Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:01
Static task
static1
Behavioral task
behavioral1
Sample
ea77051a97b4719d69e877b764f0b1d7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea77051a97b4719d69e877b764f0b1d7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea77051a97b4719d69e877b764f0b1d7_JaffaCakes118.html
-
Size
35KB
-
MD5
ea77051a97b4719d69e877b764f0b1d7
-
SHA1
d233f25aaf7dda0f98d6c550af0747223d5bb716
-
SHA256
8cb03158d74e24d61b86d13548b673de6cc0b56dd9e2f137a4c895f4b27c725c
-
SHA512
c054024b118b714171a86d85754ac385a2c04d58d56d16273497574face40909585e676aeccd0c27c8faa8ac55810137dc8f83a63f7c5e132466c1b6ae038aa5
-
SSDEEP
768:ScPD84AX7Qs6Qceuv02OFMUk7nFeke/9PRBGkz60hu/sr4bUJDSNHWhin539:ScP5AX7Qs6Qceuv0zMUk7nFekyzh4bUc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{881AF361-7633-11EF-943D-F245C6AC432F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20435b60400adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000994fe39f5010388b7aaa183035cc6c614450fb16fe8235c55bd87c8992d8aa06000000000e800000000200002000000035ebfd1a49cbe2efe65ef82f563dcecf149e7588babea85bbc1294bda991b03d20000000a21245c7b6dc0cf018072a98f9716ee6a7aa82450bab86fa58fcb638973c108440000000213946df3ea110d7b38d249135029e29997d9bc80f73b71dffc1fd49331d36a98a598e819c4f88f5c7b858389896e80aae3678e8406e9c9ca5ec17dea0893263 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432876786" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2712 iexplore.exe 2712 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2948 2712 iexplore.exe 30 PID 2712 wrote to memory of 2948 2712 iexplore.exe 30 PID 2712 wrote to memory of 2948 2712 iexplore.exe 30 PID 2712 wrote to memory of 2948 2712 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea77051a97b4719d69e877b764f0b1d7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2712 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e646b11de7069aa649de2f10599737e7
SHA1e49aac9a0764b12b71a33a7871122bbddd8b15fa
SHA256cc0bc50e51865729be417f02c4c62c87237f2a974aa0978ce26a20601f1ff7d5
SHA512398403a5ae6561e5dbd5cf132ca2de7c8de71d12584e57d4e38229dafb446445a9fcbbe68293031a0fef5208b4035352b5d46f18fbece2b21222b040663c2ad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564e4f19417b95fc25c0c073787354f9f
SHA17ddf4da33f4d5436f8b7729d325bba9c73e55253
SHA2561818fb9eef45d7596a98dfddfb392c438d355aa99528f57963d04908c1842ffb
SHA512ec555c92a7a7d80d364393104a2b723ba8f44f14641ceb510cd206623edc8d377e65a9a7f6b288455b517f383f048f245e858e6890659fb54b970b5283bdf09e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d80af51fa3feb4c01174668543d0255
SHA1bd542ccb25c2fc618c60450b44e709269a1be8c7
SHA2564a897335eba9370a2ea21dbbecaee7e14f096403703e7efd73f0c64def6f5590
SHA512e9a17d47bb1de00cedfbb32335468da766cd7b7633be30910ca947d2aaf5152bc603749b83e5c35eab928ffbf37b8f81c84fd89f1fcf1ecf27b2db538b0e1f56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e882b3510296db21258fc45adf3e08cd
SHA1729b3c6ed1e96e305d9d166a2e15ad5b3b0ff52e
SHA25643c8be8c3a819aafc41804b6888475702894b99a4ea2363d4f184cdfe3522527
SHA512707916bedc0de486414cfb1f792facdf96673214440d976c0bb1a04dde1e7806a69ffe8f289f31aeb4d2c03f78bf5cf03ec830613d9e306efc9380cb7b04c12e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577aaa9dda309c9f55871edd8a5df7301
SHA10d2b3a954ed79be636d0ee0fa4c67f83019eff82
SHA25677a5b2fa6112c819f00a4927726ccc09f465c10500360fdc5dcdc7d9358da08c
SHA512688a6d36faa39db144ae8b5a812a610d977f13d9cd0631668a685ccd585722314c2d053723266d57e51d4e910c45ca2900ec4a6da2850493ecc41a885781d264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d06a51e171dd2852719ef1bf5232c88f
SHA16cb12aca0310dfc24edcb17cd435fd833d578bd7
SHA256de3dd368521016f67b7244c7f9a2bf4b928560358650f1f554a4e8fb9d608392
SHA512ca40a244dec3bb512f8fd0fb798126ab5756f93d3e38e0b57b49954f7e5642c9235aae7e4a138e47b3fa115843a491bd6cb0676f8a896f5fe2b2ec9e0dbae0e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5929a441427de1fb819db70dbb9adc77b
SHA1b32d39f820b9347fc83fe02411505c37975f6574
SHA2566cfb7a6723fb2ea602dffa84833c0c006548cdf11aea9041e73f30c40a127d7b
SHA512f3bf09e28f36a43d711d4e90c8ac63f64e26106b0e39de49b28e53cf1f3efeddeb735e5a53893dd31cccf9e3a42fa906dcb7bb56d86736dabf7869e1741b820a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3c2213df4ad8c293258024ffc44d762
SHA158b4444a3f9c96ffc865a6902db3280820df4598
SHA256c8876d50fdcf3c76f5b8419a6d3fb257e61e2cb9b93dac983d10f846eefea707
SHA51254a868e179db72cd06712f47ed16800f38c3a32a71ab443f69e9b1bc8dff4c4000421577b35e4b8d3826dfa192fa7fe8942c7c681728b37f942cf62254c74af1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5183d138c02cc77da10fad01f4c0fd519
SHA1554ad5fbef4f6f6f0f72a410d7b2141608956d7c
SHA256511133431dc7ba7b57993a962e4e7db3f5f0d5f4a5a625c8c6efbd30afae0ee0
SHA512afcf47af1e5c6d906566392cdb769d60e5416658688198979a4d80f2c62175c55ddf392f6d5c0c0d23cd5cbbf8ffcc217241c28dfb83952f42b72696e5f9705d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5743ad55297fe271a4309d6a5bcb52af5
SHA1091e2eebe682e39e712668dd43a917ae213363a8
SHA256d4e0b3dd961181e4496da6d2830bfb6de0bc7b56b4f7459f63fe3fdba48624f8
SHA5129732dbcf5ed66a246c193e0ecaffecff35f2869f19dc9a26f5a5e6570ba4ff1347ff344dce3241e439b734035b769a79d0460cfc1d9360c301f8b4ff7eb0c9e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b7024b34dd4ef62af822c8e6e5ac396
SHA18c34ec02495374749688db14fdd1efaec38fbdf7
SHA25685b3aec4ac9a421cc9543f3b98b0fb01c61cbbe05d0df859464eb0fbfe12c5c0
SHA51239eff24cef20d7274be802e5fd998b0519337ff737a95022136da62056b8e86b32ddd048c025d69a999d6147c0d0b05a77ef36a00059a7ae9d9fd306e758b863
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7df690baccf393b56ff72223849fee9
SHA1ced49206f5dcce3b2ec8433283a4e34085ea11c4
SHA2566c4ba1df8b94a88e4fffa11d2a6493b67f6ed46c26789c34a78104c88269d83b
SHA512f9eea1be9903279d65a53cb94fb1430dbd51f4b35ee95d2882fe2926f7616e83ebf30e275cf6601c9dbe8463adb26163646b3914a50d70fd708a239de500f42a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5660dbb6d35e25512c508a6e26664d809
SHA1e6b91ad47a77fe0260c824bc1338a26654627334
SHA256a4a5679cfe2e4ade9a86d4bf491caac9d13e780fe39899e489e1b5205ea3a559
SHA5121a30409efe25e1a2d4a89eebd41775f07edd21d13c409477a7f75ca147f71a809c5f9ef035e81152bed2d80174ef1277f32a8813e013f8df9e80fcb8aa863517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fa6fcbe15065edc8038ee3e73062791
SHA1482618fa0ee799bdfc03c62d331243b6ec705c46
SHA256b681e941c204a6a874154d9e40856cc3c2172fe63cc2839e56a67febb731c78b
SHA5128cc6d9c6861f3184ec1356ca7ee8a3f3f347454be096c184927c9640531e6f3494e71014e7f6ea48a2bf6eb6279c253c62c2b1bd564b33b68017745cfc849e45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0aedb2beebb71d8e64d4c6272495a04
SHA1f21d85eb7659dae3c27c1eb11efcc4890a3b9948
SHA256575e9e186270257a8910c6f2bc5c53d3273d990df600ac0310614236643f8fbb
SHA512c26163101b88bdf7dfec8f04586e6ba668e6c498367e7535539363b83e9a4692bffcb2734a40bedc0e96e2210f604cb1ae787a0313e86014601fbb023a2f1a1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c82fa5b685b7f493eb417f290c90be0
SHA102715c937bebddefa290b3327dbad8fbb3f544f0
SHA2568dd7ab1dcf21e45270067d74edd8a99558c0ef6839a82a3e293b937149cb1abf
SHA512d16fc8d7425f87fecec70aba54771a42705f1417eb84f771a7884f742e787940992103acaa18ce15b6d9ca26cbd07b021f4d896917f1e5ffdccf8bb4e36e4b9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5314a2689b498127b547e92b7b963ad30
SHA10ac155c71b7db3be6a96c3e9b08489bd0f369e08
SHA25699ebc5c9b224d9154e52f27409a43640cf007d7d14efaeb929c7c1651354c9f7
SHA512d609df2b40573f4dc0e2115d2e15536fcbcacbccfcbe723d8a75b9417556b80db63afdca13fe7a6484a784e252c695ead8bdc24aff82b077b5d73187b7ea1d06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5652271a434077295ac57632b637ac86d
SHA1937e8bc7eb4cef4f05603f3144984ade5e1a4af4
SHA256697712f018a72ed41704e7020ccf821fab9e7aee9e2f66af84e7e39c4ba2a1c0
SHA512d13159c7cdf69ab25d68e7afeb83cd931763ed5899568b9b1d44a4c8533dd818fa3326912ed966dc0485ae119e79bc24809a1a8aa9932d89aeba94ca0c5e0f6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a01eeae4f469e7f85ba09a8568229d63
SHA1277af9c8a5f5ea8da198bcea2e23adbf452e89ae
SHA256eeb3b0551316f90d20bd17649b216ad17f4a5b1b8281d7042694bc30229327fc
SHA512a02642a779df21375441947deb655e8c39cb64af7050a1de145e1198a95868394e21ce4dafa0287429d02204c46f1d95d7766479d9fc3d166e1ac7437ef9af44
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b