Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 02:00
Static task
static1
Behavioral task
behavioral1
Sample
ea62a914245e453621e6fe314a6ca715_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea62a914245e453621e6fe314a6ca715_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea62a914245e453621e6fe314a6ca715_JaffaCakes118.html
-
Size
63KB
-
MD5
ea62a914245e453621e6fe314a6ca715
-
SHA1
50fadded75c5054fe4fb756a96d3ff2bde848777
-
SHA256
124416ca21904a7f742a63594da12902469b11e56ccf775285fcdf080e12ef51
-
SHA512
9b941a6facdcc8909824adf1d2c6f459a1480995e1024c1f507e755d255f69554abb1f41be9da8afeb3b85bf36b3f8dc916c22c8785f766a6b397742de95fb56
-
SSDEEP
768:JirEgcMiz3sI2PDDZf0glJj6lroTykyCZkoTnMdtbBnfBgN8/oi2c8QFVGys//I+:J8HTTFec0tbrgaMc7NndC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000522896664c49a46e8e98517d4c0c43418a62ab03b72b38ffb42d5af50d7fbd92000000000e8000000002000020000000b17fc6195c3242473c086267876d0a409b53de0c19defd21df228a4dcd63193f20000000630d02184cf7df0d6160e81555deb41884ee0d8df85d588625180e3a23b49040400000001c8d2617c0586350b63b8f2b4c4bb3ad2e6c319ca742c3fb700dee8f25a9d109bed6747dadacf95b29366d69fcd6261f634eec2c75f81458540f69972c214faa iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432873124" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 700054d6370adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{00D52A41-762B-11EF-80EF-5A85C185DB3E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 584 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 584 iexplore.exe 584 iexplore.exe 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 584 wrote to memory of 2140 584 iexplore.exe 30 PID 584 wrote to memory of 2140 584 iexplore.exe 30 PID 584 wrote to memory of 2140 584 iexplore.exe 30 PID 584 wrote to memory of 2140 584 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea62a914245e453621e6fe314a6ca715_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:584 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baa80641cf5d6468ac04893e20c76c6e
SHA11d5dbcf79612d24a77d44021d54c42ac34ca8a6c
SHA2568852f7acad73904c348bfe4bef29a097ff2b64fc012d6abe83728d469d2688d9
SHA512ea8b6e2d75265d6976da48df13383eb14bb6fc658a266754204a96f787cf0ec23b772462a7d412e5b27dc5354aadce3841e9e99ec8fbd0ba95fb68100ce83252
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507c9cd6a2059f05aaec876eb695d5fee
SHA14ae8891dadf39f858b333ce824c929bf6f72f087
SHA2563d3f8e278c94d98c00ed2188ea6a46ff077f55aa200267415bcd9adc0022f1bb
SHA5128f0d0d114533dbe6bc80646b0b483af6bb7d5dd07b6cd05f66c1f1bbb8b938319b1cd2c8162a6917cb89de9e79dbf1acf5d0d37cc5af1d03330eb9552fef3d6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543dabd142dab47ae9943cfdb51db8271
SHA15e8f169d4eabf51fd275ddae90dc15663d33b318
SHA2560cba77b11d6993c1983c1bdec05f58d18edbcb263d73cf921abd008c1f578880
SHA512083669623bea43ea6130228b17984020fdbf715025ff3a0bd990e4379e5ffc224a8155a62d2b33f6f7abbd9c2f1af52518e82ea013fc0d0408b4bf9f3878f875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5133868a45220998d38f3d8f8a54508ca
SHA196593d3c02350e5a550a2d9814c31ed2ecd9a1ca
SHA25645d673ee4c1813e6eda44b34c4d44354b858a33f497c7ce019a7c66199a68d54
SHA51254af5ea2a120f430db0fada4feb25787d83cc0b697ec1882edfebc3a43db12e92af6a2f0a22e11cd4d129d3abaca8ff464e324f678f661c6434b05a9b9473671
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1932fbc7a3a52cdb998b066c3d3a423
SHA1e4fcb6889cc4294ab48dec3d91cfe010b4710b88
SHA2568355f3ea7122b4b2d7869fa8ad2579e78bbcc3f54af2003c0f56d046fc6c40bf
SHA512942edc6997c23c5416c493761fdc6d34b8f05cc9e34f5f2ddfdfc2f55458a450162bfd710cec103aa1c74a68ff2ca7fb644a4e722287b54e3354c5826bb38020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527fad53d014fa3754befbb0ab5f59426
SHA1d31a782b970b0a9bcf893c0da84b86e9e21fd249
SHA256db12e702cf16c2da87ab9d320fe29f60b8ecfed39c27f32ee18fafd7ffd3525c
SHA5124ba53b3251e68b5f524f7cbcfe9a78370791a80f5a7fd0d18077d425b0c05965786edabee05d3ec04e7ee54b4a84d85fbb68e76366a31d4d855fb30c404e9c47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598894cea92054b22da523618e4e1ebc8
SHA1fa8ea2a89a46ce27443e4a4422b161f3d492e102
SHA2565d5d9a94a3733cc8f88ce74a889176cc076eb5afef93734338e082c832fdae37
SHA5123b960205f524e66db19856648f38f4250958f9819370fbfc239afb5b8bd3d8321c00a76ddad48b6c716a4002bcc8d6ed2d94259e39a4852eed0f817e9b2fa2ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aff91afc1f9ef38aa3a2ef186bc1005d
SHA14ed4f08f79a1561eb2ce8b06332d280ebc5093bd
SHA256c6f95789b7f1a4d576c52c83e7843c62c26a4c38e320453ceabbac15f69f30c3
SHA51245c7e37489766724a676e16f4bec4e26bad75e2fe16806a3e8bff9d8de887912f33713af5cde582ce3a750bf3eab5593a265b813b89adb1fc978427b8cb5d5d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520dca6944d6a080faeac3cbef05b7e64
SHA165ed112ada181f69be3039bfe14c161b64536d34
SHA25641076f59fad45150f2e14f6107fd6910a4d3f74d4a52c207a74a5adceee7af6b
SHA512d4847f8721fd1c210b0f038ae6a9697d100aca81b96fd393efbab098a690c6a44b5b8ff5ae8857960693fc4af5ff5abd5ebe134b3a1965f51285a7941599dee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ceede2458b192ee27c6b43a0646aa08
SHA177caca32a4dd6dcd8eba355ce39bfc4dbee84490
SHA2566ef6a16a4fc6ec6140c5f85500560bc7104cfc49e795783b231a370823d8ff21
SHA512e5e2741d4d464767ef12b62774f1710611113274e369793e17074893c5eee602c0c92a895cdecb08c8b47ca68974ca9a52e08c3568301a8cbb36b0438262eca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ac635cdc12e332bc098bb96950630ad
SHA112b00b36dc0f40b0afd53674000b5532043ac232
SHA256a08f4febc34eb44adb13f370e9eb4508d019a3b4dcfc3ff8fba96cb4c0968cb5
SHA5122fc47162f98f08a7b3de44c310bfc8a035149b41f7b41a759eed077f021dab26d6f2b1359de438afd4918c6da55e40542275b1f43aef6f495f9571cf20ae7cfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545b596c20e2226472ac2c5fe0d126d25
SHA13dacd0631a800946371499371136c699345026b6
SHA256017a5c12088e604bacd8a5e0943d57944fb81ebee54d68ee8c7c02b112c6b836
SHA512c4c666d8de03a710fb950b2df6330d2b1b5884c79241c0f3dddceb4ccaf9e24e56c19fa1582c7d3eff7a8cec610c60a18d79ae2de643b7a8625908f727ab0a74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3cc8135bea574828a50105d9babf74b
SHA112368866caf096fb6283e7a1deec15ecc7d514d2
SHA256d61b1e92176eb398fb34cc5b7fd0f3dc160c901b3c27d5bb10cbc8fd10164565
SHA512f128ef20dc69e96e6d26b05c6b8762e8a1f9dd769e367d32877570183f941416d806562309ccce0e3f96df45ef3eb2f83c7138e4dcc4011e0824597f0e3a3dee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d141bb1afa1de190e447f4833b72311
SHA1989967140023cdae501efe5795d267ca28dae025
SHA256c2ec7c5163aaeb67bb0cf549cd271e120557e88378355516e735fb99a37c4f13
SHA512f92ad45df6187301628e692be6d21754e702ef416db37de972e8d71426bf8005d49c3aecb8333a132b100b46da3ebc3f5032d5207a346d233936ad0114005c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535203aa9ca7357a2152410bb304b88fc
SHA18e18ffb325d539ed920b26f528d2408d14f058a0
SHA256ed30e3cad290d602151c1bd481b87b5b0f5a2dc55d9a8678d52454d24fd3fd61
SHA512a361f7215a7d5f9298723679ae4d3923c7d4bfc7425a5f6ebf4cd224a55cd49389f79a1af76ff437918638e9a6e310e4bc637969e4b948d88b933835887026d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d89e7e19dceccbcd792c3f68095cba1
SHA1897c7ca8434ca19944c037a832153cba96a5e7b4
SHA2561d6d538563fdb7ec8a777466332fd9acae6cabfb82e383df52389c371a37a195
SHA5122995f8e348a32f5f07359e8d660f40fa5902a7163e9b7419fab7a0d417b34e4160e03e6c1f8315df1c8e26f98ee69f3accc2c12d47ac1850f002c2653e7061ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5560c8981cff2d5f9c69b1d3d0b99b67f
SHA1120a2ede87eb5ab64bbd24449489bd80cf30236d
SHA2561b9530cccac1387b273cda34524333414143beafbeeeaccbf177819769c7a98e
SHA512d959a25fbf4802f37cce4388591d5f0b21f702917cd1763721c5994b29463bbbedc2b34080870c56160a4b8f3f9bf97eb1c52b5e8557a09182e3a25811fca63d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea8a31bf3684ca3acd482795e56e97a4
SHA1a18b79cb8407253be3ccd44bfa87d7179378fc57
SHA25693c66f9f7fc4e9669cf578321b77cc84457d2bb6dedafc120981e4e7a052d33b
SHA5120e4057a566ec4222a607823ae4e2fe8c86622eda7c3592417a9396189a40c133c9abac3d3d805e9d02a6397ac65ca3f93cba0054597686ed2c5e2e2e7706f476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0a87054ff36fd8711f4c0c279756717
SHA1c1e3ac1fce16b16d5fafed4eeebbbb1f784c86f7
SHA2560eaa487586b66a184a2bea49a446059737edf701091751ebf4ed5982b8ebac94
SHA512b4e6f5b0a2f4cbfceac33313d75991b52089c97724d7266d0346677ad7f9c9f010310e5dd88858bb5a9319e7ad8321021655713a5c33a71541c37c4f0e41d46d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b