Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:13
Static task
static1
Behavioral task
behavioral1
Sample
ea7a842d4993e7386baa1ad08dde080f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea7a842d4993e7386baa1ad08dde080f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea7a842d4993e7386baa1ad08dde080f_JaffaCakes118.html
-
Size
69KB
-
MD5
ea7a842d4993e7386baa1ad08dde080f
-
SHA1
d2eaaba0b4287b13428275a223da22dbca0bca4e
-
SHA256
40d1902741e09861749fba53af316c12ade54368b69666985a066dc308b3d9aa
-
SHA512
a78e997ee8aaec78229a4ad5eea3c57292a9bae3aaee3a351fff09d055d6f695fff039319674e83f5ba4e173dc8ba77a2873915e07103b379d01a95d3c06edc5
-
SSDEEP
768:JiWFgcMWR3sI2PDDnd0g6Q3xqz1oTye1wCZkoTyMdtbBnfBgN8/lboiGhcRoQFVu:JN+9JTvNen0tbrga90hcJNnspv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{18CA0621-7635-11EF-A7E8-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c063ddee410adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432877456" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000c5a5234fb31e1c279ed706418f3e12c96fcc0706851b91bb330ac7d78d906a62000000000e8000000002000020000000772310517f1c88e6f92ca7ffe795a69af7b8d86b4b0a67d529c6f9625dedd0bb20000000e626475919ee44f3d773b61d16c1295627bd56afd27cf0e4f4759c08efb9d1f640000000d9665ba305fabd7150ae07c5a52c6277c3c9a281de75633dc6a85a9275c76039e16c045fe69c084dccff865bcd0ac4bdd59358a27c153a2f5e5d6d82edbcb3ae iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2528 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2528 iexplore.exe 2528 iexplore.exe 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2528 wrote to memory of 1712 2528 iexplore.exe 30 PID 2528 wrote to memory of 1712 2528 iexplore.exe 30 PID 2528 wrote to memory of 1712 2528 iexplore.exe 30 PID 2528 wrote to memory of 1712 2528 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea7a842d4993e7386baa1ad08dde080f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576eea3f9388bf3086e4b7c2025b6e4cf
SHA1e5f8aa669cbac793d49f0490f1a6e9ed47d8f9f4
SHA256af153107c697e3c6f95f5898d60d8f8ade7ce414e35b496ff77049968ddfd8de
SHA512ac223f5c93efb58f0dcd207de3abb4cf7f0905de7f257dfa32ea70efccd0470afd8b67e22d39bbcac00ad28136d41e843333f7663a5eeaf4f4531af2f952adce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55feb96fb8d9bdbe14078cb6eb3210ee5
SHA111b0981066fdf5a0bd36fc33d330e3c15a5d862c
SHA256074bfee4ecfd3ea428a38648a5388fe1b62f7186e890a1f5feda52c1126e2266
SHA512fbf8aea67a0413b81f08d32090ad151a5f160cb851434434fa5f1f518dcacb138b6843a0590e0fd2cfab9326712b60932cf90f9e2bd6c79845d68bb950c114a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5835bb8c9df1bafb5dc1d713b50212dd3
SHA1dd4a032ccce4d73f098cdb08afc5359b97adfd60
SHA256a2e211743f03125ff52f7864e360795e828797cbd1614344ca2acf394f70cfdf
SHA5120de38d23ed5125366a28daa78799979a699f68937e755062502e6d7424cbf05b1e454f06772b12595e1c9e04088782a840188ebb7e5e5f37d1df3323b2249d5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b77f93577402ef6a885909a9680c185
SHA15be1f0073faf17ef163ea065d6d021c66462db8e
SHA25647e22219cbaf58c604fd6bfb6ef569f26d0533ae8b1f7e4246bdf8620c4e265c
SHA5121afbf7111cb2866fa880e127bfebdc758c0e67d4f39aa9784ba770a1b83c28a9954f5b310751738178c8768b46d2e796f4bd0034f8b964936617404abdfce7e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5042f899bcf6d0002967a99843e072f3f
SHA17cd5a11a90634f2c69a92cc4ffcfc77ffb36ea08
SHA2561c11784e6e8d34d7a1f127d48da4279466644ed3bad1439554e74bc85208d2ec
SHA512b5e754009961dfb8662b43b5b34f16ca3cbc74940dc2ae933998d48af6299301d8e054423dbc03c76aa52a0aa1d10385f281d79670c7a2b210279fff456fb0a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5798f2410f1735ac0dd5d137bf322f98c
SHA1123ddb5cd4aa79767fe615259723ab7882433810
SHA2569d860daf10315b720182512baf9d410890657d5c6f3948c75d4f989f0a3e92df
SHA512e65319a1dbbf4dc8ac2914f9cf358fd8563321de87c1d15d12e515fea30d84f481f6d5914ae6ac3ad5afe3a0f9596aaea2f07c74c92ac76e2e5bee56693eea40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2a75cb847c98bd87c965f928b4cbdbe
SHA139378e265a1e2ad6f545876d29f314b560f17ad1
SHA256cf7c1c1931ea0d02df17ae9c3f7e974fc3208a61a4b8bae152b856856e008613
SHA512c31887f61327ab19dcb42c682c5defe9f4b09613fd31fd6501da78ab889e75ac6e9bfdb7c0f7391d72b816d9f48508966c9745c64172baedc7c9c2c59101aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a497f9b8d9008fbfaee1405271db5537
SHA107395e03b7194eb0a8377bf2e2d65b0c1e5f099a
SHA2564a3f318bead448c4e19a2146da0ee67bd1ce6692d28c88522c1b8ea742632c83
SHA5128a1db73de187b9d7c7708763d6d23ed23d893ec43d56f88d6ba25c685a4d23b8c7c79acdcda7cf703ad16010561f45bb8a7c09cd527f541cdc7a113501d1f7a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eac00e56c499f0934bcc1df39b86d4a0
SHA13ed62f24135ccff51ad9daa6a250561afdaf738a
SHA2564e7d16a1582867e86b4ef697d3855622458e8046a59be4a07b246c060c6b93b7
SHA5127c2d54a441768590639351270f5aa7c8171a35994556f73f9f4fcb112f36dbd2a7a70261b594d5b2d6f77419bedcdd0d9d2246edecbc3ec794195f8b8092435d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5840c4b9c61e8f7846dbd46c4637868e8
SHA19487faa9a862a111651f420a29bd10c1d0e5185e
SHA25694ba346ab8f45930b7d476df54ed2f108a102b029020a63cc1618ea2432220eb
SHA5129b0b641d98f335a1b99edd36d2cbfb643c3f54c8d5929128597285509c0b438ead96838e38f5aac294660e3813179723956058d06a0c32b4786fe26d00a55da8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577f9f25d0c0c880617e35e7ac5c7437c
SHA175f9ae7ac25dbb5a6e6dbbcccc3ea8e8822b3560
SHA2560fbcc6a0764513ab7240230dca573596cf9897edd86cdcffeac87b353f415995
SHA512b01e835a860125847fc0f5d54dad4d9bdc3633eb098d06bad47969680651a66cad2f5ecc58cd38490680f0d5c9fc1fbc5c682eaa00509a20e363c35f08e656e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5478848b3b6ff86e3b41130a453725b1f
SHA1d71e61c0cb09f327b7f3f66b36efbc5d97f750b7
SHA2565cc27add70fcf1d40d1be1d7c421bb07e82bdaa0419b03bbcd96f0e3908e1593
SHA51255530c479731c11227f1746854e93bd7a15d5f3ef34dc39476fe65404d701883e82c74ee1d12beccf04bfd419537ecc2ae6048883f5a561ef52f701cd31eb7be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568ff56069164e1fbfb04b9154cf71024
SHA13d00ba26294ca95c953e008cdc616321ffa83b72
SHA25679eb50523758a038f8a9b2bb0558bfa2e94777a97b10fb5a72efa062d352e546
SHA512d2b750e0a836996a9e83eb0584e1b8c7f7e03333871b343a7938fbf7fa6d77d44d2dec910d3c45d86e0e42187f116b3f2c8f51d62ee7b98ee862935f991c9593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512c328cbb4d846f90b498e92fbba1478
SHA1d415e4db345f5098f0c00e185a108aa173154fb2
SHA256e912d6999d15a81ebdcd00a25f644f7207006c0ee90d31f23ef7724f334f29df
SHA512f026a5cf9c7c8dbc87dc991af7ff0edc9bd5db620887c55ce38f17d84d57a50bcca004d5a12fc442872c99512bb5f73740750156287491beaa774895708235ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5184819d0a2264364c16f7a5b54197293
SHA1b554e1abf061856024f8f5f17c905c166edd052d
SHA2563a28bcb3c38d70ed957e15c775f5f08b134c39dcacb7fada0513caadd83c43ba
SHA512320035f0979ae5f3d35f044203cee19f75d1361698a9f8d26323e7a9344bf69888c5b9728549b523ff251e6d41edcf774e159eebfa1c951b3368ff98743e6a5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b912a3079c5c53e1d34fdaaf97ce286
SHA14dc047cd4fcc6efed53962cc9c2fe4daf785008c
SHA2568fb38f6270872b184bfda07658cff940b0040cd0c99a91531ebf6d8dd872ca48
SHA5120822287ef715afe6c6a904c20db7a5a8c6d670679abccce5253aaebf1ee1aa7fd33a981d15bcb19c1d718704e04278f98dff5d1d0f25afe3967aabcdd8e8ee81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee1193d52c43bee5c9d2e58de15fcdde
SHA173e40dae7330c000f624543af844f01526d4345f
SHA25607f82f2e52019373123f48fa1690a7efc763e8bc6475b96950a59c53fa78ec7a
SHA512cb8a82dbe3719401c1cbae89cf978e1e9dc4a2f3446a121a539311dc4b6d84dec00c6d4ba5bc2a19f6b7b78dcc5f0b7b1dac73bd4e9e155aecca19fc7fc9cc64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599339063a95bb99b285dc726d0422264
SHA1cedff67d07076245e67dc5de5e76d17c14a7dbd8
SHA256fee9495b4f684d31298b3981d76f6c18ddd65e5effea2d6262b32f2a452fe2ab
SHA5122e9daf87dcd1557b855111ed8be142bdadecafbb46409bf6010fec6d6494a7a0d1dd1c1b230d9443904139a675f61754c9135a39de43f883838b439bf7d4ec90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d54580411e2be03f1dbbe6be3a0753d9
SHA14bdd4e9383e534d299fdb49a71e8b25eb3217819
SHA256fb97d6417c0cfa438dfb0071e543b2da684afd7f5088c88180de373b0a2b3401
SHA512b007a5de3e1744e6720de09602a619be36635474136c4734358a860e17331eaa1973d822253275eb5073047fbf80e4536e9f46f33e27c489af05ac8955276f92
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b