Analysis
-
max time kernel
122s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 02:55
Static task
static1
Behavioral task
behavioral1
Sample
ea75209625dfa0dc50d4feb67ee43070_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea75209625dfa0dc50d4feb67ee43070_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea75209625dfa0dc50d4feb67ee43070_JaffaCakes118.html
-
Size
7KB
-
MD5
ea75209625dfa0dc50d4feb67ee43070
-
SHA1
ad75b415465c9b5ccb262823709cd305b2b86272
-
SHA256
d31aaecb54636e780ef91418678b08991a0a42162ce43c7c506344e6757dc02f
-
SHA512
953f73d8ab0c8712e6f5983a15f45aabe0481c786ef11d7ba25e7c4fbe166ea14df433cc4f5839485da7945ceddc8e41b3591df85a8b9e0020d8c205ef93f4d5
-
SSDEEP
96:uzVs+ux71qLLY1k9o84d12ef7CSTU7zfUY9YOH7y0jFit3cEZ7ru7f:csz71qAYS/Y6iEb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a02e768a3f0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432876432" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B4B95571-7632-11EF-9319-62CAC36041A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000ac6a54e3e683b87ed0dacac036dea5d38c44fdf9344dcbf0cd24db19cdddac54000000000e8000000002000020000000c43705206c64ec711eef6c825f9ac8102c71fe247ef4727d997a5d06bcc669492000000038674336f8f3a8f0c1f79b3d40182750b233bba548565022c13930da1d92f4e140000000fd917de61a7516dfc86c2e28f67fa1792ec91718dfdf84b42d1f11310082b7b559fe2ed83f3708770b4b8bfcfe515667445989aa9a9c40cdc01716ca76758876 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2108 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2108 iexplore.exe 2108 iexplore.exe 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2708 2108 iexplore.exe 30 PID 2108 wrote to memory of 2708 2108 iexplore.exe 30 PID 2108 wrote to memory of 2708 2108 iexplore.exe 30 PID 2108 wrote to memory of 2708 2108 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea75209625dfa0dc50d4feb67ee43070_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2108 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef1cd9438388e7a564989b231120da2e
SHA1c42acb2c32581301dc4d5e0ebcf411b029885843
SHA256e2b0c9aa290e1ad55b378f05bb920931c338c168d41b727e871e1fc6f2bd9892
SHA5121fb0eadf21249e2f13966649eb8835517575e139308a44d6506d688d2d1be769dc495fdb3d370a3cca30c471ac0201edd2aa7aa1872998286c9b8709ccd83597
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d00f0fa50c2ed54d189eb15389a599d6
SHA1022bbb143e9a6ea37348cdac656fbbf3a3c9fb20
SHA2568756dddc0cbe4fbf815f5cde6e295c798ba84105a9b9fd2bfa51f10f976e5f1e
SHA512b6da8f4ea33f591ee8d0be65cc5d51a5aaf897e98bb131c9dc9e513f827bd7d56f3758353b59aaaf6c2e18f9522355054622d7ce380d960f7cc3204096e849d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e94153c7828959e2d882a88ccf43f69
SHA1d12e33c8d03e73c7ad92313727239b524a57fd9e
SHA256890af786e46947c14c9f6290de2f99f700887929b422d9c7151a9edd65307501
SHA512a5dbf37cb528cbfde439993804e35c7eebc5eb7121998ee1248de097a3b5f311ec5f46ff1f0d0780866072a3f472c5890e44239c59335689bcfe3e9b3e454fae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50701aacbd76813058c8fb85d6b40608f
SHA19e1695f8195165dae9fb0a2de32c06942f61df5e
SHA256ad77ed02e09a0b301eee2355e2dd7a5331d8dfd27274d3f5976d840439311a3e
SHA51277e60f14765db18b3563cd0508cedab47bbff86b440a4922c4030eca79dc839b63cd160daf041f5c833fd3324fd6bf0b2767330bce3f69abd189e70fbfe8f8ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5540055cec18b842e951ad453eff89218
SHA163dbda2ead43e1110b02da98305785608d2950d0
SHA2561d3c928349c3db19540c319083d8aea7f05af55d7cc4ac44c0a1df1a69e33ad8
SHA512ea917d0a69e3459529cdfbe3dc829b1cc39e49fa1a5bbfeca34019a6e751fbb819b290bfa30191407bd039d2a6b528be1dddfbc9d52b236c9a5c8762da6e67b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b2de4b5c5e0908389aa19bd7cdff873
SHA1796926a6e29739fd58aa4d7e24a9551d848e2789
SHA256addddd75cac269979c2f1e4359436df2767d10ec40a8c8c48e740bd4876d9058
SHA512c0b7aa2dea4b5b88ec651df66a68497277829c2772411106d6276f0758b10416b8b39ce8c09c4d20af6754c3ff960f210ba6f01f6cae1ff0f2615de77cc25dad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58815bcad81d36a60b8c3613a4a9bb08f
SHA1f0a7e54e7975fb973eaed4b3054b24e10ccbabdf
SHA2569eb11c313159135fbda0bfec713b2699d8b5fff3a99b045af472960ad551f05f
SHA5127d7d34aa4578264df62c4e4a56983c9537d7f561a6d8e4de520c315033c1da8df2c2d0a0f44f907d0bce8dcd238629aeb9a97c3449cdc21f35c379b993df2749
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c222e8368f18915b00fd22acec8b7992
SHA143f6250c30302d7d56276f04fa06f259eb660b0c
SHA256ceb01772eaa0302c6c6729ae908f13eb383b0cf26447987980a30098ed4f38cf
SHA5123473cbdaacd635075c4b247710f72d28f934541f9b79acb89c2296aa34369685e59d6c2b45dfb57924c6b2823875945f3560d1875a6cf94ee2784c483f7f236d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52afc428b44580a53eb6f6c4c8d4fc93e
SHA1dc924698d04fcca8737df94393450d040faca006
SHA256c4a9e95eb5110861861ef9b6b7c409e76bd55b178634f86a4de8c974ee9126dc
SHA51205a7a07b178604ab98e0da0484ed0acd4f9202009002fe025e4164462fde16c44ed8cb020ac1234468f92e3db2a40d9ad2772bbd3653c45787231bea1096ce36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e671ebb7d8970509a0394419b723335
SHA191d9833778421ec61e3f20a957dc69fb8afe4dfa
SHA2562b61b725063c08cd634d0f0a81c5d4126fe2fa85b61f4d1e74af270c24201a1a
SHA51211b4880d1894902c070b8ffcfaec3aa54a648e067141a2951fbb6851301a3c52d9e6cf8e9568d1671fa72d7665fff5ac96077f26dcd7839f6d57dbc18c9fdcef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fc23fa6ed0b362e532867669500b837
SHA168e9fd0c8073c9a603ca0c079dbd8e1ea8e578b4
SHA256b22af90f9a6708a8b8c553fbda044a7312a3228322cf33db1f390079b042a9c0
SHA512813f947462b56eef04a53f3eb544285aa68342643daf861b84bd5178e998a19ecbadeed125eda4ed68a29a3d664a72497370e58efff3517b8ba4bd6a1166359e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54481559b4d8172289e8f4a3017b064ab
SHA1c416bebca69f565de1315548cc49b5ace2d2f0fe
SHA256c9746bd58f77751112d66ac1d76fbd920a91a74c32a16917c3a52b65f928c761
SHA512bafabdf09a191d7edaaaac7ba9ecd98c9dfba0dc5382eeb4fd6ddab88c9a71106634f39fb056eee43782b6a663400d1e55cc1f1c6ad4e2c23579b1df7ebb860f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2101e1245c432287341162087285a13
SHA1ba7bfaeb2e378dfb46c28c8fa7952f2138c60676
SHA256b650ceab13f8f59aa449921116bbd9167ce2c31775a26ad164f53520ee7f945d
SHA51271c9495eaaf680011e4212d38850cebdf36b38dea0ad3988e31c08e60e8877c0c071444857912e7eb16bbf29a93f6d831dbefa46a4c3f4ca69fdd808c46bf274
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5761a0ce499adf31c4f673385a8e0e716
SHA12cbb18fa38c15465d2bc0b2ca806afb177823544
SHA2562e1c9f3534624cf53814a646bf5eaef3d642f7f45bf79ccb716983171466a3b5
SHA512d7ff3b75a4cae94a9d5f4bdac71d0fbd6a244e5d7e271a6066f8fef3f12c780069378abacc289ae3851307ae5e71c13a70868bdcb23150efe76ac0293ce85d61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5228357cacda6eb3c02c0e038fd52cdec
SHA188a6714f89881ba02bbb99f2110b23f94947d310
SHA256b0ac2ac1f9eec6a78fb52fe6da11407d323dc528bd51ca736f6216aad2edf3e5
SHA5122e005be14a26f25cafbedf5c134f6078c4b405f7464d89a7a82c63f8a77c1053f17da7a96dfc12f321da6fd924377d5e353ad020d189575e8459858c95d1f537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5669c9e15901c2ea73965c3eb1610ac23
SHA1f18b196f927d7c33a36e457b7c9cc8035d9da42c
SHA256601ba30f4181349d83f1b19921e0e77e73fafae57fdc0d84389d3505fa9f45f9
SHA51208b967dfe28ef43b314064c26af220c13bff8dacd79999c61965f70606122f7ecff8bedb87081c28ece3a376889e4bbc08c3f4da857f4930e0484a8bd6b7aab0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cad64145d4015e18df503c65f91e6713
SHA1cd9b5b9cc94c86ab52a2d9f9315c923c8de73cf7
SHA256fa4e2634dae80da2e814f8db576df553a01b53840a4707b2a0ac39f2f4e138d4
SHA5125c357e9ffb49ef9f4b79861bcf368c8bf056f702ee6f6e803e30b038f512318059d75572fbd5ac5c749e8ac5d155bb8ae5f5d7fd0f29d8507be1d2b499db292e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a2ca64bab0289418dd5d55017953a40
SHA1453390117d7281b33fc2cc18d78d9b89c28d0761
SHA2561aad65353ddd5c0f1d565a48c37dd42049518c941873246a2ab250d885eca850
SHA512dd74c934c6af092cadb2ca5e088e7f86b8636620238f65ee556fc6fdc693163a70c0ffcc50c537541f4f542c03f8ee53c9d504b2255becdf00d07a6e83160853
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b