Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 02:39
Static task
static1
Behavioral task
behavioral1
Sample
ea6ecbba916326d59201ec0c8cd5fd05_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea6ecbba916326d59201ec0c8cd5fd05_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea6ecbba916326d59201ec0c8cd5fd05_JaffaCakes118.html
-
Size
44KB
-
MD5
ea6ecbba916326d59201ec0c8cd5fd05
-
SHA1
21f7f75c4c72954b50eeb680d1d11131f14d03ed
-
SHA256
96c69903839687f9f447efdbd2f5e458ce1f22dc54d064564424ebf7fa7e9e2a
-
SHA512
eb4eb5bf1c17dc1c27a60602302517ff30abce5b8f8b6b42b5a20123341db45ba9f5f6929e03eb63273d1aebf08c16c2a2f7f9721d4d69d1cbc8ff965a8704e9
-
SSDEEP
768:eoPY5kJa0Jw8taj3MOuDpIMa92F99VB9f0khZr63qaRjlukId44yKDTIeJ4tffXQ:eoPY5kJa0Jw8taj3MOypIL9cbBPh8lul
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5BE52391-7630-11EF-AB7C-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f02eaa353d0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000001d1a3111eb17d86533caf211cee27f87d679eacad5c9eb24473a237e77114c49000000000e800000000200002000000058bbf84a197ad029676d259eb8d2f0fc44ce8380186c00c00981611cf7c52acb20000000b9aed8c2cbb1d38e61fbba64c8f48ba3db9e29814540af775c52625dfeaadac8400000007b3695780cdc1b58ff38063f58adea8b8ab603c792d959a812e481b0470e95c46062e71ffe0a203e138af01b2cf725e41b8574a3e468b2fc59aae57087c5169f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432875422" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2328 2236 iexplore.exe 30 PID 2236 wrote to memory of 2328 2236 iexplore.exe 30 PID 2236 wrote to memory of 2328 2236 iexplore.exe 30 PID 2236 wrote to memory of 2328 2236 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea6ecbba916326d59201ec0c8cd5fd05_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598e23501d8b4fea48572561b471f59b0
SHA1f9016567e64b5a11bb0a7311a14f127fdd9d3cd7
SHA2569f27a0436f51e0519781d965ba800f0fb8058552901e13881e6e65f312cbce11
SHA5124c52ba8b0a5e66d82c4574da8e8e7f751029bd9b86e8b9b925b85ddc7bf080096fdf7dfaff4149fd6ed51ff8145eca81a2a26a26c55312714b0100ea573a2dd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5913d5a77513af1a300e9fe32d152171d
SHA13aaa3df8ae63141f76ffde120fe6f7417dd61262
SHA25640c1ba23a04b6622b25098fe4b7757b365e9ec7eba3154cafe3dbc42b0bc4ee0
SHA512e5ffbc6945dd04614f467077e8ad09525c3c7fe14707d8d5f6f05457f799755318d7c1a0e7e3fe164a3c4b847b9f588a59f0bb49a37c1fc13813903a559af86a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d16e3d7178863b59a930b0c51b88f24
SHA1efcb249bdd8b3c5e24ebce8bd81c7486372f60da
SHA2567e595bb4be57aa55144c3fc7381f1f431c2ba4b8aba4367e09487ef5c2c6bbe0
SHA512b006ce7b9a6014e4cbd624b1017fbd52e6524bf390733c0cb6edf928ee9ec21b0e1c51ea6109906080d0aa8f77a9990ec4df49ab30db560e1657e9b5063dd306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522a286eb37c04471e053e58472a51d34
SHA1ec4a1f68085e225c85f0347d1016c6078b64c724
SHA256a47d9c6ab0491f021d019e8cda5e0093e01ccabf75e0cac69b381ae0e746b9ae
SHA512a7c09c74f55a6979bc2fb931afd787631b394dbbbbeedfea2743d8ffce9b0c273293e711e393d8ea4a212d1b8c71f10f133b288e64a00c442709119b253dc5ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f26bb2a0e132ebd921f588f194bf6b6d
SHA1c98679c0a9e7a608269a1f4ecec54bdec4d3089e
SHA2562f01f771f936ce0f8cf5874567f44d47d7250d9a11b45641f5b5767f6d693f0a
SHA5121053d6a1969adf15bc41706dd4b9545b3b712815fbfb8b9215af10b2ff24a2ca6d82c2de9e8129107cd0a41c9e0316b4430283c7233f07c608c9afab920b1f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a020af4fea5df22b6ce554981c9ff6c5
SHA1b772f5f8b0bf5dd0ba6cd9020eb8b2b79cd2a4c9
SHA256bd5efa6b49bc84d61760f6e62149cdc00e58fd671bb37b77653b54f2dd820972
SHA5124ce1994106e0e503fcd3729370148f1d7a67807c7b328cc225127799a1313aa0eda737e9df053bc56db64b125f8d4b6b00ecd62832de9c9d9725cf6962aaeb01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543394b5bc54e197905595211084f5871
SHA1dd1945e4260327dd37de0c8a69155fce607cdd84
SHA25603b9a33f34be63d2fce28fd9659faa850dc61a937ba13ef27f516901519a3a33
SHA512fa9b54d32e5d123307db39d2d192ce58fe8ac4e3d8d8eaefe055de61f2f4144293fde26b3eea9f814e6659dfc5feabfb1c44dcec99dbfd33ff80c2d7577a3361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb3635d6c67d3ebcb74262f7d607cb0f
SHA12db9aed95949ae62f598fa8014fdf82b841ba99c
SHA2569ddaa954882a087ad22c3b711aee5c269421dca6ed87aa552573e26e8bd66758
SHA5126e16c4e8a719bebca07e3005535d580c3cacf7fa5163e8559502a0008b417f543b36200c7e611cef81bf74e82a895daf8138ca1b0eb892272eb4d17f644ec61a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529cd454aaf192abc4ba53e9547a4b136
SHA1710036ba15a6dbcd6d053a6b84e6c0b0357776e5
SHA2564fa2d48229592a6e4e02d323dc3f06fc6854f98a34fad3459f6b8c1c56b9fa17
SHA5127fcf4834ccd308e9a606ddc3da60e8546a75d593573571b6e6df42209203cd6d2476aec959ebc1e33301fce972abe056f986dc8fe0ef3ccbf6a76035cc9e6291
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db9b76f011e0903ee225d5baffb681cb
SHA1fe029fede69e061c92217cf63a0d66a9f9625646
SHA256dbc25df42cafa581d2ded3f393a2cf65e3af08037ffd35d48ebe90cdb7239f0e
SHA512a388e76fbdffe4f142b19328ab6837347550c0285046779e927220ae197ff18a1073958f8d04cd3a8d7a0aafde7ba7656e0d19ad16e26c290148f1330998068d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cff56cb5026df1170505351df7bc9f4e
SHA111eab30f8dbe02da20f5b454c3b28baf98ca541b
SHA2568bb3b9adeea0262e90ecf4d84a017fa3cf299e893d2b5fd9d607dc03d10f280c
SHA512823f830ab9af0f3cd589ae20f1e6b01fe8b628d97d08f76f1add99df76de361e6dcfdac0a817b3dee236a9be9f5ad5172a0f576e42a32ca29f9a640efb601447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a4f0b6214639ce91361296c98129356
SHA11dfc301fb79c2072db9137f61fe4459c2f5c392b
SHA256365679fbd87f7b9cd11d6b4c88da298767d5286228ffb5da68f57488c25f7c57
SHA5123a3f8f35dddda35cf4d37f2ab8a84e3a4f612a039c846f069cef72f6ecbb588619d05ab6cabeae54c9ca97b9c17cfb1dc1fd928bc8024dd71527941d97666845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bda53c413751669dd25a25565f1247a0
SHA196010e8d13a7bdebd9c2aa19b51a957cddaaa926
SHA2561a43e4f69d6ec0e5e20e9eb3323b8e069ab9c5be24fbd2f98575959d94bb3034
SHA512fa878b0c7840a1cb0b9c403b85f2042f64c662e64803d2169a8906e62675e409e06149bd8cb7626957ceaf8f34fcb25a9a10fca6099b283f5514e8b575033f11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac1bba3dc07ab0d3d5b3a1805280ce72
SHA1e2642f1cdb1e6b65566e37054c6b65cf75ec7edd
SHA2564db21bc7e63e5243ed41f28d95e647bc5c54659e6f09d91c56b923d6d84854af
SHA5123bd913db6d350313b734be707df77c72115c3fd97e1a841982601798217b53709a42cfcd7d035b34476fbce1a14d1d542a75024f90ce32d448496583b6692a99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d1b91e4afe4bd9ff74001f2eecfa20c
SHA13f81ef2d48886c4120eeca66abb8ed058dece4b7
SHA2562ec2ff81e27b9fd9ed7d8cfce355c6e31ffaca226bdb8d288ee534e2a65f23cf
SHA5124849271d81fc0a29db80f0c2f83d5bd9513e40fb874c21c12590018078836db8bfd849b8420faa9fedfe1e947b4f6259268fb51fc1779357b9ae38b77d5f5f85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5969bcd973eabf71f46d4be349362d4aa
SHA17ccd28b19e96e295c9992d4b1b6ec9c2bd40636a
SHA2569fc149a3744392848bcff4712c00d3d949caa247567407c2ff68c3a25785179a
SHA512bfaed9e2fd36fd584aa5527a5276cdcd9d4578523c0d7b604249f587cec0564bf68a56f6862899b0581a9c51057b6995799f63dbabd7463b69de231d91f8671f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54572a08639361d7790540a5264d6c25e
SHA138fa2d16897b0cc749a2e1fab5f3ce95ac5aea40
SHA2560f84ab29dde81c7f57e4975c963b6fe920b025d5320fb72ae1f17c741bfe052e
SHA512826a02c8c34a2497c8029a9618e18b9ec05dd1f287aa12c80d826ca5d02f315af1bd3a2680079faa4208a18bcc3abc6986c53d44e71ea7311fdc6dd018416b69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6bf472e39947d0dbe5ccbd0b3ba1943
SHA1af6a215d568686b881ba532dec2a83beadaba352
SHA256b01ca8c44d79c9855601ea4eb7c21b6484c85aacf0be9af6c0c41aea486d6689
SHA512c8ea8a803ccdf34158a685985ebfd3e4e023e053b00a55ccdbf88b2f99c029df5efd5cf36dc3150a5063aac6b4bd4b3f80bd61b60185b5c03324a2227b5c6908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523643bde60811762edbd3dae0a6eeb25
SHA10bd0f7b8bf42a81d4ad8914ec20cd97ae23460f4
SHA2568cec70b33e24191e6757dce2979210db84d710b0b79849e2343303ebeb823aea
SHA51234d5a5955ad98cb1b5c7762ac6eee07a2efbd1aa3e93511107e167010b065ff0485c317626e0d3dabc549c3c3dd9cec533c5beb203ca08cc05c92497dccd0cb8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b