Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 01:18
Static task
static1
Behavioral task
behavioral1
Sample
ea53239ee813e79133ff656539d0b2f7_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ea53239ee813e79133ff656539d0b2f7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea53239ee813e79133ff656539d0b2f7_JaffaCakes118.html
-
Size
4KB
-
MD5
ea53239ee813e79133ff656539d0b2f7
-
SHA1
b7387ca760c4c913fa190577abd7a9f330586b0c
-
SHA256
365de0c5fa06b58fda8f62ce6e86a032a4b53f5ac186e78fdc1aea20329b0b90
-
SHA512
12b0004082e5b0825c20ef9abfedb1e80aded70096f9a06ccd950326bd5debcb828becf03f3c25d9639065b4c9cb71b8b9826d9f1781190bdc342ab749f80755
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8op92Afqd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432870589" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1B251FA1-7625-11EF-A748-EEF6AC92610E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000002ee0d4b6919033007f1414847b2e027cceebcf994442f1ae81258cbcbba05a35000000000e80000000020000200000007d23bd18c295faf28d14d199f6aea44204e2f0b4798acae17ddc2b5e47cde5fc20000000a462aa3492e4f10545f57a68a0e5202d13eb33fa1dda3d66d7d3f0a7717ed28840000000009ba7448778265f101249bd4f855b46e40e1dc0fd94ee6e1683e28d346f538ad939ae53675f614e8f97e9648ef188f0840cc860c26354ae773f63d602fdd052 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50179aef310adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 1352 IEXPLORE.EXE 1352 IEXPLORE.EXE 1352 IEXPLORE.EXE 1352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 1352 2084 iexplore.exe 30 PID 2084 wrote to memory of 1352 2084 iexplore.exe 30 PID 2084 wrote to memory of 1352 2084 iexplore.exe 30 PID 2084 wrote to memory of 1352 2084 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea53239ee813e79133ff656539d0b2f7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565cc8bfff0a09c4445c7a3bc7edaa15d
SHA1173722f7e134e587a01523adc2c6ae8b1bb8a2b2
SHA25640b9cd405e43dc102355f9e330b92021eaa8a92ae9e411bcf0d1dcd29d65549b
SHA512169bafaf83747ac84d6d6cae98ef61aeb07d8419586930b949eac6d9b171dc42dc2a9f059fac89dc24d7fefdf7b24f0bdaf3e920a3cb1203294a3cd2fe28f997
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58357beba927e682f4595cdaba7cd3a57
SHA1fdcd0efd1ad86f3c34b2c3dfee47af1cce9b413e
SHA25651cb0e354d4462997a945fec2e992920cf6359002802c2000ce579d13a6151d0
SHA512f07d999e18f68f92c1f95b071f15b79a0b8caab62688fb8fefc075d20fea1bc811a9a4667dd26aaeca82c3a85da502a28c66ab4c357abe5b61bcd11eed086a08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bcbc7d6eae16a9b603b44e87261c888
SHA1594170b2a9259522f98ac26ab567e068e7a681b1
SHA2562c6d85d2946b2169a25f4dc9fbf0eca4639f6b0c68e3770b9f83dae91330c585
SHA512a9ef530e403fb3aa47414ad8b28fafd249f237b3cc1f7cfbb05bc53eaf54489b6fb91e6b15f40a9e8d54317bb423977354c27be203cca5e870c49d6b694b1589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e164f5c13f0a9f8ec24f07a602a6139c
SHA1406849255e7392be0e8dbf3fc474f0f159224861
SHA256a3f9b437593ed0c15b6c593913026ecea76805b9b175fe7c9550cc485d5d3207
SHA512928ab311c6f6b0eacdedb5f486aa9e468be2221e008fb30b3d914d943624d222f4632e4cfe654eb217df975f3e557194c3baa31d9e9f4ca0a2612bcfd39f23c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b27418418fc4fa2018638887ebe7723
SHA193c1d2f41b2bc9e79b5869033236af59fd6e7516
SHA256a2aa0aa8386b7085b7d4d44e1c9123c2ac6f675caeb48e9acc80c8511b9c5904
SHA512e875b670e214d6670574fb5811a356823760521bf3be33137cc19dd1f35bd4a5b7dcdd285bef84f3a0ba802882b4e8dc1972a3eb09ad155af6dfbc2a0d861e15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d759d1fd7c978b6677a446b57c52b6a
SHA1ef967969e2a10a128e4dcc191a17300bfd5a0a3e
SHA256b5f5709430eae8e30125478bf41d166cf6bdb953179234870ae23922c8cfe884
SHA512ff009810d9fbc7b6442226984df8f64718c8406f745ae8ab76103b45cff1e2acc1bdde5e69b90790d457c6f40ed7d3b1330a1c41374a94833cd2364a2ae2e267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e2bf7dcc1dd1da7d85d29b292936a27
SHA173592789e741e753cd82bfd0010a90c5dd01a3b4
SHA2568c39448522b296b2780a618ea5ef85637de7a7b8684931ad8a940b9fea0fbe66
SHA5125b62b17cb4da276eb312788480800a35ea55e6cf3cf06617d55068045ba76ac26ed6ff71b591ba0f09b43a069d105daaaaf5cb03e135b4342e92cd91e8e67c73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bed3a7a61d4ef4b5a39b85bc03ae8fa
SHA172695bbb81c163ca720ccee57a5dd4088b35d3a8
SHA256b42e36c5f11293aaca75158e74f334780ec1b0013b3237c615ec7e8203976917
SHA51288464e987aedbab4430915ab24beedd8b09ffc3f0ddcd0c006f5c3f6984ddb7a5b597dbb31fa10d678502b935b921e014c3cfa5240bd61636bc2da07f0af038b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a3a30ba9927897b68f9c7bbf102ee30
SHA10d2d3a54608710a9ea69f11bcc0ee3ae3f1967a6
SHA2569038d91f171494758a87bd68de69db9a2a95815f826b0cf1aa0387f798344b65
SHA51222ad6747c505a0fdff95fc41384285bb3153d7d857ddb757dbd6e23f8ac474371ef65ea9cf50dd2570917dca7da4396b4a4e4ed6ae20f0e6477f5083d809aca2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57893c0a8e0034aab610e21e98831dd06
SHA176afb4bc8496ed30276bb3cb695b48aa91adc512
SHA256d226ec617ed4e60966e8d169ebcf7b753295bcae0e82ac018b6a07f7cc4c2ea4
SHA512c3276ffabeb23c3f5adb7d39c5de8b39b5e8d80337c3b0826134dcec55b7afc2cdd105fb2af2343c086e8241bf8317ec27ddc8293ef6fe2753a2d640a0f01be6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ec1a49023c7450bdc91278a33bef85c
SHA1b68cfab633c54960c02086ef549e166ee931b83d
SHA256b54821f765163039068c13ad1582687d7e84dd4a7110aa6ccf3b0a96ed9e9ca1
SHA512fa2341fd65848870780490bb281169015334509b33d3a330ea9eadc97026cc010a6cc352602a2a4b40f51bfc46c90c7ae276c09ccf6ae05d91f0bdbad8c70103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547741e5e4bd154f38abdddd2ef36f00e
SHA16fd159d84cd77900fa5dc8e280fa65fdda0f5389
SHA2561e89a443ba5a745a663bd397389f76a6a09ed57ce765f746948e1db65f54543a
SHA512cef5fbdb724c2eb0522f98bcd1665586817b289ed6b7c647c13c4617c635100cd182a02b7525d2b10860ea4cb5b926db2ec22b9dbbcde9e9acab48121dbe4485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac8366e608140e071cbbede4e463afda
SHA16e56eb8b1f28152c4d610de6d46c63f3603ccf61
SHA256a99cb58ab8d699117ab9ec1d81141e7c8e1086c392029a80dc7db68ebbf31738
SHA5122b3d6866a1355eeec26842bcae0f1f9b5d26bd7eb43c8c81feb84e3fc0568f4257891ccc73ebc89896c3a554b3dbae1cb001e5686de36066ef4b0916df9c8628
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59704bbf9a2560c793dab4a56c67a3e53
SHA1365996f7ff3fe7050be3bb7e613b9206fd46ec48
SHA2563799c3f247ad3bbda3c3b3e131b96812282d811c7fbd3be6326ac10363affa0f
SHA512e24fb70f11c02b58b8108355225fa1adae33fe29b17d65dddd7bdd28f1520da6f8bc25406152d6496c6b6455fc663cac1c1046cd3c98ec4725ceccc02fd99eee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c14c389af28f5993e19562abd952aa4
SHA18dd599993200715bd1e170035c9fe41eb127c77c
SHA25634c3cba022ba7f555bb489344a60bc4728b2a4d3af2a8598103a298ac55d9b7a
SHA512f48fdf9ecb815466ed1732f1152ab7c98bc773d226da6ce4bcaeaf5af91fab95fdbec542cfcca4310d1d3e43b4d9dc7b827633a748c210d78ab31fb9ce3c1b78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a390be529f6e68142bf60955e3314fec
SHA1c0b3d39c02d2f85733b440f7f00080cce3fc3643
SHA256d03643635fde12fd87f9d85a9a1ece860b9b8dcf887525c2b6d4fb59d3a56be5
SHA51226b73d735254c008770efd57d1715db1693e1ee676a1e60e8c0c6b8c1f221ab4856ec4f330a1e426043a88aa031c97e3a52f4f45825ebf22dd9df0b4fdb25914
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f23df0846e3ffff5589966cbabc6b99
SHA162ebb743b902b7042a3a9d0fa51fd2dc1b16d4ea
SHA25647ebdb1f42dd073f547eb24417d4dd24c1382ab1eeb4751641583c8a234200df
SHA51227be24b2c5d8a41b3bd4cfa3a038905be5dce454affa1edc94958ba05f1d34cd1e6b55aa10b10bf0211b013f882c17fc46862737072973ee9aa7fc772e2c68bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2ec62cb298c5616aa02081eb8cedf18
SHA15070e939a284059d80057f238fcb8563ac1ccaf0
SHA25660f49c965f984b45c0b1f879c349e70a086c3986a8a6a542cc4fddb4e236aa47
SHA512cabb42dc9097293391d16651bec976cc2c23c99598f16af0d44414b3c62fedd3944556bc36b887f7fc800f638e5749dec292323d9fcfccd151b10f161498e8da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545e908b0c55287d125120a25886fba8e
SHA1f2b47957e15fc2947245fcaad0871b50a48f6a6c
SHA256c2e278ce84780eac8e537aefffe6fb5dae04f0ed0227732d29c329193f37ab40
SHA512e0a2803a6926d6d31735e93c4f99cf3b764fe00ca5dedbd1fa968207ecebfed598b16e80039ab88220160aaf3d15a408c4fea42a75075e19beef33c03463d45e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b