Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 00:02
Static task
static1
Behavioral task
behavioral1
Sample
ea37ed66d3406fcf56384956eecdce41_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea37ed66d3406fcf56384956eecdce41_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea37ed66d3406fcf56384956eecdce41_JaffaCakes118.html
-
Size
70KB
-
MD5
ea37ed66d3406fcf56384956eecdce41
-
SHA1
5826323251b17e06852b8b7bbbeab4055ac7554a
-
SHA256
96a3ce630e1082f848123944ab34e95a6746ee45d990f87b8e1f71b61211c323
-
SHA512
bd2e5e6b4793d3a556f75c6e02511f8558021b4ddf6b294a133bab8d99a9bbc2c53fe74695a9e17df3df5e7cc88915d03fc0f121c28cd192e784ba8dab83d8dc
-
SSDEEP
1536:gQZBCCOdv0IxC0/+5AvysQ4hNAlWv3BKBLvBwNdIPboQtryCzB9k91JYA/wFMH3x:gk2B0IxO5AvysQ4hNAlWv3BKBLvB2dIK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000aea257c46fa6fbf5a9f4d15de4f8679270720e5793624ca79158c5e1df78ec28000000000e8000000002000020000000eec2beaccb5cf697bc647d6c0e4c6c780f51eabc2bceb61324b6e39f793c5e3320000000573b63652443f33744388d3fafe0702c0a3afc9841938da91f84ca369da1cf43400000008a19e5956f9ba738dd396d5d0f8996b2c3f39afb9216f6f46221fad7f961b959c0c16a70fbe867a3aaec06e4e7cbe40ed2ecbcbd6e66d64fb43216e8dc4050af iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432866016" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20dc114d270adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{76065341-761A-11EF-B525-D686196AC2C0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 536 IEXPLORE.EXE 536 IEXPLORE.EXE 536 IEXPLORE.EXE 536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 536 2080 iexplore.exe 30 PID 2080 wrote to memory of 536 2080 iexplore.exe 30 PID 2080 wrote to memory of 536 2080 iexplore.exe 30 PID 2080 wrote to memory of 536 2080 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea37ed66d3406fcf56384956eecdce41_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c27ef8c67c1bc558f98038136d3c06ee
SHA187ba17ff864da52a5303c1834ba547a4596c3c2d
SHA2569dfb5adbc652a6c0a567af54f96028bc01e1f14caf3b7f35d235abc7f65da1d5
SHA512422cfd7b7cc418118b38745ef6c9f121b15b7ba4eea1b46162e1fbb94210b68e6011d2ae202bcee284e3677ad541f9956901ffd5fc311dd4bd6b8c7fab7e8542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f10243cb29e071cc1c2bec9ffc476993
SHA102e530f8721f1cd0209234a62b731d56b1544622
SHA2563d17be96dce6aa2adc52dd41e27f711ec5b7b0af52ab0231a3733bf000a28452
SHA512a14aa921d93e63a1897fbb1d164e5b2f558c31b26b0c9858eb41918780aaf6a9b800eb8efe2ae6c301ab8c5b06b3f0b88f486738ae0f83065e57258e692631d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540289d3354524a5d6437f6708e38e4f1
SHA160b361f8c9e8ee3c0a43a03f8d547ede0cd1fb03
SHA256b0b9fd68911db0a44715fa8bbd2bc5d5ee201021c58e54ce4be0147919e62878
SHA512c27857b7a7e549dfcf93ed757486b98e373df73fdc96779a0f36d51622baeb02e402a048f62f1bb4eff7ed8a904e2b4e06426d544c2b393e484ec8d78ec58dfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b60f8eea56f6290e19a372c30edec4e8
SHA133156c0e936bf7179042cdb437974f8cb576ab71
SHA2568c5d47d1cf8a20bf1ccd7d74c840a3599ff79585f4bc5e798fc16c2a8cf884d9
SHA51291c84466c74fc3cea2a027673093fef540fd8744e008a844533d2e90661e551685834cd361b3a86b6f926d44c9fde5033ee115f1349b5aeab9666e49bf99983d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5812296d536df9cb07a70f7d183f1c308
SHA1c30d03b01d3c0664064c7cf329598f0485939ae9
SHA256e83506521cb186f5dbe815186ad602788895ba828c07587319c5223a9557a494
SHA51278f2eecd420ae39bfb6279076c124e717d235e9ae5fcfd066c8f22249f5b25c4b5963df557786237c0ecc810a4188c7c75fdf5948f411cd5d1b4a7966f14e174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51139369ed4dda7b3ab98203251b8bf8b
SHA1e3ef55e315b657f5b9d5c2a931c9a6bdfa34ff84
SHA2566ad2936842a039ff0c4f300b622c086bcc9c723cb4eb1df04dff1da5a6c69847
SHA512c25499dbe8a3488f2c4c09e4eebc4012f45e77eae49cf026330d5bc2b6b715751d9d0c9f6155295163948b1386155122300ae505754761a45e61158c3bfaecc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512251ebb9411048874e119c36d4f4fcf
SHA1b096b7a40f9651265da6a8d0d761f93e6cba46c0
SHA256e1cfecde51d799b8cba854c1b1334a2fb8f82b7eab3886d9bbed950e946b361c
SHA5125de037f7cfc8814515bf5190b11cc77f6afe3e4825c6db008374e77e37531c89c2048c5a9b0dbfb1a890ad43563b29783557a2393c820acf1bb62ce010c2a4fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1361a6c6d9757b5d223aa0f7992a988
SHA1718ed4bfd021d38bdb388c37ae81f63199850f04
SHA256cd75c34559c49f7e56bc227517293a68bb00106148e2e21a2129053e25a28ee8
SHA51229eecee01ee46b03e07047463473753c346d91e095a1f61a7eb0a2bfdeb95943e9e2c95ce0a0d50f2b6692d7cf76370ee361ad44d93c9f1bd7deaf28faaa5b2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598624e1db674968e7688e7eb40705a17
SHA1dc2e4bba07dda9416b69acd8982f1df7cb232155
SHA256bdadac19bd8c46453a2f2a74c7c51b7fcb13c9e5a9a6826e50170520ac7d7370
SHA512857917dcff92f209dfc8f0be19e83f8da9c6f7575dbb5616ff1fdd47bc4a48dcc0ac48daa766771f8a5515f3928b2f03c4cd2b6c5c4da68f4dccd41af6fac549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dd83b4184fc03b9cf4c8809f2f48408
SHA17696f61410dce9607363028a16c9d8961e5e2c44
SHA256d300eefd576bdc844efb6272dcec5b7393a8cfb4e36e8005abe9372b554185ae
SHA51242c91039c1c5413dc9f03dbbab0a4d005517ea554647ad44479ee127844d5e88fac7f0ce6f3d4d14dad79620aba9906c651b0b5bfd861d514e83b3b8e6ae4066
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558105dea6bec4e40502ab93e49866262
SHA111dee27cabbd98186685b7d4eb184d8d2a76f1fa
SHA256831f5806bed04d69e31a8c2817f89dc0dab191df7523520feb526b1e89a3b11c
SHA5122b299dff36530eb597f37472abb82af531ec7f17052a5da4abb3197e97f2d8537845d26b202e4e826cdd70cbdec4b0b334db24387b22fef3aacf96158f34c37a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e330bf68c639c60bac94dce2404e7d0a
SHA1a238d8b6d1fc3cf60b0b74e66a4177912d16eaa2
SHA256dc386bc8cce3b49916f9c55887a88a98000bdbc3f2540440aa393bfd0dcfb0d6
SHA51204513e2b6b8006b26b71217554041b39e401652061eb4ac1366bdfbd12ffcd288edc394433b6383e0438c6ad33b40bdafe2b20e9aea70dd82e1bfc4973dabab6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb4c7f1d9245652160cc9c6a3aba5163
SHA114a3ac856bd15512a81d25a21152ad1086dd7da5
SHA256b94d18d0f55e7a40ed5ab81f4531db30e0642c6befef12549247aa3868b87c67
SHA512dad5a00027bb9b769f21eca8e9a88230d1862471fe01fd6507634f1922e313df38c8f350bd4e1905770d390455c69d1b36bab50b9be228a96851268c05c8ee9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c82f032d2fd38b4479cff5435ac1dcb5
SHA159a3c886960aa3ada2b6ddb62cf295b5403aa1e5
SHA256a0c250f90166921e3dc3ef0b6a1eed10fe509edd8f2e18901c592a2a1adc9362
SHA512ba6f016c538c9f938c290822196e2d25fd9d7de8153a74bd9c36489cbd2010a5c56269803cf2f11b640dfedc6306273da1ba6cfc4305d0e01bb25e83367eca86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a50e56486603f7c33f6cfd8ca5790e10
SHA1ae0e15307776f124ea7aad6609c82f5962c582ea
SHA25675609f2331a52772b9bf5face85bc0769eb212c7926afef528c010074bc182c8
SHA512914d6e7620e2bb3730ce446ae4566eef833ab240b5f7bef13a7c21c2171feb358bd7a0578382802b932f88ebb4859952f231c42b01f36dc1b1c89c75a94e7795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a5b5671bf5301e8d32832eca5f667fc
SHA15121f52b07197a0a16578a9b6cd26804ea1ac900
SHA256d188c47236b8ecc2ee39ccdad62e0beda23ef159b52087e81ef44a07e0d5f374
SHA51296d124a4c77081e9ccc10ce3cc47db3b5ab0683459afa0327fb34e7d4374586444fdd84552eb4c8ceec9146fd740de87f6158394d3d45a226a7727d695324d9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513baacb4b30115c21367c1282e3d4d36
SHA1da9016f5c6b3719060e679614e66a4beaa6eb750
SHA256341d675238b8ac0faca234bac1daebe490de081893ed883919f6b2296e227088
SHA51222f92f6c325bcf218d081d557782b05471264517c356732a05a4aa905d7b3dd8c40e328dcbde5b593d9b80a014539ebfce2ab7b497fd2a99495af0376e82cee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553879dca8b48e289dd5bc8e403531c67
SHA138c60d9f497f3f36407f127f7c33e74138396b58
SHA2565b6021e1a3c568713e2e809be71befe6d861bb8563df540ad7b2a53004ec7761
SHA512eb4b09cf1f4fca0bf59bbe7b312d3ad5426f4fe5be0c7ed64407306dc66b97b99cb9ffeaec703b006aa6d21d6c9e208fc68b3ee7a6ad0930944634a9b1543b83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550fb797a2d672d166643ef688e5cc287
SHA1672b028cabb3a27dd5403e3eea8d30598dc07849
SHA256c6dde5c642bd66eef233f295108255b87362c3bed118411aac7320350b9cb319
SHA5123c9b0df980531dbc374eb34ee79d6b209feebf8cb4b9d48f3d0774a37456dcb473e3859a3809d8ba26d11b9288e6896a93a77799c6037f718858b1ec89a85e13
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b