Analysis
-
max time kernel
69s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 03:15
Static task
static1
Behavioral task
behavioral1
Sample
ea7b823449346a8afd406bc49b50cb29_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea7b823449346a8afd406bc49b50cb29_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
ea7b823449346a8afd406bc49b50cb29_JaffaCakes118.html
-
Size
870B
-
MD5
ea7b823449346a8afd406bc49b50cb29
-
SHA1
bcf706fb2a2b202f39c8821ac745c9e8ba6f2d70
-
SHA256
329c7cae46345c6cc81d6b7b0d6ae15d781c61c1de72ef4a762d117992fad424
-
SHA512
2c1d16c74c8190a2d50e4c9c5b41b6552262a0c87f0a30c5ecb533a532ec3b1efb452a14176e0ef3ed9ee9fa62292b8390e1c7cba83389eca2c4aef66c2b8901
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c088884b420adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{768D32A1-7635-11EF-A6BB-F2DF7204BD4F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432877616" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000008248f7462dfaf67f5a3b0822bfa5c75f74c7d18ac7b6186df2d7ab034041549c000000000e800000000200002000000003b5aca8fa2242f7b138d7c434f6438320e56b63af2e567d95e980fcfda84c9c20000000275cf1c0e00ad86fe3565eb4dd84d3697da2db49c7ea5f615d7ea8a1167ee2ee4000000024b0d5ab5a85de8f4ac38af1fcfb7f9b3a077260a3740a8c23c0188e4d5d2a2e5509235e35b69abda47791b7954898895e81a0b3f14e57704d8793e11295c30b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2292 iexplore.exe 2292 iexplore.exe 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE 3056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 3056 2292 iexplore.exe 29 PID 2292 wrote to memory of 3056 2292 iexplore.exe 29 PID 2292 wrote to memory of 3056 2292 iexplore.exe 29 PID 2292 wrote to memory of 3056 2292 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea7b823449346a8afd406bc49b50cb29_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ed9929ce83d5691c178ebaa279e8528
SHA10360fb66e3c67043974706e264c7b5c9a8af005b
SHA256cba7413b05abfa579ef8e82a1452c290903da663e53d317c75af536ea80370df
SHA512887589a1f9d87ce4af5db6523dc0466339aff8c86e1625b6322455ed7c9e3bc6c0afdca11ccd71b8167c97cbfdaaad16891232b11a8404e91c6a2f61d39bf599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55afc6815b8352b8047e66505619b5423
SHA16a030a08bda809b2732f804264b62e4dee81680e
SHA256b139649a6e303ad6b0f6c868476f486152b65084a5f2595c800f54127405a7bd
SHA51250492a02c3e155df0fbcb60075e264b874b5766f2dab471de43927f6f9d4b470fb2093cc23ef4b181351e6c83f9d44cda577564b72325a909875b34d2d4d5810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c934a49161c90c6f0331fba555978977
SHA187d3aec1b3113bb0563675e2d0481cf4665db848
SHA256a1b9deda1525227ca25df882b2556d358c2ad567c2bf79fdf536a91026add0ca
SHA5129988e639d275bdbae4f402bc22bd4950ff5482fae06d940e15e3ae4c65bdd6ceb78f467249c5f248f6709eaf0649fe166c78f544c02e8e2965e0b57cbc82f261
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5151cff895fd091d569b208aa3fc1bcf8
SHA1c79e1cbcfdab95af1682fff69e475c0e203d3ac3
SHA2565040fd228ce466eee8bc7f092c3763a1e1cdcf769b4ef135a3a3c44a1287826c
SHA512243515ed42a4140305b915bfaebd3c65767d675a81366515bdb7f0bcc941e90f59aaca3f2c81251c787b67f1a760d74d06ba1861844422d9261158acb8ac9993
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e060a3c5b895af26356cabd217d2adba
SHA16aab64ce95a3ca86e328ebd83b2e37422d1cd226
SHA2567e83c8db82958dff1bd919abd43b1125d596149511a37a84bdf465307fb46aca
SHA512da8d38f829bbbd938e3b831f38460a3779673fffb0e57fc3b0c655302bbf274c843e364e31af4a127afa8f39ebdea3f8f7cf13822b7e1faa448d85f4df794835
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a50119ed1ec0e73f6d7f3ff5dfda5034
SHA1f9ff6447530bd902a3dc6578e9ad1f155ab117cb
SHA25679c543c20802cc7b30033b25edf3356c780ce556713ae2d4c309956fa8951eef
SHA512fdd26eba50204469188e797005f6c536672752307ae096de8a7138ea8fc361318cf38b18eb37bd2fa14b96f39a34e37c459b4f0eaed28dc929546f33d40497ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594aa014e5fcfb8e2fd141dcc8e550240
SHA17f138413c836d4aa5c82d484b97ca2351707c357
SHA256d3d51b1fcbbf7b857c8dbba42ea0f22bc87d3b6882f7f5cd4032d139093aaf8e
SHA512dbbfcf368bbbe71b7b4967dc12ce0dc36a3680b17b48b1c0a709d629c7c6cfa2d5b63407fd0f2f11b29c58c2ceaab672a18b76d1ce6b23d253257f5797593970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532556d4adf140b56fe22fe6cedbda87e
SHA122bce1b5d222c1e17352067a5982a49423ee6d4d
SHA256f8a7c87c0fe226037294540012eaa98aecb8d5e33bad904f50cc523c84725603
SHA512941dde16aa2b3aa3b99ae0a7e6fae94bbef1eab8c00e59a549aaf083efa2562be6e12d8f85f6eb661533618deeb722317eb062223f031037178e52ac5b54ba8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c97900765209fc95a48e0484841037f
SHA18d0dba44167b5175e251d5224f29595334cda751
SHA256cea12091065501ebfca316db768ba9595318300e59e854f3707ad7e5dca20075
SHA51227dec75e0fbf0e8da0576476460c2e4c3595765c422438b228e2c8bc06b75d700482f8f9d8d88f8347fecdbca6ff610b5383d7475b3d73af5d16fe252c64a552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579b003b2a860c6d34a6d18680899c9bb
SHA1c9a70bd2b39754f4c29f60d97d4b5ed44b09d4fc
SHA2563ac0593b2b3d6c4681f670d9f1177a2db11c6a98480cdd81144813def19129c7
SHA5121a518f7362af93a0e472f3c7485ebac8384585e6fde065cc6d468d21ef10f7e6f2a3c9ee1ea2df9257314bb9fa047451e77bb79fcfe1c2b5c70eb8e0a87dee39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55607e70209c35b01d554ec4b43785243
SHA141414e4eef1f7de31a3faacbe48f6871d39c3e38
SHA2560d6dc7d7d3d82eb77e0c91eb8429f69a127e2864e21b5a78bfdd1e67cdc90850
SHA51203cf53e58e49e3ccb07f9d0fdb712396998612d65e24609aa590f34653f893d0b433d0f0e497bac7ea46c926f1e5456a28f8439e0966e7551505d3220642ded6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d08401bef87f583c8ef4ee4d027a36c
SHA16d2a2901994f7d8355a097fa91aae70e680926d6
SHA256c366d855a4202102755002574b750c50d8af489336f7ae2aeedcd770af476762
SHA51220f306adcd429cac81fd92d790b171d16d78d75191ef4c5f99db85a5b8c47d5d21395e24f51753433627f90bd7feb18867f2bbce71a2aa96c2e1513e20b2c4f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56422cfd041d12a3a313925cb964cc337
SHA16148424870fdb5ea385f61977cdfc87ff2b39a0d
SHA2567c2a4c46ca5622c759415ae38da14119a09300eb34e31becafcf3c6a28f22e0d
SHA5126c76cbbd86d43f21d91aba0d8b1e498194956c2481ddb8cd47d97405e2d4463d6fb5e95a7ef55e183242fa4e22771aab4ce02a41c05787b7b0f7e69b931fcf36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caec9e1be48d1a79d3bd9dc7ed4f00a2
SHA10ad23c19b719a0094ba7bb5df268d5c9234b8ccb
SHA2567b078a348435cd2d8c6c3cf7a5549c72bc7a9be27280f20de647222cbb12b3f2
SHA5129f35678552cc1760a217434a3fbb292f14e0c974d57ec6cb3179743054dcdf6c0cd17c8b97a2b1c2c314b386fe520ba05e7c98f8251e02d9ca11520985372c0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59921dc4840f0989d1ed1268101fab5c8
SHA17835c062ab89b75e1a1905c050a5f7f9b6b1835c
SHA25609bd3794a5a29e3b11d059985ed1d7e72828acad1488ba5e5fd7b7283eac40dd
SHA512d10aa600e8eb9ca34b2a5673f17a5e2e93bb2559650882409dacf1bcac669c0ec58085ea61cf4ed9853ac1459ce164c92dd861bdcae60cdff88e6a6d1b025bb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eba2f3459bc1d3f925b9cc87c4b5ec31
SHA1925a656220aa2867080347a95b527cdc6c5ed3e5
SHA256c50ba7d9adaa1d9b8d0614bfd402c3343a5187c047bc1b44729d2a691afad73e
SHA51244b46d765ad5e56a84b2485be9088c8a1235b36c876314bd04b986082d3b190b63d7de4d6cf71bf74ad5aef7013a2c910f456fbbffa93bc4186f6f5b57336689
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5090869b121d753541fb7287acd5e7ad0
SHA1a10a44960ddcfd7772b709278b8ad27324aaf28b
SHA25609ae268ae035d1c00429467e15ad1715062049128e4b733565da8b545b2a11ff
SHA51269a9d365b2447892db4a37e03131890e5a78ef9b0481e0f118a6f80558e856aba43d6831caca505292556ff0eb2fdab661e6a1cf75b7d10bc06fd77413cab4a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9ec411ea6738153bc4b9c9398b26fa5
SHA12de68c2261e9e8202eca0969e0202d395f15162f
SHA2562e73722fa5bb2c38f02bd7fcb6e01ec9cb2f3aee8c8a4e3b7b693bae1da13e0e
SHA512f14ea6582e2df8dec7e9f7b3365f747491e6d22c1c1c6cce00013db40dc3c80c69552d87ac3aebe098a5d97dc6a6e7a853908e59dbf8f9acb671a538ab75a4b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0016104faa2153ff00742bf3a4cf105
SHA1ffb866da5e787f129690b643de1cd00ae1cd2803
SHA25653bfc0f00f17561518e9681d6ace9dfc391bad6d31dbdbf57967aaa44f94f8a1
SHA5125839652db924777e5bb496001add27828900c45f0cd2080e63eb8aa945bc9266e5a5cff24beaf24c0618a321d889fe81a2a8bcb6527137fdac3a568a33958914
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5f34b915a0a66ccfdf59e0890fb78c7
SHA194928b14f60a86cbcec510a78637a025901957fa
SHA256773bc7b14d592a80ef165944345be90afa10a986d3ddec55e1f74c8b94e60333
SHA5124ba8ef4623b3cb05a31304bfd77da8419d60a882204b35fa095c7c862f1344f24b7b60cfa896c85bcc80312c701fabb3426f7494f620e359fb2003a2cccb0a85
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b