Analysis
-
max time kernel
70s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:28
Static task
static1
Behavioral task
behavioral1
Sample
ea803327cf8977691bd5c62b0040d00d_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ea803327cf8977691bd5c62b0040d00d_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
ea803327cf8977691bd5c62b0040d00d_JaffaCakes118.html
-
Size
8KB
-
MD5
ea803327cf8977691bd5c62b0040d00d
-
SHA1
f21455863e0be00c21116519900e1104be58582c
-
SHA256
2eb5d02e0d5ea74d9a6bd4febd2956daf5efb100c14b651a2c18995e043160b7
-
SHA512
fed6f04ce8d901dee34a44bcc6c81da5b96edfd4625c3cf35876af07e116bd80f3a79088bda89932ff75252bc22c21571dbf58578f86cb03ccdaa009df28aa13
-
SSDEEP
96:efVOdZ1976lYRt2UW/i3cc3z0Qt/XhnMF81+R/5l/6VwS:efA/gYRBwi93YW/XuF81Q/5l/62S
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432878389" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{428AC421-7637-11EF-9B6B-D681211CE335} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000001895469c6ae154bd8d393298139bed4ee48826a7eaabebe8c7829110bba4fb2e000000000e8000000002000020000000d19bff83f4c6125471df967c73a2303ab854ea9d2c22281556e382b085642b8c20000000e99f15332d1c41419ef4c59eb218d37e339ef02c9a603a7f472bbe476d882a3d400000001984137f4e064632cecadf4495c5014abf663f5f78ab8024078d1a16a99b8ff74bd05ea12c15c53d81fdfda95ac6d418ac8dff5a8dfc37101fa56c51033ca062 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0d62d19440adb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2552 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2552 iexplore.exe 2552 iexplore.exe 1556 IEXPLORE.EXE 1556 IEXPLORE.EXE 1556 IEXPLORE.EXE 1556 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 1556 2552 iexplore.exe 29 PID 2552 wrote to memory of 1556 2552 iexplore.exe 29 PID 2552 wrote to memory of 1556 2552 iexplore.exe 29 PID 2552 wrote to memory of 1556 2552 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea803327cf8977691bd5c62b0040d00d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD57147260d772fd58ce28ecc2ef6e2a3ae
SHA16df114c931bcfad63b409b0114d05314370ada23
SHA256aae835b06ace19e453d161c96ec432acc947e56a1823d3bab5939152e2fe0867
SHA512887948202536842707d8b60482e1c3ec92b75b15d671344507a0e11760f3d3fe75455896fdf6bd436ec1ef8ad7d2b60b84246f85bd62fbb52bacb4365788064a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd7ecbf9fa693f9d8a70fba217b6e531
SHA1ac892c1a90e5b1e892b878f5fd7dea93c69be4d3
SHA256e6844777f5455c6e861440143c2aec64a8a0cad455b8aa609db3f672f619cb35
SHA51294fe436639c0fe609f164b9175189c2781c9ec4ef213dc7c09ffb089aa35b73cc61610fd87ea895a9124d8b8b41fccf9320dec41ce7947a5a8ea1f89632607a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521313186ab2a8b3865bb5fda5e4fb346
SHA1a88097f7fe7186182c1ddb2da318c75a91f81b3d
SHA256ed244512e4a76006d593b826318b7ec91d3f1c039128536755088e822236ac82
SHA512c417ec0bb77ac838b789eb995ade42f9335d0fb66d7f13f03215b19bc2be85490535e2e4402c2d156db5721feec054442927a830aaa21885bad27d0288e7412a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e991019eb2c03f44091d6d7b03a889e
SHA1d431121485549ee587710fe81bf819989b459062
SHA2569b061858dea5a5f39e82204d334997165b88044556fab0022280680e66741e38
SHA512f392a006b33cac2e249aac2b270c8a1d3c0135a3bc0c24dbf8d28496beb370444b7ced2332aa8edd6014677778a8fb8446bbbbe76acce3f5a7797fa7b8e1f135
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9627365ffe0898db6b6f7933ea1bd21
SHA13410e4d8aa01bea594aef53774015a22b9fba673
SHA256efac9c97463e8abea3129d2b4c4870f5cd437fe1a1462488552cbcce8308150a
SHA51215045f955ed31eb9c164d13400b108e6f168a199c72ca6a5d2ba43b534d0e0db6edf50e477dc33b4e959ae9eae0a8c4ebe5bc346ce1de9b53fa293bfef8c9c78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f54ecc08bde195eefccbae3ab93b5ced
SHA1331a69e0806fff56e8a10ab06ad43d3416c9ab02
SHA256afad2cca83342b1319a7f838800f84f19267c7dd7475fa15f0f7e0feeb18c6d2
SHA512abaf85cbbcfd126b8ae3422fe93f76018778b5f75edc9de2d548493e8f10c72455f30e7870331f8d429ada4ee6c308705d19779825f4fbf2ed3cb57dd9f28b72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4132cd4b8a9be7a2acacbd05ded5506
SHA1a07d3f5cec3e3399932a96cb9aeb0dc169f0a557
SHA2566750770e46d572d3dd16dc98425e0e2ebcd1bf31432d1dab17ad34400707f806
SHA5123ba4a496908460607835397ae7b9892f44d2be2562b822bf2a100e855c86a7860dcbae4338d02b7e7f67fe394cfc17460afc0a8e9a378a12a3593260d3442efe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f39b12762634a39316b0a71112bc4ca1
SHA1dc262b27343b86639022121e50d9445f5868b530
SHA2563ba68839a2e333158d51b05ba3c8aefe244c2016a2961ff8c249facd87f58ec0
SHA512e8f3735fc7ed19cac1ebe3d9191cae0a896eb21b711dabf071a76dd0090fa08156e33147f18cc9f1bc0bc7f7155d7c2fd5f17b09034ba6569f6818efebf9e37d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511797a54f53cace8255bd96843ca26ac
SHA15c03191d4b9419310045fd994cd6c3dff871540f
SHA256202ef13f80418ad237959ad70a28b4fbf65c265ae1305c60e6aa6af5caff5953
SHA512cf413327992e67b181b727362c1c96e627b01c1044a5d3c1ea4c8f4d8e93b6b625522b70be4dcaf8c3915bb6482ce65e389dd2514c7fca31bd50fd0b339b7063
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abb5c249e91e04cf42a5c45d92ee61bc
SHA17e0accc09e7465a9927f1513b7b00e7380eac22d
SHA2567eee04c71fb8a8e9e7f595297a40fa5d003ee1c850ef0db4dbafa9e84e85f785
SHA5120d25c2d14688752f68dbc56a1e90423cf8f2cb08c12cd7a4f88451028b0c75ca70eef05421caa0825e703151169536e18c3b2e9d41371b148312a395ec485a25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0d093e736f29d973edebd5cb9cde6aa
SHA18ff04b8224b1da412aa4c017101c39b6c06a1f0c
SHA25673037167d7933ea7c98fc394bdba91ad549cc76e49ed2c2c7b82f198a2dcde6b
SHA51218741553d84211e8fe404af2551340b81489badf95012c5b9d727ca2aa76468b3cbc5bd9d647f4b51bb29ea80147bbc726bb6f3e274f87e674ede0286464fb50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52809b205b95cf290f7c948f8224c0d4c
SHA1749a4591bc9f865c3f6239f078b8bc4db33d3589
SHA25604598bcdb2bf176bd47e6161130aa251d4716575b3c55e0a7772cfddef2b7e55
SHA512cf59561699c0fd29f489f6990d576c665a347c33f1393c51f960902d7a34849f8b8beda918b2744c622c6cb1079412730c8030a984b4784a372aa1341ded7036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2280076f3b55774a8d2ef01683c5b2f
SHA1110dd6b2ad5eb7ee9855d2714f4678029f694ccc
SHA2566b319d949c80e84639b053b71977f64d807e669e36a3f1e03bfe67ccc79e9be8
SHA5120213c407c45e90f268264bb938531a310d0465557529f7b792209803fd1ca11051412f7c0b9fe14af36820de272f6585fe4671685ca6478427b0853c8e1446d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e55be7c65c0974d3400f24501deaaa07
SHA1a7bd05d3312801ee0a161fbc3f68c8108c9d9630
SHA256c3d9b4d7ffb1b684915c5b10a2543e5b829bcbe243ac6175a1c45c3f5af845c0
SHA5128c12805b9f320592019293497f9d26533df5790afb6d0cef922efe7d22e8906d3fb60845dde089f4eb6e7a420568411b81ad292051938f404cfc113779e0ca76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da411067ae851fcf0924f3b0ce026f92
SHA15d3f74c5195d651e259ea61ad9ec17713dc668d3
SHA256a6d9b86264905e6a66e65ebc4a24016c2cee646b4f1948f44bf2411e2957bc71
SHA51266bdc7611440646d1bb26fc9f9a30951bda814d2555afe7bf61d8ecd101c0dd8e6b5763a05d598cdbba5f1035523f161342aedad6c5c6ef231c654f77ab8be03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0249c920cb6390efdd88e69dda944fb
SHA139aa462ce98453b4f754611ef2b021c6aa57d31f
SHA2567852a11a18e69de1bcd419240cd0e22cea5eadc72920541702105a760e9fe17e
SHA5128c8f7fbbfe7cec07dbb9acb963492ee0530de41575c0c5ca75bac0e9067b0e1e0a459629265735b492e978a8a039ad40787cb0ff7695b809e8949483e82e2927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD52d4721f108e2db4ca56106966fee42db
SHA1cfb0d74b03a24915eaa41c821cc4820beb975a0a
SHA25658a54ecf9d56117bbf8ff29965ae60adb5eae0617762bac6b49572756a86335f
SHA51285e2f4b392a42ecd60a2036f011e9866a51db5c40987d90c00f3781c9f286394c967a4c9f450ebdf3b01278b9688da88189d238b107f307c5cf1c096f52b95bf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b