Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:40
Static task
static1
Behavioral task
behavioral1
Sample
ea8491e2470cbc3cabacfabda33420ed_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea8491e2470cbc3cabacfabda33420ed_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea8491e2470cbc3cabacfabda33420ed_JaffaCakes118.html
-
Size
11KB
-
MD5
ea8491e2470cbc3cabacfabda33420ed
-
SHA1
e1068c93a7f5de4c8ec7c7b2d1e39f55a4ed82ef
-
SHA256
446328d894265960b0dfe19badc76848265760fd807243f9992a5d4e393f6a5a
-
SHA512
b5e3d6da53cbcd506ea90c121ad58859d64030fc492d71e159d8cc9856d4496c0097cb7a3fd217578f6805573d7decd37578c0214475a00b9126c2ccbdd680e3
-
SSDEEP
192:mVgcvIKg+leqL5O8BbxgrykUvNJ/B8ZJP/UvCsUakbcA12VKl9Rq9V:mgyIKg+YqVO8herykUvNJ/u/UvB/kwzh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000007f88bcc1ed91bf3faaafbd382a1ef491694a80c6e791d8d0f3ef582c809ff67e000000000e8000000002000020000000d98e51508976fe08d20c62d2c405370f06780c2f30016f1a76d951bf4bd5cb9b200000006453bbb9d3494473cc5bcb9a20bfff21539076b2a3d861fec31d692c0787f8dd400000003db6db73bfff4f08103a73f5859b6b3f2e4461f50ff4fc1e38fa2310da5ab3eb766b8773ee8d07604dbe53cdb57b81f51759f8c84727c4248551561b9344fe93 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f025b1ca450adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432879116" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F63D5EF1-7638-11EF-8DAE-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2704 iexplore.exe 2704 iexplore.exe 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2208 2704 iexplore.exe 30 PID 2704 wrote to memory of 2208 2704 iexplore.exe 30 PID 2704 wrote to memory of 2208 2704 iexplore.exe 30 PID 2704 wrote to memory of 2208 2704 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea8491e2470cbc3cabacfabda33420ed_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2704 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54988838ded55a984484aefb29af2c2dd
SHA14fd46078f88294ae94f21e14776ecf9d393abbeb
SHA256884d80c14a3f79788b159ac87edd45a0ba7801fcef754155adcd12eb67e5da8b
SHA5125e7807829e1d18ec971cfef1cfad5cc8cb9d5ba43a89d17c05db91a3e30032d8c80b7ba73808d0cfa4d68b7abcdb0fe6855310f7b4c52ca24d6a7c70b54f2376
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5238179772f1aadd01da35728cc7d36a2
SHA17444c7371157cb7666619a185d17062c15235e9a
SHA256f4eab5a84c515095c41e76c759f5cff3b5d9e7bf1f12b92a12b5fccaa98671ae
SHA512b2f644a69a38b1626dc84799178cfa70c6b13add32d15526204a19ba082dae66a4126b96c2fdfd24166fefd9dc73695b33dcc2036a4be0a66a9007c8cc23160b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5455770bc38e6cbdfcf6d057e2dc3142f
SHA1d8e2ef379013e935747cf67ff4f0543886d5425c
SHA256f9349e1082e4b184f1682adc69c42ffe00eb37cae42363e7520b88d3f024dcb4
SHA512c1bbbf7141c4dbd92a4de34b182500a642e18b4ecfc2ac90ac6f0c48daf11930fc0fa51fc4d9f2c6f349c0a956448f9ea63a5a466e97eed82f13d9dbb494c417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3eb097e7835437c2cc381f06f614bc5
SHA1cecf621f77391727b2428e2c58fef4bd5dd28afc
SHA256115f90f705468ef27638b806601a857caed70482e992af9ae3c66eb089759597
SHA51250aa78d77e9188374f08578a3e5d0d6752bfa1455861e1f90bc8be0e43aea514017ca34f0edec9fd6d4241ef5ab4d40ef81deb80f3e8427e2962a9935b82de11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ffc3f1d88fd86df7b936afcc1abe59d
SHA10da3f428360083d8457222ec8a9f833061264b72
SHA2564e251cdad63c3e4eecf0a607fc1a3a5a31ba12dacce821c0e6b669d2c816cc75
SHA512a709ac220a776559893ce4aadafc030720f91860ccd03ecf57204f9f62ba5964f476437df98385ed7760f94d63e049783cd762ea31800b3b7be58d7dd41a9d27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53173e3736ff50451191b8066f47ca40a
SHA16a89c41b68c86ec95275e6d097a972dee3dca68a
SHA25648de3fde0b8a471456391b72116d99dede406c964ee37782bd7872f635e68c8f
SHA51271e23b1002c4e660cd3dbe7e3f8a80ac97bc4b2a33419532dd6ec68e5cc090382c8e94c15a856f20c40191a1c5427fbcb7e9732bf18bbe361d2eb097db1e886f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5347cb26b15af59f7b0528c5628430d64
SHA18dd1b44efdd3a7dfb60236f5b647c09c21c8b4f1
SHA256710de3c842775be2e126b95bd6354a43d5b5cd77ef76e56c9e80c8d3ee87b5d9
SHA5129323576054d59a8278062a04040259964ab35f11e79a3b8b36583f15d7639820f8a3cff3512bf77fdc4ce5e9e23685c1b77cccd5e8ffa1852e924e227600e1ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f30a73bacc7b4d9f358ee441ddd66125
SHA167eb32313c4a59b2fb1f9214624835079df1d6ef
SHA256f5487e859bf52944f5d03f80392b2208648478098170a7a4c0a2e64b770a96a0
SHA5126ccb887c05b649baec536ab8745571024bd983afe5477605b48add0f0bd6a10b7da60b6d6b156b4cc6fe60cee4425484925d312292c9ecc68f2178b36a192f52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac45451a72e348c14b1ce816b31a8150
SHA16656911b5ccb2bfdff0e3163f4f31e5d5d632080
SHA2563a70577ccfb7560fb1dd12d59efc6d779547f84dee8a1c1720c82189c8cf2108
SHA512b602673874621089ce33286fb013c388a59fa2f8675b5c67562ee3f1da0a45a4a13a94bd94951bc378e9793dd8380562e6e7e17be110eb4277d5bfd4f510830c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5453c3a0c87746d236851c5a51f241cff
SHA11587e6283b1a18318a862003922b0fe6c914f1bd
SHA256b2dc7a02a5ba7a4e0af490c0751a6fca03281d4f657a1a12ae9aa6baf4b0c4e8
SHA512bd3f335a28d50b221e5bdc10acbdb8e9954b52f5d3bac2739f6bd7e9866f67ec42640a96d503f2d0408bb46f41b61a754605f93b651cb6d4353b393ef0267af7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc61650846735e3423b100969efed6a1
SHA173151e031cc1eaecdb13884182bdcf2dea9d4220
SHA25612679e0499b5119654bb2c389406f9ef2cf746606365ba82d69dfd5e0a943e99
SHA5122cc0724eb9e4b345f018165d03eac708554517a5841969c839ee8ad9b78c366fece6a10c836eeb7fcf867a7d8f75ab767d5ea053ac54e1df699b7b0586624478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3d5f474c3016c07a5022a36a5df7018
SHA18448322339ed457d40379722d2a92367ecfcf836
SHA2567ae8541310f6ddbc4a427a9dd255468b0fe7d4007681b188a9051fecccd121cb
SHA512fb9d8a1eb72c00c3a80c12934e7383c2935afb28d0b29ebb5fb53eb0d569f466a5bd945cbefabedb7db87b29d2db62a385767d5cb7276f53b38a57a3db078227
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508bdab07a02837d64fbe79cf9bb6afe6
SHA13948facf22272687cf2a46e0d09d615f634711ce
SHA256539822c8d3041684f2aa59601d22ee40740dac00ee8684e46d8a0710df6ead1b
SHA512302ed2ab91b30e3f116191402e93659b74dcbd4c912f0fee1e7a69177344dc6f0a917484f9c610d4cb09b1de09b89c8ebae59741d22c269ded375f0e1c8e40e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3018d20cf59aa9e5a80c64f340bad5c
SHA13cd093807924354bfe8db0d7d0a6c9fa4bd4604f
SHA256b1a73e7b69956ea3068f64aafac2bd9ab0a2779321788094b40e08fd50e4dc32
SHA512ddb945bf13d3f2c62d6ea62da98fd29e08707a017264bc31abab28e32d36711c8e03b7c5bccf71b4ee29299604a454d0f184d3b5b8b284b7dcbdb8a7d789dbe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50101e0520079bc2c4ee3786ea3ef3dc7
SHA119c2b3a1b399de2cdcb58b3f3b979c5029924a40
SHA25641b3510c88a9816f1baaccf9175678b7fb571c8b3a0b0a39e725e64729864602
SHA5127cfd70d5998f6966db31a329a88d79a186a1957820be046b3eed32adc8c321ca97b45ff547c5b882ee678a10c4cc79e125bbd65314ca6b4478c7d77427808ce6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5193ab967b34e7756c329c556a0be2b76
SHA16681da2ca9600283ae46f440a16adc238f54bee0
SHA256aff87798e4e029724d590df7c587badbdf07d07f6df130fbbfd1ce208c18d593
SHA5127f282e577aeb6ef381303bfaa5b99ef207db309fc123b79866698c309abc7463300e805962cbc6a7b841b6f4fbc35a8db51d32791b6759ed21ccfa77e97ac9d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f912d5af6829933d3139400cff4c4203
SHA1f825c8f9d6fb8cbeb53cbcaafc3ab6b36502e0d2
SHA2566adc1c1b694b4cc1b571fa6051ed78af4ec803cfb024eae48bae58f2a10ae27a
SHA512b898cee62240daaed92e1a9e2d5376e7272f0941915c25c2a950873fb2c7337886e0cc68fd45279d6454ed18bc1bafafc84bf3eb1fdf06601dbe30c8e2721039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5786b7fddf2afb0c07aa0f9b9ea8c1aaa
SHA13b8bd3db7dca46a49ee09870673fbb369ac61d31
SHA256dbe22729ef0491a1c563d6181173b3f8eb216b5adf2da58e9fa9225d0df38aab
SHA51261f84c16b7eb06e8bccbae03810d925035a848ec06fc641c58bece8813c8fc68b98e407e32a8f2d920c4ad42f95e05337359dcd4ebc15c178bea66417c716cfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56679655a27937b9c495bf9fd829a56ef
SHA1d292b25609b96f829756f87799edbeeb49a76a48
SHA256a1f8bba08067057d4cfe6b5df23c2549c161c6d398e322bad569f9646a9781e1
SHA512d3349e662603ed7d4fad7f4043d8c80aa21ab63b6001a406b503f3eff7da14c52db5fe70f65ec0e7a45bb70b147c90a8aab1030b27885c02e5ed5b64493a8779
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b