Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:14
Static task
static1
Behavioral task
behavioral1
Sample
ea7af5cf5453c0ada742cc06f2198b2d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ea7af5cf5453c0ada742cc06f2198b2d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea7af5cf5453c0ada742cc06f2198b2d_JaffaCakes118.html
-
Size
8KB
-
MD5
ea7af5cf5453c0ada742cc06f2198b2d
-
SHA1
dc3f75c147518a7a5452a6c903190635d6832990
-
SHA256
477b320240d46bfee1c6db2506ee16ef7461a572421ee948b7c82f9dbe33701f
-
SHA512
ef6c4bf8d0a90d88b70488247a705292b86941debb462bdfdcf0c5ae1def9808b602deb1b39c5430c6759f2f4140baf85fb7269c9add7aef7894f744e6b9804b
-
SSDEEP
192:9B9fo8tgbW2ZWEMJNj8wqo2SjS0dSAOnjqJUXs0:9B9fnr2Zajn2SjS0dSe0s0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{37C52551-7635-11EF-AB29-72E825B5BD5B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432877509" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 504b3e0c420adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000a43d45756f3a4a239c0dbf6fc90fdee08bbd05122babb5bf752cf5a2e637bda2000000000e80000000020000200000000c02c10941ad49b4af84385428fe3cc7b43f9136268e99d79ece30ff65024c9620000000aaec370d062124d2b2dea34671c45faf5ff5fef88622ae640ee92abf4479d8054000000067388571e317e8d543c75636f93aede13390f8194b1ef7cd049bfa52b1123d644f9942360399399e1e0cdddd90d6842fe9620e4a416f39bdbb65932703951d7c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1680 iexplore.exe 1680 iexplore.exe 576 IEXPLORE.EXE 576 IEXPLORE.EXE 576 IEXPLORE.EXE 576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 576 1680 iexplore.exe 30 PID 1680 wrote to memory of 576 1680 iexplore.exe 30 PID 1680 wrote to memory of 576 1680 iexplore.exe 30 PID 1680 wrote to memory of 576 1680 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea7af5cf5453c0ada742cc06f2198b2d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5a956777ff06c2d42559bf761f34eb2
SHA14a016347fbf0c783ba86f93c347ca24a006e6489
SHA2568f83c3839662bee877271eb9ddc4fc60e65ac6f01c37c9fa764cc998cc6517f2
SHA512644d2b72978b1e58231ba8741f30ee965abfa85ab31f7e9e9eb1f566031f6c03458ba662e86bfafecec6a33d109448d3b1de55782e0f4c25a64aa83a4b4d4836
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f65f339c5de866c4bb6abd9b4c2c3902
SHA16c01c0ae6f283f294b74131db17ebacb48f85ad5
SHA256dc2ff7feb54cbf2c6d4f91e046f227ccd1493eaf0aef07641e618a620e48cfbe
SHA512d997d2826f29bb88619f53793e514e5816d116dbb4aff0a9d755bee69581e0b2d84e56e8ce3b33afe10190fd8251fd0aa386ac18f292565a1aff780fa3c59d97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f17bef36c403ffe817704609df2c703a
SHA12f941452c1558068b51f31de7d51b39799016081
SHA256fc89eec519cee94ab3ce60aa1d0743e775989fb033c992cbb3823b149c2f8b95
SHA512eed9e3f112b142d352d3aa49632389b9713fc19b9f5fe820d74c6442167a7291c7878e39fe6e528fe88d9038c27f42b05e58ef2ac90cbf0d6cca1bca3ef0bee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4fa34aad8a724f308cd1f658ebc19b1
SHA16e6c315276baf785a4b04f1411b653b3afcdef25
SHA2561b57b9bf79f527ce202bd06e434894f02860dd093363c24eadf67b76badce021
SHA5122dfe6b595e736461002860fcce33efea11b0e4eddd4a3319536edf0d34ec38d9d4b0ef519fd2643153c0ae64f25718a3558437f6efaf779447fb7cedbe56c866
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c4c28116489c75031a8a18e31114f06
SHA16f9db37d4cd205e6fec15a4c4e7bf6350a114faa
SHA2562292c5ee62f8ee1668854c0e5130f8b71006fd56fa276b637cdb589d434d0eab
SHA5123b1f11f0bd4fbf9768e6c6d3e2bb9b93c3d46190c0a25203656ea1468be646b34c179c47ef0a5d0f8a6f738a23bf06ca082fc879e825e83d77d8f266cf7c3496
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8fe7869bc978d77b2cbfdbd6aba0aca
SHA1f833bb52b75b25be89c2d1b5a0b5e8ea13e620ab
SHA25679010632f4f2548e399fcc2795b00c69d612203d974c42a8f4ebee09d0f1465c
SHA51209713100fa1e4b1a1fb291706c44aefb5a8f4936c2174ec5bc9aeac79bb21b3493322d5a658e2c8d9c572a59912d9dd36d0b40f5d546263af85c8c97507baf4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558cc94da26d7168443407845d4614a03
SHA1098ccff9c69ec87f50aab056ae70598b5b7dfd21
SHA2561b19dc78a0865e51553981950869bbadedbf0a968f7621601f293f1395f45b67
SHA5120ca3b699fde6ae39537f78ef0111b7767862ff6d98a757f9dc3df4a06d30cbe256e459fc37908e8b6c17b6ca72089d895779e2ca9f7142d99f043c71f46ad72b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bdda3005960000761e496a6087ca919
SHA156d1804add5e5ce1b469ec77ce20ec5bf2f3518e
SHA256d40636e00dafa4e00b8926e3178441141b21369cd44ffee8abf5755b31244c2e
SHA5123656c3f79ee3c5f809a6fe119443bae92ce9ef50ba997c8c8d7461cf32982f4c50f63ffb57216b81c5f66ee2dd0f6d178e0dedf66effdda2f64680bb21a62214
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5540cb2496e12b0d18b8d5097e62aec7c
SHA1fe9bfbf5691de5d9e823dc9d8cc0372939b73814
SHA256bf0ee1935f76d8e4d13e41c88cda8f4b1f65ad1365a000b6d2dc72bf1aec784b
SHA512771a042980908285c20386e87c310d22dac8b7cdabde5c0e8574c4bc3739eade64d10f606ad32172b2603a5a568630ab54f290daf4a5ee61ddb450ed9d3dd565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccd225e7b05fbcea2cb9bbc6fd4d38bf
SHA110be695aeaaa9a3592330ef73859ed876f7793fd
SHA2563b52a8feb4dac61a10c054bcb29d8d837a4bb1148c177ed89c9d3712611dcab4
SHA51265668f00f5dd1a6d054d624262bdae9eb5607e722f4305c9cc1525c600eff54a6c3558e9788535b6f1dae7a622ff953ab50f5e2506b82943c3882e91d812ce4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5d2114860ad37f851bd60a5be9f0363
SHA186aad8d00546b17a12a58dfc0c0de954de07505e
SHA2567961c93e04640ed5ae4c9762e29e32a14cd53da3e9fe69078891025cc205037b
SHA5127b0795c79f4d6d0ecf800eb52caa0dc1a80e655e3c8bb6f2a382e3f7e2a14a4230da6c51d575d9bb9a98d7f19e56bab5fe781989ccf6256d0103cdb5104d0fcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a55d65bc5bf0dc295aff02a0395b8948
SHA1f35a7378e8bba82ca4ce937176778dd4a0634fa8
SHA25692f227d50e03e22104ed45ea77d14267c3cfaaadd06dab24b5468981b2494b17
SHA512727f25d6655bbf49ba3bac40cd4c7a79562a28a9c0288f3d562ad4d6ef6253d527bc03aa1760d33fb9c043603771da77d6ba673f7ff2d61ddd1e4b90767cae98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dc7debe1e2db977dce20a177cd3e3f2
SHA175c82cff72098a177a1c0ad7b2a95bc9f360d728
SHA2564353cd6c4061e08c3918293102593e7c9ed6dd0a30ccff019a8a71b35aa62be0
SHA51238ffb8322f385012d23ec9827a372e2d0616ff17669e9cddfda9abc901b3fcc58694a0f5d4cb74e3a493b26a4b1bafdd5f12d8275a07f819f93720f6ed5651b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5ce61967f5af4030b5c93bd157395a4
SHA114fcdc716f2b64172820af3304a2ac70740896b6
SHA2569052fe00c248c67c050536a0b2e66b076dcb7b0fbceadbb63e397e9e180c3dab
SHA5127423ebc812acec1873b278ab5d53f05f4c56e9493d85fc0840a14be8137dc0e6191f1c7a5069c2bd5bea17774ffc18046d7516b8a5d62892e50657825dd15a77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597759ff031fbe035ce93ca8cf0e2edee
SHA18ef7fd49d21177eedf462a84245675f1033af0cc
SHA256b95c1749a3469721c41fa623e89ae2d200082c3d9437815def144026c0be1bc4
SHA5120570c106721ebb65e96851d7d8dbecd1ddf20274d850481fd8c7c098c4dcd58ef965ca917642f321dad9bf8eed2a2be4128606d66845fc9fc0c5372f4f0bba36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c46e05429408369348ca22b4a370c8a6
SHA17e153168a07ebcf4269e60e5137345287a749326
SHA256a552fcb9aca862a1f185702f7bc61b5d4a1979c36dfd7468f6c069c905ba7ad1
SHA5125afb4485778e1f76ce13530880450b7f4b75bf355c7708a586b423ad0ba86f84cc4490f83e2b3cf68a04503e6f59f726db929863957b4cc788542310b0252939
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53420417047faa03e8b28c3717966d193
SHA179430cda6bc554146e90d6f7818a0cd38b5c2a2d
SHA256d829cb8451fa1fc1e078662b517e3191f04d43802c95d23b30aae04ec8326596
SHA512c26b25dce1a873704dd9b4fd7d033e9ab216becdf3a4cad14d350fe8ae18a17be31093589ce6cb1903f5b9dcf91830b4901b2c0c5c40e478c78278ef9bb81775
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cb8449c5f015304fffae0e7eb43eb33
SHA128056d20d33b363f9df90fd8a24bc846ba46b41a
SHA256da476cde039d063943e11276d30fbe8e5e9bcb7643e20bb97f82b99a977caa99
SHA512442a36d9e0840a62b1b1e762d65f9a13d61d7a38a4c5cbf2b7e62ab2d7ab5ee308e30aabe5843427955744f251d0ac81895c192e3b1e7a88f6e1326a648b294b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cd5cc642c6964bf1ac73d75e02ad312
SHA1a3215c52c8d5c0579cabf10d30a573c899a8a4b6
SHA256ed1af3afa1c1eea4dd493e2dc67cc39770acfddb61a539ba1387e81ae81a1498
SHA51200fe4071661ec5be4d24bad8ba4632a6c9760e96daa1b84cd1f9bd1fc12997bc832422fa3edfb786e3ad25b53d28d451925b67260fc009f06b33d24a0465607c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b