Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:38
Static task
static1
Behavioral task
behavioral1
Sample
ea83b7164214f57b79a0eb8739650a22_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea83b7164214f57b79a0eb8739650a22_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea83b7164214f57b79a0eb8739650a22_JaffaCakes118.html
-
Size
19KB
-
MD5
ea83b7164214f57b79a0eb8739650a22
-
SHA1
25b3c64978776de96127b8bf2bab8b0e8e093a34
-
SHA256
cfbd8cda9cbea42be2ce61dcef98822da4e95d193610fa6e245c5a054cfa01c6
-
SHA512
dfecb11877d93dcb34d3271aa11ee7fc0105811d7218dd8582af549386f6baa16f4060b7b97e4b2db3728c2a72d20250806b90c0d8ba15ac3d57877f2f0bc1a1
-
SSDEEP
384:S7aveqDO9ghnXXl0anaPaIlvROrCg0/AWVdxTd:SODDO9gxVdaiW3jB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e09bb583450adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432878994" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AD86EE11-7638-11EF-81C1-5EE01BAFE073} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000fbfd2b23f9d602b740b81e66a298961c2308ad82802c5119ad237e9c71f5970f000000000e80000000020000200000003e851f3f837f8e6d5f83c2d7a908a351f5af96ec59d23a994d728164ad69e8a42000000057ce7bd680ee255c79d2fd09f6f3d7434dc2591b672b5103c596705444fae50f400000003bc2844b457bb7a8e1a4ae1878bb4bed4156fca87090d861d0272d85b4b420122a55dff1df309c6735bc46b1554e77fbfc5c79529b468b8f4295a7720065e8ba iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 320 IEXPLORE.EXE 320 IEXPLORE.EXE 320 IEXPLORE.EXE 320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 320 2420 iexplore.exe 30 PID 2420 wrote to memory of 320 2420 iexplore.exe 30 PID 2420 wrote to memory of 320 2420 iexplore.exe 30 PID 2420 wrote to memory of 320 2420 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea83b7164214f57b79a0eb8739650a22_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513750a12023caaf0791f82271b2b149d
SHA1fda7d3ed3681015365b9d29b85a16ea284f3fa6e
SHA2561f5bf3227066ecaee4a6afc96eac87e98ead48e7b334fdc970234b4e042ebae6
SHA5123563e823a2db309bd282e77ad853060f6f8a90f3a7a548e839dbceac9e11b4ce62c5852b765c339c0fe290b77e7ded5a2f356fc627d9d077b735e7c5b1ea265c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b4219af9fc8720606b7d33daf63a7bf
SHA15832e453a6a580594858b7292ccc40f4af6d70dc
SHA25623e09f71f5ba534598b0be081f1cc6bb88d9aff2f821c3755358de38a59201a6
SHA51297fd51df6a424d1121d240eb7a045bce0f64846921b60f43084f99d172523a18adbab5cddbb304165b67ba04aa6fa6632a3348ba8cdfc284fe7e3ff13c6a513d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f666739fb26329a08fb3f86ab9a5327
SHA1384493916ab042281746f0636c9a2efec67cc979
SHA25625e60ca34ef0d1d6060b1061abaf29801e5d28cd421cdabea499fb7ed12b3ae8
SHA5123226986f0e4b54eafee4319f6be9f37cee588e70af78e6c1e16063d3543d7aa3dbbba9f6688fa5e329c9ab1581dd1624c950f63cdf14367ee3f9731212d0a683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d48d466300e2a90d01a4667f089c4b8
SHA1014270de80cdbba6f63b1559e01fa33fc425908e
SHA2561e8321ce5f0cd3bf7c3cfd0bea5c125076a6c8f6f4645300f80368510ceca5ad
SHA5126a893f4cf9ebe93a9d71b3e640229b732e9bb8f5e9fe26b7136c0998ad6042577ef1eac24e61a63d57872db5279df2a929a103c5a2712a0a83971d6752e5d7ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d91d7aaf22afdf8c81b51f7bfdaa5fc1
SHA11efa619eaa153d2d31f05a6083d9c77913bb57ef
SHA2567bb9bfa41ea18d741503a24281ddd1698d3d120f13b0386a4786fab4ecb87b75
SHA512e87eda85a9d6caebaaa1950e661722d8840e3b0be273fb8ab62e859ca55ec9db76dc501ae741e3d556c58a4752f61b7f00186bcce8cfe3bf5a9c38f223fb774c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4ad3c84abbb5dd75538647e3150d615
SHA140e9cd047586f86554cbe1927c6d9df5d0e75021
SHA256b90769b428ae5a7bedd5f83f6a5b8bc6adf17d5179161b088261accad270546a
SHA512813174c07724e46ffa228ec7082ec1d7c77bc3efe855323a06157cca5be9c864406516f16f47e8005150415185f1839beae6f8504a25e98c6b5c05976ce55ded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b924985de597f84b067512e5e307e70e
SHA1206828a8c01f99d71a626a409e92b7a1c135d3da
SHA25677a2c5362f2ec46160360591573a288ce76e029a78417189e98ceb947e2a78e4
SHA512ce8c635ab2210162c3e0bf4fc79069289f6c96ba83f381004c7d906b68da8c6aa72a6cffc5299fad8801f7cc58914cfaf2914da3fb8e7a0f0f92f01735755726
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50846551178ae2a71bc61274824c7add3
SHA1ac383f77e6c21044bae0cd14ca09c2a3f36bf2d3
SHA25608a1a422c6241bbf1376d8e07366717ea65536a831c111e0a1d342a69d6567e3
SHA5125db6f7a02f3fe330b702c32fda1f5d0555c8de3b5882ed0a848498cad1ac83a7577fa157480ce8190557c605498554693aecc2a2db1a180dcce4313570aac92a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5348efbe7d8bc5601717c0cce83f40f6b
SHA152cdfdf1e4e3ea2de0d7cede85578af5619504b8
SHA256114d0ccaa776762cc12f0f774ba77682c6584a0015cfcf2714e0aa830e028c91
SHA512f1d770184f8bbf6d3bf763a7b0351f65adf99b69ae0e35f27413473337a9451e3bc126fad392136d0b894fa86e3163e02f0456a5373bec567614a4904a06522e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ee644d06b33c9cb80405dc274316f6a
SHA167e684fc54eb38c10d08a95395452eee486b752a
SHA256a7d7e5b4fc0147a99228408d93eecbe2dce3d55ac8d5bf8719011b72da999c76
SHA5120e65b958822de4080f4b20a332b1ec828c3158c59f2840a77f8a7d76d9019fc6ef0c56cf823331dff65233353d3f9d876e60225d25f8ba536a73dd773ea252cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d363d3479ca88f7baa0870e2b177ab7
SHA1d875a8e553a8ebb2d49b06a25acf7559959c9d68
SHA25604d198c85fda4a46787ceb9b49cee841ee72b0683441d210ed6716f4e1b464b3
SHA5126ff3e24fd99f3abf007211c25791e09c90d26decaa93569759138fb0f35e025cf1dc719005be105c77acfb244fb8bfbe25d609c414f66d6e5bbfff28feb29b0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e66df4c5d882920ef627d4ecf7f62a7d
SHA155cd0e3d6931807001ace83e5775b1cac84e82ea
SHA256ef892e8ed0b11c9d3d3c08780239d63135a661df37816a68703c83b3d28a6bae
SHA512fcaa96d0bd07f6c0f6ebc11b0520aeef140616f7b532da6c1167159946b50708f3b0bdd8cdecb7a99280effff12429255ec808868b43b63f8b448901ac590262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5381fce7df4681616fb7223d4692c5dd4
SHA12c1fba44198e3ca84c0ba16d0a774122cea12a12
SHA25686c7fcf46c8fa151704c62e85ae6df59524756a6d5535c39e97f54c7f2b924a6
SHA5125b31ba010a0e28f3fa8fddab45ef705c13125f469e05a8bcac6bc6b2ba56fb59a99824d382a493d5391342c3a0c27d0c73a770503b694a8cfcbf5419ea136dc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edd225b9d6e5c8fcf3fb2f37bae003b4
SHA1418cde6adaa05d2ecdb8bf7fa73cb33b66679ffa
SHA2569e94115b4e1d9971a58fc0f1aff6208a53aaa541b4380f8e3f43caff46e6d804
SHA5121d2065cdd8aaa43ad20d7ee47b92de9a02273141b95c88ca2fa327296c124f6a2548c8984a469acffe2d58c65ac63871a04753653f10dff69e00d16db561972c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff839b4dfc8133405653732fd56cdf14
SHA166c7815b6aa0db9969472ef620613b984c342e30
SHA25643385583afe8e913f41c7b4b1a3eff61b35b0aaec75fee4db1b449fad0a5e830
SHA5125d494eaeaec33bd91da6dda362cc2be3b53499a4719651bad41507a0adcefb4dae4bcf0e4269e851ea543ff573149505e7d140e031b9e7e558587025966326ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528c4770d8aa41db33df5c02e22e294a4
SHA189997a9293e03d13c267af1e7110fe49e696dfb0
SHA2567d53dc7bfdfff26fc53821bce87f24e1a7338b47da80652e709446b5bdee566f
SHA5120af73fc751a0a8fa28f94bc86966e85b75ecd5032684bd457a977a47e9285356b84caa0e85f9a3105050951f3b94c50ee04c226b14f07353601df32bd5d74e61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b19e294a81423f4ee3b6dbb25aec8565
SHA1d828025f913912705f1c8cc39211254150ddab4c
SHA2562e9cc9de7ed6fa8d1f906225f9d8459a9ec3f2e160a45dfb509b8a4530ddd47a
SHA512950ca979bb46512e9a34c756e3cc254371efca98b7257599c9035ea1d55e102bfee19c71f986fa50e515f442e116984fb4da8c6c076a0adcdaf528d4e60b1386
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f3a6a3f6fe020f46350ff611f017cd4
SHA1b9b4adf2665be6b4f1c7541317348e13dab895d0
SHA2562f60e145fcf48c2d40db96175cf3a596f435611d5425bd4d683b4b12aec86b6f
SHA512d15b513c52782178c0f16cd269acf91408e0b49654f6dfdc1133c70f560f6d4c7145932f91f75514fef4db240bd424fc33d7812adad448a01ebe275a38bfb6cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55230dc43c6daa3549772c52fe59cfba8
SHA10965baacf6d72f07593c28cb27e9d7784b415ac8
SHA2562969f15b45bf541f36ad6f7d96dfba1a17136871679766bf159cb7cf09dbdba1
SHA512c758dcd87e5cd67b31f7a7fd2a366937a49086f9b720194891cb2984092682bb53d6b69b47845bfec5f1ed82bfcd846753321c5bb5f3f6ee39909fa3b223df15
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b