Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:42
Static task
static1
Behavioral task
behavioral1
Sample
ea856f348c33e1faf104a042d1a500e8_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ea856f348c33e1faf104a042d1a500e8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea856f348c33e1faf104a042d1a500e8_JaffaCakes118.html
-
Size
68KB
-
MD5
ea856f348c33e1faf104a042d1a500e8
-
SHA1
8035b27904637aed201b8d930d737497de0fe374
-
SHA256
23c558dc9bfa1d3be31fe63625d91f9d84f5c1589cfe1120a8d1fa3f899df8f1
-
SHA512
be76e307a7aef01ff7f2418e48d1747d279695a7fa580e8100f3f3e9139f193e399a76f71982011766aaf538ffcb3e8f2e8fea81c2e853dc2b62143303c2823b
-
SSDEEP
768:JidgcMiR3sI2PDDnX0g6m5HAZAT3W+2oTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpq:Jr1HCCG+HTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000829ff650b9c21c792214bf9add668f90cb34820377266a66c1c4cb675a6c08be000000000e80000000020000200000005f14e60c2175804dcec01a794fe5a02a2221a6bf88c7769260118433c25bbd14200000003b195b7681e0bb9179b87566b4ff1929de1d00e7a5260f11d1ee225d46552b574000000088bbaab2b489da67a7d9603d2d20d44cadcc7be6d60a53b35e8965a28e4e4770d5f8748163155e139aedc8b82591b00ac98eaad3bed895e55b4a86e3312e286f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3D286E41-7639-11EF-8334-424588269AE0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0225213460adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432879236" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2316 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2316 iexplore.exe 2316 iexplore.exe 544 IEXPLORE.EXE 544 IEXPLORE.EXE 544 IEXPLORE.EXE 544 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 544 2316 iexplore.exe 30 PID 2316 wrote to memory of 544 2316 iexplore.exe 30 PID 2316 wrote to memory of 544 2316 iexplore.exe 30 PID 2316 wrote to memory of 544 2316 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea856f348c33e1faf104a042d1a500e8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2316 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eea0b1032fbdc388b1dcc4fadb561178
SHA120da207b2728656b645768461e7bd5243261afd1
SHA256dfb0cfd2afde671e3c20748437d34611796764923903d80e38ac9d06d5ad202a
SHA512cacc6d63913909cd1118e58bc1c80661cada490e5e47330619dddc848b7758b8020329e5c2d4ed59f61de054f79d923f2d094780b4432ac16764cf7c0a3b702d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507b1d33e455eccf982c27a81ddd7da09
SHA16d7d3207b49471e9696a213b98dc94ea05dec6a9
SHA2562864b823e275360801dff3c944f8be8e3bf338c487e1aa177f4ba37ae128108a
SHA5127b7358ad2f0bcebf40471c996dc7136c170f6f908124dd4955cfdb69a76838ad23b1c8dc71753f0218c5e0e51bb306daee96d7997ab405c535afc8ad90de5ea2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541c56c615f623b93cce326a8e9c47b77
SHA1b6924a39a04335cef4651130eb460d84da38b112
SHA2568b36239c1b4da10a18ad20c7974f4aa6fdf00b7d270a11e4d4e2d8eb5777284d
SHA5121cd5b1268ea8717eadef35b2ba730f631eeb67c73cc3a2225d4f4476fa8267841b3ae35f081780531098da71983a4c7b1d93f37dbb978bc655f2b986a7973ccb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587eed51b8a57ef2fc2a9f093d98a5022
SHA12c87a8c8dad085a46aac3ed1eb4cb23e000215ea
SHA25615b7c0b4427078d983c885451dd8d16c52c55fddc52d3dd917394041e477da41
SHA5120eaf4c776a892c7f1b0108f4190449c5b8f9804f48ba6c117e4bc9ff20dd1cbf64971b7f9568fbe18a9b650f500c37821167011a5e67397c3b79a9d5c9f3d78c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53da3c02ebeecafa35da46357e45c8dad
SHA1e4943dcf3f1430015c5bb2e2310cf9975e15761f
SHA256e644156fa0ca712c183eac979928db43042287631336bbb08787e4f8ac1548b8
SHA512b1c80ef98dc58013f1a6c1a9f559d12c8341ea73a4eb5e14377e57d463c25255a92ec4f623d083827e68d9e45214d8046c3761a40a964c44fe7682651e20cb9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b200d0d6a7bf370a0f521066950623aa
SHA15fec7b03f13e26522502ff47e8d2970eacb31c04
SHA2566e960cacf7b8e496bfb0fa44d099cf761061a3d96f9f9ac8e595ce23c3ab505d
SHA512e3e3e2774eff863245ae2eebafb7f536fe6777aca2768d53aad80d2bb81d33fb6020645bb09e2a5cb5740ce9366bf196cd992c0fe4aba83d25d405ac74cbc71d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dc8c30f909bf01b70ae1dbfd686f4c9
SHA10f6cd11b762ecf4a1abae7d0c2ad0806de15fe94
SHA25676d953b26fe5814aa9c8d5eda6889dd99c4e9bb6040767d285f8268458806466
SHA512e5ccad08fe3be3b15092db13be33de8f3817ae80c79391ba4dc4943a7c51bc9636050945ac0777a8e2db926b719a7eb5ecd0885e62504315d5a7528be8df9099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daf322e90f6e4ba217015da90f5c5720
SHA19801a2b504c38a9217c95b5a41194d31a1563c9e
SHA256efa697cc78b0b79e5f489bf339d1a95bb243b4a73c9170edfb3f5c0fc1214075
SHA512d5818c82df6c1f7ed6c70bbea3b2aea9b6e750b6908b6fca278ee1ba5135f4f4a5b03d4eb97ee5ce74a14513bd1bce6ed847a1c0297733cf5f634faeefc27a97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9a6b85d336aaa2128640bf02bd1c5f7
SHA16657c89a2c5b437321b4d4b1bb764bbda6896492
SHA25690f8fc51d0fcae8ec4ebd100217d9664df0acd17cbddc3e0fabbafd96175390d
SHA51241bd5888810c2d584446efee5fd584db857b00f36ff339ae07af070d650f75deaf78a17619cdf0b75f0f6abf62e7cc91cb12f7c1614f75fdbf45e472cc38b1f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55581f6742306f7b27094a3a986a48a55
SHA1b559b13d894255169d8756bbcebc04922303bd3c
SHA2566f81ad7a5b72b211c27159bcc63038a3a0222be92a54af9e6ae61538e261d5ed
SHA51232e3f19963e52864b1810933b18ca17f647c1430cb5084b38a1f5b53b9280709da3073cdec91b7b16fbd6f28ad753d39ba4283c29291a28ece035ba9e066eb31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549d177c300c3969b2ff3f9999c1cb3ff
SHA1f765ce1bb87bcb7bcf932546770991e3f0b97d11
SHA256dda51de781a27988e018e5349d811ca32c281d20aa7b2fc9d4f2ac26e9281f67
SHA512d600611bef282addbb98bac337be9bd6b5fdaa8fd6437b1f422e4afe0c65f4388a25f28c17b1296d4844d1c2e917536019e21d434a9eaeba7b946ff440a6975e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e68ea95b55c52c04daddc9aad9781f98
SHA19538b44c8aa3606f65f62feee5f3824b4bd69d08
SHA2566709a53cef5e830e19e37dbab2f2cdbb53f23bf8aaa3b3443ef7ba44838a8ab7
SHA5120875cc969055d7043fbf20de2dc29851a766239be810b4216a329b7cb0eef537fe71023df21bfe11cf4ddc6509dffcc60ced6149b29c718796d007058512c940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508a334b45127e34c7b2230425d41ca67
SHA1aadba69621641e2beb96b49d1f4d93ae55d6bc06
SHA256d855503693b5aac5398f484c82f18a9453c4f7a7a00947f0b21bf356f1e0284d
SHA5128605a0e01257acd8593851e5334d61bd2b3e10f2f49893b39850ec83033a4b4c505385ffde070ab2300a75c8ede200c21880f731a17670b6040fc9ca15a81b89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e351fe08158ee5b05179ec4706401bd
SHA135d308f0f1da48af5bf508561fabc9b6eb1d9f10
SHA2566937f7dfad44ded172dd4fa46dae53cfa96e7a7b0a3fef92784945884e7b9515
SHA5129aaf1d5fe74d3846d7868c0067b78cd0d978b6d68bb388de3a98b2825c2955c8b13aa824494ea7f952286065084b09a9dfc9c935868f18273ccf341bca27f05b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b914112b6878cc2007d9498454236005
SHA1ceb9d27356be7c38d64a686c44b9833f670c6567
SHA25606ec87a8c526384fc6ab650208e8cb4a7a4e9d88df7a0c1906cd7158044ec3f7
SHA512ddcff266a65ef7aa44af2981685f7ca0adcb934edc46495417973a7584af2da4d15939eec9e98bd23dcb7170f62ffc6359cbc29093f50440e76125249d342586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bd95f23651476c4a376050ed8a18f41
SHA1014ceae38ca78e81ce26fc6d91cf80ee58eed42c
SHA256eb9e0463e4f4f321554adb43f6d4a10f39ddcce957a198a313165390ed642e3c
SHA51273e104a4364e9f9e081eca9672e27fce2505f645b1e9a1f3b066e7241a37625f0720c2626fb312a379dc66eee04ae8f8b447d7c11ad3b37602c8bd3d0b7b1f6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb9cce10aa48e29ea8d0e1ba32a7da41
SHA1bd6c4869ea29de9bfed7e68b7545a6194caad1a1
SHA256eaea63f7b5a91aa3cf84f935212b5ac2a8ca366be4dde50c0b35603d71c15c38
SHA5128d3ead00330e743b92771f48357d3f062f6497276dafd2a4ce44bb1c20e029140df949d4828c481db324b128c03fdfae1f6bc3b01936c53d6b8b7784ead37d54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2edc8a13d980fdc968388b97152b1d4
SHA194221a83652b06591d4fe0bd6ec0105f9727e665
SHA256aa497818c7883839e465b43aa6e6cbd471dc4b7c356b7b2621815ce349ffb9fd
SHA51231018d8ca0a8cbc47b74206cc14e0e2dc99cd43d996428bdd2a228b45b0708c12aee409daf1ec0d956ab770671afa6ae682242e3897b24378ca606db359a107c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532f31cccf16fae1536206501eb78ce42
SHA178ba4d97acecf787bc6578921feea6ac8664aa41
SHA256d957f58db9f8543634412d6951473058c978372d95c6bd58dd1b82735b36694e
SHA51206ed4aa7371793e66f6ad593c45ffc356d384bc3b2ed0d319034cb84015cd3a9cf8ce2ab0d0785ed8e9eda5a8354c4f24a83ab69cf1f79c988e30e2da3050c0a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b