Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:06
Static task
static1
Behavioral task
behavioral1
Sample
ea7854db1b323106e65088bb5fea2459_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea7854db1b323106e65088bb5fea2459_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea7854db1b323106e65088bb5fea2459_JaffaCakes118.html
-
Size
461KB
-
MD5
ea7854db1b323106e65088bb5fea2459
-
SHA1
7bf823998e994e8f2016c7699f8e0c209df418bf
-
SHA256
3696572a5d40221a54200dce4004c0fea8109a231a37fb246b4de00f53194733
-
SHA512
bed80770231819fd0eef6650dc50802f8a50f81c3b89dfe3975b087b589f3d41897066a96df3a2fa96eb53339e053ed24c45aa61fe91af0a47920f543da3f739
-
SSDEEP
6144:SCsMYod+X3oI+Y2L1sMYod+X3oI+YPsMYod+X3oI+YLsMYod+X3oI+YQ:n5d+X3Y5d+X3d5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000888caa92c3a78701beae8a0313272dd6a1241cc78b58d5f6d0d17e9c52e47dc7000000000e80000000020000200000001c5a2f095776458d4cd9dac42f293648b908f10e46018a83a0043dab108aeb6e200000006c028019005a2021ffb63854e902b7000ad3bc3f49c51d1add2b35069a7a90e3400000000df01863c04230df6ca2b91ba4a4f82eb6217cd5a54af10bb22a7630aad5a1c0b62181d852b2b9b1ed48ecebf7aa49b2d7babb5136915a99a1d97b5205abc802 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9000d909410adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432877065" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2FBAA201-7634-11EF-976E-62CAC36041A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1860 iexplore.exe 1860 iexplore.exe 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE 2348 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1860 wrote to memory of 2348 1860 iexplore.exe 31 PID 1860 wrote to memory of 2348 1860 iexplore.exe 31 PID 1860 wrote to memory of 2348 1860 iexplore.exe 31 PID 1860 wrote to memory of 2348 1860 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea7854db1b323106e65088bb5fea2459_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1860 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5f19930a29dd6e9197dcf6c89ccc175
SHA141d5053a7f321518b521b44cdc21637e29904050
SHA2563ada5eb66a4078615e31ab18d23ed4ecb3d5108fbf22109eefe46b785a65a48f
SHA512dd98f5e56ba902a5b846ab43ac25747e04d91201c59d20b9df93bb7439cd1f5a4cea509f5a659578a470a216c3639d0737b7eaf0148acc6a4bd9f2030c3ffd65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be1820b052095257188c34bc678b05b7
SHA1a5d8ba649e5de300d6a7becc1c999cac64e76a09
SHA256cd8edc8b879942c754a33f7d5682237c3f884adbd723cc9622ff5740383525ad
SHA512c4c977e746cbe36fb46556de4288d1fc32d8ab118816fb68d837a0773a68672dfe4219e4c9df66073ad76f85118ed1cfb0fa44fbb1180c76737651014ae14951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa8ff65ac83adfb99c6d2fd73f8ac4c9
SHA1272917d638a53ae2d784cb863d43f991ef7637b1
SHA256102a4dba0446efe4ea7daa2e85d5f8b79e6524e2d71ad634b1a243193a370e74
SHA512484f622dfda3d0465906682a8bd2fadefe23d9c10193f7d29c632a147ae61e0e0c8e3d6b3b69cdafd5eb2d02c50af773348fb3a219bdd8320a1621658a543da8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5339c4d20d2012e3c8ccd2c6133df1c36
SHA1a1ab6092ec2930314f9d0dfc26225b5d9a2f7ddf
SHA256b81427fcbfaf0a2779e384f7ab56f952ba3d7575e8bc7da5471d646902718f78
SHA512905c29e1f2efef6fafbbbaae94bd24555159302a4713b2b6b5397a71637a36d3492f294b71b3eefac451eda36a22aa8db8235a4f83a37390f6c93d4eb91bb3ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc217e988b8f79151ac63c79631da2d3
SHA1215b728d1f58ee91321d32d60506fe810b3abaca
SHA2564eb20394662ee8e4e1c53a10684a3a2699b40dc4a574504bd7d06f072678aad5
SHA5125e4ca938e0280d55df091bd617fe4f9d87cc2c9c216546ec9ca5907e26c59e97f716f24b7238b41102494cd3f91d9c1a197bb6037314775365a51f13b2ab3f5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5531d8093a5d7693dff3a37223aaa150b
SHA1b1ef800079416f539bbd00b24293b3957803e0cc
SHA256d897ddd29fb227fe62ffc8f1ed08a998f1b3f0eee5148b887e4cf819f6571afe
SHA512f4db06cabf6731ba6648dbcbdc3b32f7c1e665d825448455fba4320364f20b6c8f253611410c175711d4802f566c7a5047534641b7213d12397a7ad5a8ae1f4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a526d355cfa82f1b4f7b68c7da6bd26a
SHA1043fcf7a38adeef1e144019f34780641203f2bea
SHA2568dfebae4f030bb65739da8bf347116f1142af901bd38ed3fbfaaacef80062ab3
SHA512b42305afd02191b8bdab35e6a1edb982ceef9595457f4bad32279ce80cb065a0cbb78a99aa42eaf1bee8b4b2b68bc25d843d164921984570c6384ee8398ea6d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5492f5484479fa4ffdb52df273f03386c
SHA1e09753737e9ef349cc838d9313b4cd717d7098c0
SHA25615189c3ad39c2e8af48e1fc4eb31cee1ec8f08df4fc2951acb79dec867bd674a
SHA5123c620570def4c4100fd35eebc4432f0283a8ff503a201d22c91949b296be3905f60815889da2aac9d432d545d533948637b8c6f3b0920511753820f6903f6221
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2fb016e500c0105210fd0aab39da49d
SHA10ff94b270bc85d204653dc78a32e12accc6b5ff2
SHA256970aa02dbd8103504f6324a0161fcf3bbc471153ed8a334c392132e7afd9f7bc
SHA51248c7e94909b6d416f1506f23dce8d74a7dd73a8240a05f65baf26e3dff7280e1b4df12567eac5d3c6ddac2ab221763a5b8e51c6ef8096c8d5253dcec5e18b841
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5695eb4fe1b3b726b71125dcac3dde5ae
SHA170c51397473a0ab7bcfda71762829036cee172d5
SHA256468ca6c34ade673294e0e72417126366fbef51eb3fd32d5c8d169d30cccaf08b
SHA512b001218d41a3a6b09ff31e4bb5e0f13e288bce77da6baca1b697cea2b8b3bb136ce778d02def7276942a34d89f19c39d3921500a0b691df35012aa183afbed63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544b4ffa6358fa5f2a8c9be4e3bfaa8e1
SHA1f2bc98a6d5d69c340ba381e2fafff738a3ef3ab2
SHA256846fc062ba79aa8dc0166be913533ceac7cf643d5d0c5cb9e8c394d6fc6a6318
SHA512e1e60e8ddedc6e904ff9ebec65b79de5902c038315ee6ed7c0636fc7ce9e62ed5420740623b714cd15eb3943010add8e4f99eb649fe22295b3054c231143b88b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5993384c45c646fdf75bd57d00873fc91
SHA19d2ec34213a9c7ae5aea48db3f794c87af2f997a
SHA2560da21558ae5d5cd7a20bf642fbb5d8077612be767b5e7a4070cd4dd6ea5df8da
SHA512f58421093bb490e57223d4965940338bf0e50408eceeb15947ce2e344b3d929e7b03aa63e135aa1bb162f1d2e34a5ba6cb1c98c41e5510fd290409a43ff764f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516b806dc5c2806ac35aea50aaee566cf
SHA146b028bb1fc5e0eefc11c13ddacd30567f1c5517
SHA256452869b6e2e4553b48eff724a098050c11946bf11802cb116c28c404ac2a6598
SHA512b5fd90c3a1a46d325b66e345167b497b13f3e571c68533fedaf25b8dfc2d1fab0cd7645bed816d88668c5d0ad825dfb632260b883776719e0deff9a02c114f0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e96523ff2193a8ef283c89ff661e53f
SHA1ca0c8c22db971aa700ea77f298cfab50800a0174
SHA2569b3730a19770254abe00e82afd25dd5152cda4cee50121f6affa1c34922ae303
SHA512709c0bc5c1ddce0903a44ce81b7ebfd00bdde11db8e64d52b78551983254e8f0811ff500b9c0570d568b39d5d48c4d27e09b862e4e7d3cc0ea571eaf0f04861d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cbba88a0b1779866dfe1f8692e1b3b7
SHA18fb9f8dadaaf1d74e3065095381fcc5cf9201765
SHA256516c9b5daec32d50753d062dfc18530ea8c7b93eb77250ae8585586d8d1db920
SHA5120f3e89556d0542071ba6bcedbf7c2e207a764f38aae488b25a152ec989ecda9b8884c1dd2f23cbeb6e10a30e897e3a10ecceefd613a1f08d225229439edefa7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5361dc7cc7620f75327ced2ea459513f9
SHA1bde1a3d8def9996930dc8838c30ebfed208e5167
SHA2565fc71ebcfdedcc4de25e1e52fad310ce9f119e89152ce44b7529b0fc1072fc28
SHA512cf0af39212f04a682efd27aa4a960d8e495e5fe357d613c8f85a7289a222465948b1cbba04e23022d382fae9c45c749daa447d39152b395776c1141bebafe82e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da94ed324fcbdbc917474ee2d002fe2b
SHA1424efcf4c5b0ac3ca6ff837fb18adcc0f6ac4a2d
SHA25660b3fbf54b8ada1c13a89d2056c915ef71a22b84086d2a64f9b7cab39038b7d8
SHA512fa730be9eb59f3413948d626c3d655b77da38f0aa25056734c0dca5b02d358d0a8633106f873a45b20caed5f4238beb5766cf4eb65451ebe909be601bb0fc6a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b91ef109c8f0569545e184a934ea81f2
SHA1948280a26a0b355433bb35a2d127c0c409cc9d4c
SHA2568f167720784ee06af45679ecb9f3897dacad688f90c6adffa85ce1955ca352d4
SHA512ec337eae33e683014748c937edc7301263c2783a7478b3ce25fb2c8cece98b657cda70e8234ec20555ad0271b7119f94e305237b849fbbac070f57cfd5fbc339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc718c324ce6dc6b58c25b37c8ef514a
SHA11d7889a1d485ecc463486f2e5da49f662cb7e4f1
SHA256d3bce7b4af5f26a909ed992cab3e21f4ded0e8511d53e9456bf62e5ceb3acb30
SHA512b5dc4041f12340edfc119ff6ffe2c30acff5ca9cec0aaabb48c20fd838d01a6c2498fe047c630d52cb35690a79b8ff2c4b49bcfd840907e808dbb1e62edc6bf2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b