Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:39
Static task
static1
Behavioral task
behavioral1
Sample
ea842ff06350f6174ffc50479db939a9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea842ff06350f6174ffc50479db939a9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea842ff06350f6174ffc50479db939a9_JaffaCakes118.html
-
Size
460KB
-
MD5
ea842ff06350f6174ffc50479db939a9
-
SHA1
27f4316b2b3aefe8abee9a987d6ee5a948eb080c
-
SHA256
40a955c240f78a18ff7f12b635d0a7fa24b06332b644ee217c484594b86e5fde
-
SHA512
4c5f22b721ddace0cd870d1cb691a228d56a1eb94686a491f28c976d116a0688a88965e342750a4e7e0b37c47fc51664f7c4fd8eeabe2f57fb3b1900319e954a
-
SSDEEP
6144:SOsMYod+X3oI+YwzQJQ6sMYod+X3oI+YbsMYod+X3oI+YLsMYod+X3oI+YQ:h5d+X3q05d+X3N5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000924e73c6486ae3113b22a945eb7f40873aaea410c354590823cab25305c31f71000000000e80000000020000200000001848781d720495cf5aab6ec1f44ba28a0bd58f714c02cc9b6767612db81860d320000000ad7b8519f1b4443586cdc6554793f361c8937693e72f8319d206b12a7ef05b0d40000000093c99a7eb651cb167e266662686103efaa6db426ce3b59f336ec02b25a7c8b6976cafff027402d81ba3130ddd318581392502b4e461c179d496bb0d9bb89b0d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CC8299E1-7638-11EF-96BC-7694D31B45CA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10390da5450adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432879046" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2676 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2676 iexplore.exe 2676 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2816 2676 iexplore.exe 30 PID 2676 wrote to memory of 2816 2676 iexplore.exe 30 PID 2676 wrote to memory of 2816 2676 iexplore.exe 30 PID 2676 wrote to memory of 2816 2676 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea842ff06350f6174ffc50479db939a9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2676 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5617557e6dfb8035d4a09928a0674a5d0
SHA18c7c3bbb07f7add29e2c31608ef172b4c255eb38
SHA256e09a18e4b4d32b99e2db6c72b51062513df518b3896b31313c0c5b96e621bae0
SHA512c81c07a2f8e118bd744a374c3744d453c0fe79e5c8c81157d807d519c853cd1ea2b03aad5c608342d5c98b8a82768f4cc1220ce8c74fe2e6345ba66d91368ce2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e164bc0899c82c54175a9dea052f5164
SHA11b5da4a28b1ebbf4172b9678e1aae6a4ffe8a29c
SHA25626c23b753f0484910cd4e92ef0e0cfc703ba02a1e3b91a3c2bdcb63540c0026f
SHA512f8eef147e1079a69c0652984aee4850a2213a1f4654fd3721b1e4dad79acf1b2be4ca9fc9ad2bbf3f846c307735d6674797375d72aa26b681bbad5a3054e110c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c33488905fd4751f62507fa29b01507
SHA118fc79669df2c5320537ccc3fe26ede245277503
SHA2566469f6627b99661dce80d6611b31c7efdb2b644b7218176bdd2a7208421710e2
SHA512e4c374fa1db493ae2d2da25491ed8418e1bd1e741ae7e838a1b2fb28aaef096c680117350fc745250e0324fcb67f6daede64d65eaea5af4da5264e7d986383e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5895cb412f19cbbc1177eac696b100130
SHA120bb8461691f2ec0225fb08e0445e361f152304f
SHA256e118b89c630b79a90184697232394f20f18224a4195feff8fea248e6d997ea60
SHA51294182d53dfb48a12fd9af79f8aa76e09a548d5184ddf15b5386ec9776f91a4cc8ce192edf771dce9d305477887ed223027f15dd3f1166090d77d8be6ee43cfc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e4b2c0a23298b3fb031c725770bd3a4
SHA1e9ea1c737949970f9fd7bfc0bff77dfee53ec2ae
SHA256557e69c7e1c00d639f1b918284616b22db3d1b7659c131b0675e767c6aa7abbc
SHA512484f235e72d994af00bcb69c71078a543ba99497e62c6c18278bcdba9f2f9dac57e3200166ade2c2c02854cc7df28f5d87b1fafa908af4c8e3e7cd37695546f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58caaf7de4f1274edc056de0cf17b5ab2
SHA1bedf78dad99e43e345077ae25917a4c24bfe0edd
SHA2562d09c46295949b1c23fdfe625c2418e2b9e9d509fef7588f3d0b298804c4fc40
SHA512ef0b737c0033c9c622fd3fc423ef150b2a0fd92920af090885e4144166cc9c3540b21a4eac660cf83126ed293373fb7e7df6c534958bc74f1fb47d6af1ed5ddd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5460e25221400d643a37d8c1b9f46bca7
SHA15e9f52c8273f9368b4343196aa2d059531cb3cd3
SHA2568fd479c368e91426f662be191030973a341e05e2f5989d1a0a1f1cebf45a113b
SHA5120044fe09b0a04037a3317029fe7892290d9a197317851641b5d8654e91a8c52a67f56f692171027f5935cb3587b9f995f652071e38cddabb5f465a8d0bb9afb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589de5b6dcebb48bcd579406058d549ee
SHA16e3b5f826d5c1ec3b97a4d2797f18669c5ae97db
SHA256501fe2ce30ddd0b8297254b2a7ec8b28d25b4c2b88fefd64ad2b04bfd08d29b6
SHA512f2ac7243ff132412c72ca35e59b4a80da5ee6919b9a398519d35abb4431c24c9a1f3e52ebf4886c43e47d41807c09bde541259afc7729750a0749ac0927f35fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9a9e7a82b9039a77d604a616ec3a350
SHA13773035c01c0f496a88d701842d3d927681f2115
SHA256e6c4a46bb21ea6550f9e0e1bd867fb0d3f2247dc5b0f22317f5f5bad650800e4
SHA512c9dd2a59ed5934ccca236e60029a3a0d7868328a2526feb5d3d838a2051cbe93563969cb5af75eb1ff7baba0b772f2247d8baf269843b1650b171dac7effb139
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad828636eecd20ee9d35130e66b58c4c
SHA15b72242e73d0742517d6d99d97a60202d494b91f
SHA2561cd611459e7ad123130618e1d022a71a5a14ba8cacbf1bf9a88c141f6b6c32ba
SHA51297a4ef2ea98454317990f206d098f8a549f1acb4810e4d8b95f11d56fcc45c736ca00cbad15c608156138abe845d79e269dc7b9c570e67f85496f4bf1ef05fa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503d3b4686edb58186f038b7ae13c3b00
SHA13ca08152846b1265e75a8b0d0093020a6bcc5bbe
SHA256c59466dd0a7a0f0c785a540890d5cb1eccaae71e6c76767ba6453a78038fad44
SHA51241ca638f48853f8bcd054c8c13db716a43e3eaa7bb8600d5679708b169731425d70b2e9c9efb87588225e182b71dbe88149a8724e8ab148d472471773847e8af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53628fae2a361f2c9e9cc4c0ba3b05195
SHA10ac847637c4be0b72a0483fd755d8a5c8c57b638
SHA256f946d5764d824731f26c9170dc82fa5a3f078ea26d90b10c8a31cf172e3ab72e
SHA512b4db8ed823dbed1a04df83a49bfceb269da7146695b0d1de9179db112bb49d31a0296d304d2e1094fe0334c1f1d713a33e8298f273415030dc5e3243c202c3ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59de70ae5bf828a371887ca2834ee6fe3
SHA190338566fbf7401181bbe95a3b556285c1337343
SHA256124a689bf7a003d1801aa590292dd0d12ab87656c0c6e1b388757748697dc7bb
SHA512ac519539e257a752084a98e293dba95280644065321febd32588f71b6e04eb3f183fcb45b3ab93c0c663bb560691725cae7b9a38da8db29ca6fdba010a5d32a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506772c38f15cf2527b992a4452041471
SHA179ff242d3f591aaa90bee0bb2f9740ab7240527f
SHA25665a97aec293c9e9ed66e7216ef1a0466939f5782b4a4a5db2d9f83c953d57421
SHA512ba9e2333734eed478c5baaf7a4db5ae064d5ec6d6b0c9c4d2742cfacc8b335d36c573c6f2516db5e80133a6b5af599f2da97039157f734ed03e4ad3f65ce6882
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f046f77cc1bebcd8ae94cee1938f96a4
SHA14fe43b9074e8ca4fe2cacbd725fc5bde00dbd1f3
SHA25619132e6cb8dc08ff19176b81d0ca1387f04204694a3577adf730aa12d9a7a5da
SHA51212ad961bca64f5e8616f5534677f9c9d279a6076d0ae95fad285970e3c15d02cdc01a5a44a4c487f0e83beceec8f531ad1678a8167ffb32309f0147435e12dcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59abb345cc746f1bf0f8b558b031397f6
SHA100c6dbf18006d230ed76f178e27702f6da78d8b6
SHA256a536e71299fe21453d5d76f19d25710e11cb0e33e065d067147a9248f96e5e1b
SHA51251367fc0ea261b890986f2404185367178b144e683258bb570efc8e537a5c4d9ffe358cfcc11847b9785dab810c60c7e6da5bc096afadc0bce9a6ae36a683963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54afd22ee44a3faeb0ce6f2023d5b4555
SHA1b45f2f1873f75c75ab48975626fb303ade9c3c7f
SHA256c2687f9cf62de51c9ffe52bfd4849b5bced366e9756fd1e0992bb71c498533e8
SHA512184682e337e023a91b18e8ac1bc61237f22dcd94f6de325081d9efd1145a6ec2fca86a5a5334ffc77ea170fa85e44f8511ea7dfb5b91b881db91d7b3a909bb4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5132744d7d4ee59862332e963c9eea2f1
SHA1731673be75e626b7e3e5ac87fba363044cec2e6c
SHA2560a28bec6359a20863523aef522f7e2e6b0e2359500d2f2bb7667d863a600ae9c
SHA512e3aea2a41d5aa362c44a11d199137898763d3aec4f533e2c165118437e04b5a4e96aea5096c07be64ab0a04b2be7e8a792f1ffbd8b6e2b30fc9b6947f6207577
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b