Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 02:37
Static task
static1
Behavioral task
behavioral1
Sample
ea6e26481fe47999f2274c0b65dc656c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ea6e26481fe47999f2274c0b65dc656c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea6e26481fe47999f2274c0b65dc656c_JaffaCakes118.html
-
Size
50KB
-
MD5
ea6e26481fe47999f2274c0b65dc656c
-
SHA1
12d41b287bae639436fc96807750548629a6dfd8
-
SHA256
d239a5506ba89fe0414e44e81f5b1714cd33407e6049e6bccd9e56c0b356b4e4
-
SHA512
0c2849a8471404007749cb388fd948cab08de84fe20d922d0fd7609f8ad674242c8acd9f9796d07769dca60b8e3eeb04e26046939177bf2473c838fb7c1aa9a0
-
SSDEEP
768:yRzROXvqDKc0kX5P89UzBDDqZEUUekzsI5JortiPq7/DI+oRA2Rg/:cDX8mDDH5w78z2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1911F611-7630-11EF-9BC7-EEF6AC92610E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432875310" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000a98748f2db0e8d06e2b1e8f42dd76374035ecb45025451558907e56fe3828da6000000000e800000000200002000000000c32e74821af23c6c49b2b3a2c45cc2a33f3cd4de0fbb6e3b02f6d2c52d392720000000fdc31573b25e92b084209b7bc7eed2cc9ee087033bbe2b7419e887b6afdfd9d9400000006d5429496e1bc28601fd073c0dc88245cf3c29729fee5040505a7001b5c7081af42915db5a5817147dbc8232ed500c3c7a50ccfd05898e12bffc2fdc0f014357 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 504d88ed3c0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1720 iexplore.exe 1720 iexplore.exe 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2320 1720 iexplore.exe 30 PID 1720 wrote to memory of 2320 1720 iexplore.exe 30 PID 1720 wrote to memory of 2320 1720 iexplore.exe 30 PID 1720 wrote to memory of 2320 1720 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea6e26481fe47999f2274c0b65dc656c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa3043aae5294d28ac02458d2fbf3893
SHA1645039b854c333aebe1d46b3bd7be8491530ecbb
SHA256395bb8b4ae4874849c3723538330a5ff3449c9cdbf47fe89e02a1e378448b9ca
SHA512afde8ac27ee249e1e695978d53eaf01c63d2f183b3e97fd8d70cda5cc545baa8aa3282ba3ae2283f5ef92e76ec1722d395e4f76ff7b6d3b3337274341a55c1cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b154d19608b3e2726429102e43ffebf
SHA189f134dbe2a16a450b6ffc3330ce1b9a34740ff8
SHA25683f08ac491a6f729d53fe1a42015f800c3fdfbea72022e9df27aaf82bfc681ad
SHA512e34802ced57553e537a828b668c93c61b8f7eb2a443a6025cde0b6fe76c6220bea3304326646020969cdc23b1ca21b0cc86ed0029befc731e1c87b01532448c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533a78d598b511da8181e5ad3bcf4141a
SHA16927f28ab777654686051303ae736c951898e272
SHA25633387b6c1ac52f6b0d2548c00ca97a35900a86e722f90d353f901fd23e7c75c5
SHA512dba6b433f3d5d2303137c4ab9cb0249a83f3bccbf6d57437c38f57108912b068697dfbb1a98ee21ea77f16ce9ae82cabb31c34aa22db834cdc845646e4559739
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5462350b96fb03818f3bc0371053c519a
SHA1fb1120be138d2cedba67feeca87296f18bd795df
SHA2560a11e31e4c206ab3be72fa571508bcdec0ea0d7d8de9988f92179d62b6a3c735
SHA5126fe48d298547fd13e2785ebe932dedacdee3cebd5770bbb54b10c5befe9942a6b850507f3065d3897a511ce6852ad09e428ab86c7c577d14be019a52d3c41522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5720749bbae6da9148ffd23c5653c39bf
SHA16b6e94b1f0e805268a709dec8c540ef4b9345587
SHA256b20be809482939febed27bcc72ef06a71e6401cb6567279790de387a4aff2826
SHA512fd695262fef6b6e2b182d76214ad0ff89b7efaa9b07b286d3d835b9fa12e077a339c3fe694c7eaa7d72d50806df99444414082c2882f2869b221aa964754aac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5539d0e0b6100e94f5b8eb4d3f9fedb71
SHA1d421a4db4373251de16cdd82801ebcf3a4a827aa
SHA25607b6d1bb07c39bee594c327da7e378c87034c341f23153275b40671a857ccb7c
SHA512af6fb1888456f91ca8a37d9caaf8b50a1282c25f3edab958c96daf229382dde5e5ae12dd46cea341aaa3fdf945ac99aa51df33ec06652d449936479fe9ebd689
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54919083f0f61e23e8f9cf6234e3ba6e7
SHA192e8caa628bca45c6a6fa8eced189eefb1c5294c
SHA25636b63aaa786e515e00cb49f7acc97618c33ac2f8cee4441ad272b415adb6a772
SHA51221f4fe9fdf5652c99d74271b1e9d12609db3a281d17319b126fede9670f6fc3c621f620a1e87f020f9c1e0e8bc7eff018212456cc8bf9bfa677cca04d62aa70c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca614d2f25550821d06c6c5a0725e6aa
SHA161a70e34f720eb26947c51d3ca34603d5aaba782
SHA2560399673ca992ac50f5c8cd63c60e82e6ef9da5cb971b6edda0fe6ae53c7179cb
SHA512502e356c300a73e2b327dce5baeb95a9ed375b0803341b0c0af96c602c52d6b255ab08b46b468ca8c58035fa436071acaad3a4985856362401253769b9a6270c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa48ea8f6fd6f22562ec34fc1d2278f4
SHA1af1009e4bcb52e783835a9a27652cd5c259df007
SHA256d8a7c0a62ad9fc578b30fd48dd43b454874af5b4081d9e27e1716800404117c1
SHA5120e3f0e50a93fb6e3cdcd043773f81e5b0d573f4930cee91fed1a9b3235721643f5349be9b9d33e05ab00c6403b41325e2732d0ade7c62b4d0d1b1724cd19a435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2ad0970755d002cf61240bbdc218e47
SHA10a92078822919b4d9484c5091d36e3b73fea90c1
SHA256858147f809fe457f1ba0a8184f2c02995099c3d1539a5e01ac58413c179cb149
SHA5124d7c4f7c79fe973ad03e668a4c48398580ab02ad6a7c4ec87577f6e6a1a465ffd373d9157c3067387b568b7ca0ee034c30a899bc68d29011d496d3e17161cb31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dc5d7952799351b1ad514b57f57100d
SHA1d0867a6a480367470f8adaa16b56a0bc2b9a9350
SHA2569fc6f8ebac8ef9078e1b501038e9e4a1c69abadcbf38b3cdafa95e461d16fef4
SHA512d39797b65e138c47facbf84d71a643a87e3b5d66eefea559da3e9c249a1622ac6eedd0da5cccf54683187369f99788e9a129a530d9b3976ce05800e0bd817658
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583b57d9a0bde5d2ae8df499d45d51d2b
SHA159d3cadea0f790e6b138c20bdae13e11b9180ad2
SHA25646039565cf3832f9237c81611a68a88af41ac4a645005f8cb7e1a9c1951b9696
SHA5122aa5d1d1eb329da6da931a39f8ea892a38232f55501387200650081643654f7042dc99a45cf232de354bb7effa8f8a0beb4bcc2dcae175457c662d63d2961eed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e50178150414cc370034300cdf15345
SHA1a2ee3d47c0a210152530fb619b618516537824b0
SHA25686044dbc9ff7d1ac4c334d8678e29c070fe911956206b7071ef06e65c85b8710
SHA51285e5ee2f5edec875cc85b54069b96c258f3381775790cfbffec33b4bde7bf03607ddbf8701a3995f255129b16353bf4a6065b971006fa08a50dcb52cb5366ced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd49ee1610624cf4d236d4149c7903d5
SHA14a8c0b953468652eb887a9773f6f00d699338121
SHA2560b22dba33ce0ecd0a6f2eb69282513b49f1b704cdf856aa11afed8039069e5bb
SHA512c6968bc6ad3b237ab7083728a7cb9f0b8c31d88cc8ee2747ee2139553057d13271d9efaa1045950b00449ab8505fbd24ecd8ea60dd0147f025110d811c6d4dcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6e396a1ff7414c3bf82bf931930eada
SHA13487f13b698e4f86a05578f2dc045d7500fcf7ae
SHA256308e944d0d35a4d816097056ac036f9f3b513da004d7db657d630fe9b0988dcf
SHA51204703ff15f6a1cd81ffcb382e91ecbcf420381d0c0e1b8fffe2fa33a969e2f8415631a92d5ab1040da474cdf6a4da40e6b40e3151adbd0ae383de2d497761423
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a7fd4849dbe9abc83b4792c01a63e40
SHA1e1231056350bb88d78ed2dc893ee30295403b5ef
SHA256555f224e3a0cefb091333af12bcf5458da1fc32b1f2fb8683140dd8da2d259c3
SHA512aff1b453a85b76513d0d01713940df002b34225f1e12c10de34d75887a887da5183f2be3d352862a9a8cfc21d801abb6c2f71d4141b967c568cb3664224f15bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa60d434618a5d0ffe14745ab6f6f47d
SHA1f99da3b74d249a55c0f9b7923b9d95924d051dc1
SHA256c0f47dd3c1ce0b3b7ab2942badf29002f54af1f89cd5afb17216584e1103d666
SHA5120279ed9ca0f42671cf96fb0dd85c4951de37f75e9dd6f1b90b4161b842c58218dbf3ca46bb207cfb456b467ce7953f6fa6931218de2c5159de2ac50d5ae87dbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f5edd8cde3d0bf8224d5ef8bfa5b00b
SHA148987af9c140b0ed365550f8903206c510656001
SHA256310b763a8312cbed009e0828f207c6040a358d8aaded30cbf1452a9b9472fed8
SHA5124a45a78fd88494da74062db2d1fffb1d70e6b3bfcd5ef9fbfeb38f80991894075cf5ee31be8bd51ea1f90a0667423a6098215a56c82b40d5954c0831414fb86e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59abef03ba3818e18e566ba0518fe002f
SHA1f0f9f64099505d70df41076c248e64cc79f086ad
SHA2560886be3bc9fb507dcb00788ef469502d92774a15fef856840c5d301f9fa8676f
SHA512a1644e1fd46b3a0184334a44745793acafb79ba65ad6c1ddb166552af1959423b7337f18c3b14611885d2e401c6e65011f3b10e443ac6cdea542281c665633b3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b