308d4de9e87c078023438
SHA512e02a72d659d0332ba40bc659ef17e8b0463d11095df7722300c6739036ed0fa6dc7ebccae310dc5c6854bbf898e803261438b3e47c40637a898dd0e698cd4c35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da3c438eab136280d86a8f51eaac79c2
SHA130188d9baad88c0dbf00c36df01959b30f78989a
SHA2567c0638ac30c397476697ea66aaad12bd8a6e3f7f5aeb2e5a9fc7df862da6f27d
SHA5127fda633ae0b3ae18c9b21272a527a938ce10214d6afbf965b77e354b21c897c57087c79e80e74d079c34281c6cb2a92d5b2e7d42a504e8eaf5ea2285d44cfbc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af1958f90414d4b95c820ae6ea37cc30
SHA1b493d97c3abfc9bfd0672853de110d08039533dc
SHA256cfe0a8828858e1f6cb06f63f937365ebb015f7b839dc63e5ed560ebcda2e53be
SHA512768bbc256ed0bc99eac547ab930c146839579e1dd390916a8b714c2a71be52c6a573be2ba7657100c0b29f27b60e2e6070ebde9eb7fef0d285524c7c4b52d92d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e84a632ddf7e6daa977e1e3a8932564
SHA15254e92398f800cbd4cb9ab03f855be4150c9bd2
SHA256b9f29c054d9fc33b72b38450a6d4659df2049b3510724044452793ad68f90ab2
SHA512d1c91d4c27619c6ee4bf9c9bd45df991407dca4f3cf3e86c3d83bdbfa0be6b6222dee78021ca3904d9ba8397a2cdeceda66a66f52b8ccf7c791d40dbf46daab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c97f802e753ccaf9f6abe1f0499078d9
SHA107676ec17224c98e9888b82355fa9fdbafb69976
SHA2565010a2bb89e82393737dbb1702ae83297442da8a0ea8a58eca41e834a9827735
SHA512d9e70b18786694215cd3e61c68e28413b29ba922f1d5245f7f8f8a0452fb233415ad0a4832b6a3121871a7b90c40fd455dbfbbe7ee9332360847d3e38ba4d028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb9c2c4dc05da1ad44afe40613f9738e
SHA1fb08252b01cf655d72ac49423f43908f2b34ad55
SHA2564385bf3278377193e2f903654e5e45e627444d67f01d43544274e8b160a43ac5
SHA5125684bfcd1ead14458d2ca418608639762c55b53565d140f6368903ca37e35ea7c873f678c6a50f39ebee36a01d5387c3b0b2826ddbb32202a5cd4ea1057a5eff
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b