Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 00:15
Static task
static1
Behavioral task
behavioral1
Sample
ea3c73f26ae6698c69f23ddc9de5228a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea3c73f26ae6698c69f23ddc9de5228a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea3c73f26ae6698c69f23ddc9de5228a_JaffaCakes118.html
-
Size
3KB
-
MD5
ea3c73f26ae6698c69f23ddc9de5228a
-
SHA1
8084e4696e616cd4cc247b2a5b6058db35bf4b91
-
SHA256
bdf97ceeb9b869cc75722d9fe3b6db00f2adb1a2762d24fef9ce231a7e7567b0
-
SHA512
1f2b08e61856d0fce4e4d565600b0d12979ae2a718edf160f740311b3a77f6e1e46d9affe16d4ea5b3d77664f96e022fd619cab7dc8d73a9e3c241099cbad68a
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{524A2F11-761C-11EF-B2BA-D686196AC2C0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432866816" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 507ba128290adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000f75e0910dbe6733a91ebfea5982ae1ac85fad8f98a6a4aaaf52efb7ce21414a3000000000e8000000002000020000000ea2d15314c86a192bc14567b95a7c4827100796a3e54280437cb06fedfa2bf652000000065ba0c7c854e1517ae8c71e82029855f3008ea3882af1b99e92a253ef448026b4000000000a08e4f1a65332fc536ab8ec845e1fa107b79c42bcf1f870254cb4322c4c3107b60c6d9fd5ece6d3870545ae75e0f78b32d9e49918068dce7d2d7b693ae6b1c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2360 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2360 iexplore.exe 2360 iexplore.exe 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2408 2360 iexplore.exe 30 PID 2360 wrote to memory of 2408 2360 iexplore.exe 30 PID 2360 wrote to memory of 2408 2360 iexplore.exe 30 PID 2360 wrote to memory of 2408 2360 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea3c73f26ae6698c69f23ddc9de5228a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2360 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5233f75adbebe5c6f2b10b0dd8fb6b71c
SHA18be4f3b67f5b4761914de0754c7b128dcc97d490
SHA256d2d86b7bb4aeda4ddbdebe87aedcf56586ae1dc7295f1b1d7a1e624aba32bc95
SHA51223951e73329c1703f649e880d014bae3072047e053287d9dea62f6918b3d6b521e7fb32e31397cf72c6fa9130865b26fd194c152f33f3bc750404a727bf9b446
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56723f99ef1944e620ad816c74ce316ef
SHA1d1e5c33e2c8f0de98bf516d694c550a499947a29
SHA256f5569504504605634d424a000f398529bc5feb24bd6727712d0e54d93ea4d9d4
SHA51267c389accb927bcc863259f0bec06e0803b513c416d0462da3eacf334601cdd52e547648c9a35db9871907f6bf68a5069049f9cbe3963d4e7b417360e9bf8460
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d73f83d79f0647ad2a1ba76915e59777
SHA1768d974cd01802d58e890463cc9a75b6478beeae
SHA256939bc1c16ed4eeacfa3a1481fe255d8943c284fde9b71d1e435e73383256c01c
SHA512c3bffe83bd9804b0726f1d3ad766f030c4cfbd6716dc4b1ec030ddf0050a4c80abcfab00ec96fb3a78e653737a8351feaf533e55edf8fe056eb3bdc7ae5b1826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5044b096afc93088ce0c1d7abfb53ef96
SHA1c10102cd64d7620d2feb90b758ddb66d5701e3b0
SHA2560f344a2b35adbaeb7551bfdff2a92eba17ace92670370f490350c3eeedd345e9
SHA512e8dd2f37d31b1e1ad5cbc235b5decfe4e995d27ac27873cadf27e6d940f1ee45e1c7bba3322535ccf0df5184377c38bcd4f73125421131773295fb847075ca85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582a4e4220727b277aeca75820a28861b
SHA1e37840c6f28c7997f8b9263abc73461f3e1eb06f
SHA25651248d57de4d6d546d950e7a4d346da2ddc46b54144e8cff34a80e835e1f5343
SHA5128a5308acbaf9dbe8e7f79fb5aa8a52556fff2276a67d8f2d46895974a3f44ef842e8fb78850fe17afe062bd9a0641835e3656a3b8b7c1a9dea4e412ce381739e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d53bbe2328c676e9a0d9b5934a434cd6
SHA1a37a503c405f53abac5d2d710d7f04e1640039da
SHA2563374077e5c51dc1097c8d5f1415d01ff6be4d1112d3ad38a6a66da562d28c027
SHA512f8e7293fdced3889ebd732495b56ff14117d97277285883cf754dea87a560c9a3de90e6a694f45965072869a17775fecf227f9140ecda0919745e5ec4ee0fa72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aff24b10a4301ca2689aec5520358a06
SHA1f4d352abaa0a989a8e6e3763ee90726624e9fe82
SHA256476d52502a02576622044bb15651980fd7ddbf9a1876d4dc42e22eea70b39328
SHA5123deb09b35ccc1ca767b18cfb7b70b4fee4d2eb70709fb542fd215e951f1e27b0e03f4ea81070c04e127f3f357831a3d26fbdc443fc49d383f6a07aea2f054783
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5752b523f569263c0eccd2d6432c1c23d
SHA101131aa21cfb72bc2c88b12509975d8d8bc15158
SHA2569da25dd849a74fe3348418661dea7721e5ea81d078591d85d7114b3d338d5d98
SHA512dd29f8789fe8ab7483678e027c108e10917feea3acc0a2e58ccd77ecc71d93293e3118ece21cf83f0ea602693d5053856075740bcfa654843011df47598ea6dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541aaeced38f248ef5dd25139738b17b1
SHA150109353fe56bb7012d7e824ffc4f30ba665b423
SHA2563499029ba1604bf37349279874de8d9d4ef25222f059a0a31df5d95643f25d06
SHA51258eb3fa045a8c0cc73b3f654dc5a9224bb292b8cdf6c9cc41df446524006d10ff795dd5511c386e322e7f0ed89c3fbc4a68fa678ac8a44da102a188a601d29ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525a0edc0430dff4fb2aca7a3a288a75e
SHA12c9ab421944223de4d7d3d0b304c86bf662dce88
SHA256fe66b847a43350347de5502b46a553ed61eb75c1c73bf9f1542150d5a758dc49
SHA512041c73077b04d3986c67ad8084f9c55043169b0a0872320bfb1fe46b566f853f429fd39c62ab0a7e61a5ecf52ccd18cf61ae44b3c5e49d77b69fa0bfd6d7891d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4b63520405384ba9ec7b998f6c80b94
SHA19ce936d15c7758f9f8cc541422ae758bd7a62ce3
SHA256b7d819a348bcbec2463e6b8294e425a06ba103c0ff14f7a0d01ab6bc05a49579
SHA5121f299869cf5aa20995d910a3242a2e50ec469335434dc2935ddb4cec4d2714e183832df2d4b96861a4bb6c7a58c28fc0b7d9fcd7b523c83665253ec7b46b79a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f2182ad86ee666b1aa3254b3a696125
SHA10864b9116f1ef2e5cc6748c07511aaa300f05fc4
SHA256e843a93495892f2903bd3857706def4e499390df751e397f1c3ebfd1e7e2a51a
SHA51265d48841179237be887f170c8377337d3b0628980fb888c57e6f4880167c02b3f1af31adc7d8cab7e36efa68ca538971ec8ee0e84bc2417517adbddc7c11f07d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5463d2a5b019daa8a3ba493c43a44b352
SHA1bd613089eeb3ed6615af9e0b0296ccafdb0ca179
SHA2560ef42843c9bbb1e32e944eab6b4028542ac4c606e0215300df63c52026ac5b26
SHA512b5b7081e4915511f5ededb2f7c4f96f2010fec5cecd2b1e8ab757f5f44e287d9dba1fee247bca625170ee38d4a17ecb349b3a1cc51c2d80a95785a6aeb672914
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599fc55df806b21048e513defa4d1acf4
SHA1bd4991f6d05cd618d3744d112f65791bc375706f
SHA2568e97b0bc56961a241e1eb57747668caf6cfeec5136a3e23d3005892c157ee0b8
SHA512c89bfb8a86c9c4e2bb81cfd585c6a397dadea68b4361d72ca5dfb60acd447dfd5711e8152b2913f1022b026021ed3d13ebe355771c7a0d0b60c8954fb3c5c40e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6e3c0381b15ca725d2376ab21729c8d
SHA1120d02dd423a6788dd1c6721eeeb6cc81ff256bf
SHA2568574f2ecfb8ae9079a2559a7fb0b4db22675c6bf7faafae14eab7cf0602c1492
SHA512cfa96eab574a644df95a1b42799a2c2ad057535fa3f856f7b65456bb854dccba90a7c8b5a6d167deb31736c1d0b5ec1f443f1049c57df43a378db8777010268f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5503ea155c753ce1e8e11f424e25afc57
SHA1d26d1dfcbc39acd58497640345c96c07e4f43ef6
SHA256ab6c0931126baaefc0fd527ad632e13ec85c3830643d47f6a9fdb52c9b873f9f
SHA51205c762fa0abab8849fb94361832063442adb40c6a3b0709eb1f20a712ba70e91abc5dfd8120296bbc18517b61bb9f8d0bfa304fe68b2386cb072435d2af9dc77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc37832f9276dfa5eba74094b892e8c5
SHA1793ac7e5e73626933e567c8eac2175580efee7bb
SHA2562725b33786aa94a31331726be4157a78dc7ca634cbbe55531c6e59d6c4589d8b
SHA512c302cc24dc8c51fe87b3361cfe70d6c91f19ebb76c29340a8ca0284024d1ad056c1286e385f821844343e39dac5c9f56e7c6014c3a6e02daeddfca16a4227302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54176fd7e17a5ef71ece66d193d77bd6c
SHA153b18523fd8169550aefe65309fc9412b51984e2
SHA256643ce89ff87ea2adb713c7f6887b20466be99a725d170d6595321629a3f2e914
SHA5120dc56fe0ceccad576d5f703dfa30438dd783ac57af352cc661e1fc2978bb6b6e2e799077dfdc0cc6cb3ad495625f134dc41a63f7c2194df2a5ee31eff1692d44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e1af368c66deaf0f3404446737e7472
SHA1c026ee82867231761d3ff7267ceee74879effa8f
SHA2562dc43372f4c08023c6310bf5e080b876891baff2145c9492de496cd42fc5df90
SHA512615d425d4989ef7b13389f07b83f9b2b28d11539adcadde3151ac690bd86238ecc4fda288b8d0b9197bdccfa97335c301081629b31730333dcc2af08b826f6b7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b