Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 02:56
Static task
static1
Behavioral task
behavioral1
Sample
ea7525bd1b01e4791feb7364132ac9c5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea7525bd1b01e4791feb7364132ac9c5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea7525bd1b01e4791feb7364132ac9c5_JaffaCakes118.html
-
Size
30KB
-
MD5
ea7525bd1b01e4791feb7364132ac9c5
-
SHA1
cb9b5f475de26559175c844891f9d018fd643539
-
SHA256
6572e6a6bf5d675ee3c399fa3533641a46575898aa8d50f2b962ad1190f16668
-
SHA512
f4a8a66d5086c20c1a3036bd5e37dd62355c889c70268531517e365e7d28b43e43c67c45915a690b56bde90b730fccf42ae97ec256268fb6499dfa6f0857405e
-
SSDEEP
768:/HfGJ7kix+fHa/l2tBuJJfBFPkrQNcNv2okM/BmGPmjyDJ:/K7kix+f6/oHMJr80LvM/BmGPmjyDJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000b71d367867cc7bd03d4ca5d880493886fbacac0090f7594cba5db1ee27652116000000000e800000000200002000000093029e4c899ed3467bc68ac46f595e245458eeeb17a1223784d93339f9dc88c9200000002f078d352a720b571bbc3ff24ed97cf32d076e9bd35b9b5c54ab1e7c5ca9c5a6400000001e652b8d877251fedb97a05c650e90c17997d1f4388b3aa25fa6c25a4f5c20e04bc9247ee0c62bfaa9e45324816a72635772f31d4114802c6b9a15870f7daf8c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 106089943f0adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432876441" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BBCA6A71-7632-11EF-9D9B-465533733A50} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3040 iexplore.exe 3040 iexplore.exe 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2528 3040 iexplore.exe 30 PID 3040 wrote to memory of 2528 3040 iexplore.exe 30 PID 3040 wrote to memory of 2528 3040 iexplore.exe 30 PID 3040 wrote to memory of 2528 3040 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea7525bd1b01e4791feb7364132ac9c5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3040 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbb21b3d1c1746987545a1b83d8323f5
SHA1d6e497cf6ced0c43f21fdb3c667d4d0f8b9103fb
SHA256510611837468815b516522002956bdf6dd2297723b010a989903b5b63b6e2a91
SHA5124bbbeed5d593accee2b35c56a6c88884d68d9b547971bf1e32ca831b6c2971bfe103d6f064c0b7a331fc37d398e32c33c4e935598ef9966ac4870d4a0be9ea28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aedb7cf51c5cf56c2db93cf2bb88978
SHA15bdc946fbae148a842ee0bf9d3d5ddc31e1456a8
SHA256e01fc19520631b147d4e2d14c1cdd457aea174d404204d8d65b1a645c1e17f6b
SHA51240dea44f92d2e8e34ca94a9cf67ed474b24e08280491723cf89f56458c2f3607139794f067110679859a0f9747c0a2a42c75c84b9531b97e5ae09b14bb14615f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b4bc2327627317280270a2cecaf23bf
SHA1425eb1649e5722202793eee5729e687217abfd1c
SHA256f3f13dbe84750c9e9d5dedfa928b489502c3f435cee502b80befd9ce6a21ce1f
SHA512ca1040a2f0691bb1bafd85c651dd136d424b0f234d1ff2a6f5057cc23a93878b7074afb02d3653980e2b26689eee96c88c5c34b45099f86db3dbaab3315433a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a72460f1fed2fecf023b08884ed3eabd
SHA139b965f9d86af64165d4686ee5c6c3a7b4e03642
SHA2565cebda4934998a0f12c534137c68acd8d0fafaedddf7cb00bd54c3d36d7c1d8e
SHA5121975e7a7a4d8d005b262ac8d4aae56ee1a89948340901377f6af2a31188d537c0ef2121ca3fe20d4567b9db0e751689d92bc8ee48c000c8f4aa6387c74e366fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574668ae3da5d5daf9f60f14010074569
SHA1db8e64b40bdcd14e20954dcfeb164946b3adf559
SHA25672133c63a03548482f40f4e077fe583809c1abab24ec8206aee464a62fd19412
SHA512dfabb6945e756a978aaa5b44e7fb90bf219546b6cb346aad8e6411ecf1887d1f84e53d3e59b0506bdc11e9b406d41c95a695070954857b64c1c570ccd86f9989
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5721e5f416072370dbf4217783eaf48ac
SHA1e8ab98b79e3fe8220b3b29eae203db72f0114cfc
SHA256d2fa6308f0da83524f730e7dad7c4ca3c23e26ced067cd493d4aab1b5c898c9f
SHA512508565e5f3d55abdf7270bc7c4d788dc911f6e44ded91e96d8e3de8350edf42a8d0f24bb3af63dfd4a7f90dc3926accc4f2200b8986a66657f7565d45079415a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5895803e74c39f39d6794ad2f7b683ba3
SHA17feac3dfcb1944e22b120b4620ca7545a882a3d4
SHA256f48965e220dc10768d032d5f194ab949219dd7ff1b2b0e362661ec888621da7a
SHA512575e56a93681f96d325c67f1357d7b63343a9c6997f9b90eab91024482de3d937b35298a870c6b93ca03e71a62713d0642ba8e273535695a47dd83f633a6eb2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b014532e12db36a4c60fd29e1025c170
SHA1b434d2dd4aabed7219a082518e2af619e5faebf4
SHA256d5dfd73359c2449744369fef2ca5c73d0d06641fa617a358911299fa0d783675
SHA512a0ff1939466db43acd6cfd485c685a11945e60b90ce1a6341001fc745a839301b02f8bac81906ced20cfa2670e28455c81bb2292b6bf7a50a387b6e238b9ba7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54415f85eaeed26e74205a72557545d4b
SHA12b29beccb64e1f1feae139242e8d20417f18b414
SHA256c9cb67f6538da7f6da8285c0767e07a6ce07d937a8116c090a3e42a8ba80f02d
SHA512a71d48eefda393f80f0bf961a611975e632adce7cdaa53c0f2e229fb0438e15d90918eed5bf4438f1ab4120a49b6866fc41915278e4be87b5f417f6fb1d68da8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5631456be2a01f47652e6651ed27238c7
SHA15f74cced9b5b1e31b5c19a1440962effdfcc5580
SHA256f0fff3aff853da0f5d86100178c7e1b5a29eb61e90bde958abf308d3bd412d67
SHA51249b2b1400cf6fc420227420129072827f6ce163179c9d0909a647e4f8792c4bb439f02197b338918b6599aa843efbd560de076ab0cd73694ec1624912d6cec65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554e8b1bd64fe2eb824da9b8ae6ba082e
SHA1b3ae9a93692facffbe84eb794dfef3c39df5c8bf
SHA256125897683127afe9b6241bb94c9e8c04b70f999a8d25290d57ba9b42722aed4d
SHA5126ddec205dfd0167d184ecededc6dd28f42821711ada8b5316003db4e9a77fdbb995aef87e2eb8edca62da7f436636cb75845cc0c8bfc89887e8592643432c47e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7e73977acd191b356a3274359948c7e
SHA194782d90f29c5da3088fd2baa4619be75c5f5185
SHA2563358bcc6538d2e0dd2be31c4746382856fbe972076aa8e77485c9d18e6bdf642
SHA512643c550000e89ddd3c19e33597fe08dc6300fb07f7f66bfffd86a73994afde9e759b2c8b0bb09a29a78ead8b5007f18d1914453b1d7b3395708c27d042fccc91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5e29f53a3a5138d655b878b5a94e8bc
SHA17064c130755df4ef1106219896a294528952ad69
SHA25614edc0f53127f1b93e913e804847b58a5aa176e992999cea0f67874ccf2be452
SHA512400ec867462d7ecda380cc250755557dd12d097c772475cee601d67a920faa08579570616da04c2be833ce8468d4d3d0fe7f3420329d14cdcd3ec5049c7413a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e306b05fe36a719333a0af9e599d7b61
SHA1fa289740a1a818fd0aebf830e102ace131e4f3aa
SHA25652ad3d09f77cedbe5ea161b48b4a44ec3ca172fe698e7f10906cc4c89d745d27
SHA51272af57f7002da36535505e8f20132e13fc9c6621841de07f828cf6d549c1dce6a446cbfe6c3e43ad4b29ea1983eec8952cb2efeff2f85284a66a57739a7df00d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d41483bae7f3dd6199c31dc9170c62eb
SHA1b2ccf29c3cccb3c4214919dda94be647bd1c20cd
SHA256451c8ceef176eeb2d995ffdc84db31d747baea3d0bb66cd845905ece7ce2e820
SHA5122dfaf418cc636b0d1a8ebec6cb35820efd69ea6539c8d296c251c4c9a7afd3d2ebf19c257c04b52efe58dfdc69bf7a6fe2622b334a8c270503ae045fb526b4fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eb54d9c62192d6da50aeb8ee33bb705
SHA1087f0eba466f9f785fc6abf5e282e7789a765559
SHA25647237595f0d13cb331f830f674cec4fc62064be6b467f4e555a0146a139376ee
SHA512f380be619027ca04d7db28357ad5e019e3375df7ea05ece583b92fdf037c958207be7f84f69f49ce4c69990db2e31be65e36481f00cac6e9ac0a3b525f97b0a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5121c5f6e194354f79c2fca501b9dfcdd
SHA1b596a8480896539459d45f5719f7fa91dff47ed5
SHA256393f0448f4f82f45f3aa775240b05a205b93e4253bdcaecf4395415c6cf14480
SHA512b36e2ff6e86027d8ffea0210cc192800921111d2763493a59e856a3f08af0615abd54334317c4df811ebb706600619ec2908a6dc99e872bbdc49a6d903dcd8f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594f57ad9bcf015fcda0ed096a90d83b6
SHA1536ca56754ba2925478a58cc3f770f42dbbaecb9
SHA25673b00a2d90d03832341390774a30a33f333b592fa273d617687c31a70c26466f
SHA512f9dae023b09c892d130819d70e69ed8ca48757e92d17c46f6f47c8dfb58e6693055e91f7a612b11fa26a5a43d5f3e1cd715782c459d361a21ff2e56199046d33
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b