Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:36
Static task
static1
Behavioral task
behavioral1
Sample
ea82f7b12168327a3661a667d55a217f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea82f7b12168327a3661a667d55a217f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea82f7b12168327a3661a667d55a217f_JaffaCakes118.html
-
Size
461KB
-
MD5
ea82f7b12168327a3661a667d55a217f
-
SHA1
5aa6694c549198ae3af05092722030ecb4ca67c6
-
SHA256
e94b8edbdb2eb5b55fda4b311dd8a7095efc2f0d31a2ae56e00665a237d60a6c
-
SHA512
851b2ccdc5ccc279eab7e8633ba9a82fb1c3fdd6db3bdca7f95d8402cfe9a2fba5b4567306a3cf58f5a85abb0b73b384812afff63682f5ac77237f94d9e84e19
-
SSDEEP
6144:SnsMYod+X3oI+Y97sMYod+X3oI+YosMYod+X3oI+YLsMYod+X3oI+YQ:E5d+X3H5d+X3k5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000a0c942d0282d2e2383c5e078993a459c1722e29946b83dc6a5f0df59619b2b74000000000e8000000002000020000000bad2dfc78cd50520f95d67ffe0a7e543fce4b27755b2922e143e315784866d842000000010884748fe3f466c245f23d861655a5db565dbe6e03175a358929a78c276c1a040000000c8ac686d990f8a887beb80fbc39ca0f492569a12ea7d50402940e6794f0cbef23f82c74f92fd416aa9e46192d0206bc21c4faa2497000463fc6803de599b42b3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{584CEFD1-7638-11EF-B2D5-C6DA928D33CD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 006bdd30450adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432878851" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2696 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2696 iexplore.exe 2696 iexplore.exe 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE 2676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2676 2696 iexplore.exe 30 PID 2696 wrote to memory of 2676 2696 iexplore.exe 30 PID 2696 wrote to memory of 2676 2696 iexplore.exe 30 PID 2696 wrote to memory of 2676 2696 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea82f7b12168327a3661a667d55a217f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2696 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccc618cccc86fde026023aabbaac98ab
SHA12d4c1f82e81c5b56b281424482e09a357334c0de
SHA2569a5c3ed9374f2f1595cdbe62194b5bdad287aa77f829b752fc5ba94e2ca127a9
SHA5120853d213ff796d0e6757657fe2bfdb37914f712e344344587a99fe900d2801d678cc45887eced05b846ce0cf02cc56c8a39005d110c84ae856fcd14edd4c0c7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b8936804b2982eca248f3c5eb6f9784
SHA178b23db7bfc96aeabeed60a8f6c91aa9ff8aa7ad
SHA256e13b70ba593e8882146918dcad7b23b3a259f8c001d220903c60082026a2ffe1
SHA512cf69103249700bd29e378f364f1ced40b8328d191157a0e1a70e6717a70a0e96d5093a21a6a16a0bd054f16369518f4467af953f902440a9adafd204c040106f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57798bbb69dcccaa8ecbbc075201141b3
SHA1e925c5e3652b96ebc10113d14d58701892ffa6cd
SHA256fdf4c98d329e8dbdbdc42b14d7219acb3367c23459c92781b6f540a137647ade
SHA512f8f1aae74c2a9c76ae6d14fafa92b93ce2a7c73aba87966d61da3ae227be3715bc76da30f71ab4cbc6baf51f008c6e495e31dcd36ae599e79bf43f0dfb347764
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503a65c8759a17d3c6198d5a82b9c533b
SHA16c0895d33d2d94490dc42c78f4ce0086648b6989
SHA256904afa958094ba39e3d3487781f0d754c2eaa5b910a8c8f589ff84b4a5588188
SHA512611b25afb14024d9fdc20e5308da60a8f80e0582a7901f1db0e7c0e4720c197bfaf085c8c32fb19fb8957905d8940762e8ebe90c7bafdd7127c99e03a9df366f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bce6bd8838d56082054476f2432448d
SHA15f577b25e18221aaa01e8e6f52950b26680716ab
SHA2568ca4b5b4d86e406eb83f4f7d7c6b0a151a44d4c92c61248c96ec48f062ab32af
SHA512e0c803f09c91a87d6b0e583869ca0c03b8d6d4748a0d91ae3b02d434ffe9717d9a097f7d55c0a980b0a792d67e4ea0414601f41029484b9b3dc119898fd3c6ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d8d22e7e8e9afc7f0540fcbdc62ec45
SHA1f2f6d787a79ec84cdfc96b8cd6f7168b67c8d9b3
SHA25699b97af46e9dba2d2be477b5007da2efb46d6d3893d380d3d133234728c7cf5b
SHA51299e636f268ef4b7e4f81e3e3ac891f7c73884852fb1b6ca39771128eaaa16d0a84ea7d02bd696ce2cb019fd9b94f9ffd3d48db1dfc11fdf16d041cae09270098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576142ffafbb99266ce05d078d5f74c88
SHA157ed078d8bca28e424216cd8c2d6a3e9c9702646
SHA2564b0809897282b68ac5a6ade10216dd386250eb7027dd459bfbeae90356893981
SHA512974e41797ae2439494bc41f9bf8fc84734dac7a243f0a98bf2f93c55583d0011d84f9588102644979f2f52dbcd55ebe9f90ee7e9b38c3cb811557be1151348c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c061208e31a1f41485e16dcc3fcd92c
SHA1f26c1b630c01fff5b0403a737288a7f02ca6dbce
SHA256b06a9f7096c463e7ceedb87483c62a2d2a18be93b12cb06c9cad122c96d1c3c3
SHA512a6530559c1bdde9df00a009621d39a4239bf10ba5504e3df7e421171a10b79498f6123c3a182d215f4f37704b39df0c7526f894ed471ea498e5d83fb0f1d0f10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513430a7d1a856aed948d676ec8fcf578
SHA1e3ead08c23dfd43e6290f5894f17c3aa5dae5552
SHA256001e15334ba9be054b863063a103f8f637d57cb984bb17290938b49250e53725
SHA512d670b2228411f37f5dd446885a4bc6d57dde51be5c18d42df3553788d7a77714c12107f3ba931c8ce780f69a0a674257749c9b2506bb636eae8af933a44eae18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58975b34aa61b5a25450dc2d96509a727
SHA117983194acc1fef55bd7e893dc62ea4d1dcb045f
SHA256271bc1bef06b1bb676b5d026079254c8cbc5e73757d8f4f44d75142c1255a3d3
SHA512937d745e9a797b3b1f2751edc75cedf3a1e5b6823d714c0cb8c7e77d80b938acc8a48c2ff58f78491a2faff7f442c4f5f5954236821079ee088d42f8574032ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3ddb32334122b46e30be4f0d0a0fdd7
SHA132e8093e20494fdf2f12fd228edf61ae3ed92ce3
SHA256f8795125c435b385ba91b4d078d8ae0236689ec54e4dd0b7fa5742eba0156f9f
SHA512433b7c88b36cb70b52a5e0fea20b01741eb3780b436ca853a391231799cea8d5ee16918a8241782c2137a08173bd4021bcc22a3c7397a300eb31afe52f952ef6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9ac4d567ed090611476f9f22d58faae
SHA1e2a163199409662328c4c7ceacb0fd492d0faaf7
SHA25677fe7c59048883fd0faef7e63d2282121408b416dd389d0cbdb3038cf4fff1ad
SHA512a0562ee10d48346b68a6dbd5d31f5dc30b6f22e8649047dcceacacbb167da31fb2bb8ed501c0ce1ed971d5fa933f90b1904874403b1711c7317361d794e0cb22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5889119bea632f9493c4648fb8bfdc9b5
SHA1047f7a62ac310d3b447047c89cc5754095691535
SHA25635f9e8b8fc17654941be1732839c9c6825a645a295b6b722179447768adcc1ad
SHA51241f8274e1bb218826e7338f874588b39357a32c23778e014e58dbbdd2fbe35969ff00bb606ec29207410a2d82d97fc5c2cc8c7a6da633d8d71f398cb0a0b4692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbb44dc754d90218777414dda97f3438
SHA18a24713e6659bd0d7fdc6f30e4fb3e42422201b9
SHA256cf2ecec9bb9d49f77f2e5606918fa812d28f15215f66da4c1f6b9015a2fa373b
SHA51213ab9c8eb9cb2395eee659b24b84837ec4dd4d3d1131baebc69fbace28cf2d27f3b6008fedae42a2e089dcb57ac089a57616bf6e7048ac94e0bb0624a549420e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e57f9526d1727bae1c093647f14b64f
SHA17129b34e3b0e9bf3ac6518f8f8dd22ea76b45258
SHA256ceb4ff2967c5d3d9f30e758c56e7ccbba11a0a47d3759583e5c3f12ec28b57f0
SHA512404fe90f708c9486c7a2b9f6466620e94f598d8e79d3b4ffb321f0800928edff9fb3aa3191f5ed0c7f3a5889415028898541b2e1acbe40f4b423972e790bdeb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dad9b27969b9b12e75cd44ffc61660a
SHA19d01105b716847f057320c453460f4c0bc2d9494
SHA2565b06fd7d82a422d4226d482a7f4872c6bb008e7e3f39e4d2e9f1995988de650e
SHA512eb43545554ec68b093ce63afafc0c80b5f2d158cb6995a64d320350d7a6e49d26f1828c727d220246b5bc9e95d2b4720844fa5707130eb6036d44d694dcdb137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579595715ed6bb0e75b0396a488ccd46a
SHA16cfef68c266c8467d91ef235e4fa6032efac2833
SHA256b3a0273d11faa70fe1af8f624955e3491061c174c6e44ea770fca6517a8513cb
SHA51270eaee8f5566ff4c6ac1a17f07e07643dbcf3befd90a4b9cc42e0894fe8294c84ba85dfbbaf5bfa41e139ca70617025b61b6a521d048246e84dc39da16edc1b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58846e5bc72e86c85f478e9b98282f07a
SHA101fcbbfc04dfb2eafad87ba83bc7d59ca31cc6c1
SHA2569449d5af92b5f7411d6385c5f1fc1497ca11ee7a7ee53ec17843a1e9ffdeb970
SHA512514a053e05455e1839e26a5bb321b619c828bb1fbfd05156bf982726dbcf58030320e3fb90aa3c537d2026835d685f83ef508a96296499abc3a9007d57324c66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53159e06ce71c5da907878fe20a336822
SHA17e00d9f04d54f0503e7d64d15ea7e2f6bfe4be07
SHA256301abb47db9a27e5b4643b80ce84eb976539607b8ab1e2129fabb177b40bd895
SHA51284f25451286b82c4e6ecddc268cb9fc6bacfca786499b9bd89502880e165835ff545d524b744ebdf7756190c13debc07ef611324e86164ad016e6ffba798e678
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b